Endpoint
11/6/2013
08:17 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Secure Windowing KVM Delivers Simultaneous Interaction With Multiple Computers

Belkin switch designed for environments in which the user needs to work at and monitor multiple computers, with different security levels, simultaneously

PLAYA VISTA, CA – November 5, 2013 – Belkin, a trusted leader of technology solutions for office, classroom, IT infrastructure, and mobile environments, today announced the expansion of its award-winning secure KVM product line with the first-to-market Belkin Secure Windowing KVM Switch. The new switch delivers superior peripheral security for government and high security agencies by providing true data path isolation between systems and networks--the hallmark of Belkin's Advanced Secure KVM product family.

Unlike conventional KVMs, the Belkin Secure Windowing KVM Switch requires no manual push-button switching between channels. The new switch enables simultaneous user interaction with multiple computers connected to networks with different security levels, using one mouse, one keyboard and one or two display monitors.

Traditional secure KVM switches allow users to work on only one channel or computer at a time. The new switch is the only product designed for environments in which the user needs to constantly work at and monitor multiple computers, with different security levels, simultaneously-- without quality loss, latency, reduced colors, or dropped frames. Using state-of-the-art video technology, the Belkin Secure Windowing KVM allows users to fit up to four full HD sources on a single HD display.

The Windowing KVM is fully compatible with legacy (using Belkin Smart Cables) and new government systems, and is Common Criteria validated to EAL 4+ to assure the highest level of protection.

Additional security features of Belkin's Secure Windowing KVM Switch include:

• Advanced scaling function, allowing users to scale the video source x 1/2 and x 1/4

• Two additional working modes: tile and scaling

• Dual-display model, the ideal setup for high-end users

• Easy customization of channels, colors, cursors, task bar, background, and more

"The new Secure Windowing KVM Switch brings the era of manual push-button switching between channels to an end, and makes simultaneous interaction with multiple computers a reality," said Luis Artiz, director of product management, Business Division, Belkin International. "Like all products in Belkin's award-winning Secure KVM portfolio, the Windowing KVM exemplifies our continued focus on improving workstation security, which pivots on true data path isolation between systems and networks. We will continue to advance our technology to meet the security requirements of government agencies, financial institutions, and other organizations that handle sensitive or confidential data on separate networks with different levels of security."

Belkin's Secure Windowing KVM Switch is now available through the company's network of authorized channel partners.

Belkin delivers the necessary components for workstation security, as well as every essential accessory and peripheral device to provide a complete, efficient, productive workstation that meets the demands of government use. For more information visit: Belkin Government.

About Belkin Business

Belkin Business, a division of Belkin International, offers technology solutions for office, classroom, IT infrastructure, and mobile environments. A proven technology leader for more than 30 years, organizations worldwide trust Belkin for its unwavering commitment to product quality, and expertise in creating solutions designed to address customer requirements in business, government and education. With a global supply chain and broad provider network, Belkin commands a purchasing power that delivers greater value and unparalleled execution advantages to customers. The company's line of commercial products are available through Belkin's global network of distributors and resellers. Headquartered in Playa Vista, California, the company is represented in more than 25 countries and can be found on the Web at http://www.belkinbusiness.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.