Endpoint
11/6/2013
08:17 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Secure Windowing KVM Delivers Simultaneous Interaction With Multiple Computers

Belkin switch designed for environments in which the user needs to work at and monitor multiple computers, with different security levels, simultaneously

PLAYA VISTA, CA – November 5, 2013 – Belkin, a trusted leader of technology solutions for office, classroom, IT infrastructure, and mobile environments, today announced the expansion of its award-winning secure KVM product line with the first-to-market Belkin Secure Windowing KVM Switch. The new switch delivers superior peripheral security for government and high security agencies by providing true data path isolation between systems and networks--the hallmark of Belkin's Advanced Secure KVM product family.

Unlike conventional KVMs, the Belkin Secure Windowing KVM Switch requires no manual push-button switching between channels. The new switch enables simultaneous user interaction with multiple computers connected to networks with different security levels, using one mouse, one keyboard and one or two display monitors.

Traditional secure KVM switches allow users to work on only one channel or computer at a time. The new switch is the only product designed for environments in which the user needs to constantly work at and monitor multiple computers, with different security levels, simultaneously-- without quality loss, latency, reduced colors, or dropped frames. Using state-of-the-art video technology, the Belkin Secure Windowing KVM allows users to fit up to four full HD sources on a single HD display.

The Windowing KVM is fully compatible with legacy (using Belkin Smart Cables) and new government systems, and is Common Criteria validated to EAL 4+ to assure the highest level of protection.

Additional security features of Belkin's Secure Windowing KVM Switch include:

• Advanced scaling function, allowing users to scale the video source x 1/2 and x 1/4

• Two additional working modes: tile and scaling

• Dual-display model, the ideal setup for high-end users

• Easy customization of channels, colors, cursors, task bar, background, and more

"The new Secure Windowing KVM Switch brings the era of manual push-button switching between channels to an end, and makes simultaneous interaction with multiple computers a reality," said Luis Artiz, director of product management, Business Division, Belkin International. "Like all products in Belkin's award-winning Secure KVM portfolio, the Windowing KVM exemplifies our continued focus on improving workstation security, which pivots on true data path isolation between systems and networks. We will continue to advance our technology to meet the security requirements of government agencies, financial institutions, and other organizations that handle sensitive or confidential data on separate networks with different levels of security."

Belkin's Secure Windowing KVM Switch is now available through the company's network of authorized channel partners.

Belkin delivers the necessary components for workstation security, as well as every essential accessory and peripheral device to provide a complete, efficient, productive workstation that meets the demands of government use. For more information visit: Belkin Government.

About Belkin Business

Belkin Business, a division of Belkin International, offers technology solutions for office, classroom, IT infrastructure, and mobile environments. A proven technology leader for more than 30 years, organizations worldwide trust Belkin for its unwavering commitment to product quality, and expertise in creating solutions designed to address customer requirements in business, government and education. With a global supply chain and broad provider network, Belkin commands a purchasing power that delivers greater value and unparalleled execution advantages to customers. The company's line of commercial products are available through Belkin's global network of distributors and resellers. Headquartered in Playa Vista, California, the company is represented in more than 25 countries and can be found on the Web at http://www.belkinbusiness.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7437
Published: 2015-03-29
Multiple integer overflows in potrace 1.11 allow remote attackers to cause a denial of service (crash) via large dimensions in a BMP image, which triggers a buffer overflow.

CVE-2013-7438
Published: 2015-03-29
Multiple buffer overflows in pbm212030 allow remote attackers to cause a denial of service (crash) or possible execute arbitrary code via a crafted PBM image, related to (1) stream line data, which triggers a heap-based buffer overflow, or (2) vectors related to an "internal intermediate heap-based ...

CVE-2014-5427
Published: 2015-03-29
Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integration Engine (NIE) 5xxx-x, and NxE8500, allows remote attackers to read pa...

CVE-2014-5428
Published: 2015-03-29
Unrestricted file upload vulnerability in unspecified web services in Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integratio...

CVE-2014-9205
Published: 2015-03-29
Stack-based buffer overflow in the PmBase64Decode function in an unspecified demonstration application in MICROSYS PROMOTIC stable before 8.2.19 and PROMOTIC development before 8.3.2 allows remote attackers to execute arbitrary code by providing a large amount of data.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.