Endpoint
11/6/2013
08:17 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Secure Windowing KVM Delivers Simultaneous Interaction With Multiple Computers

Belkin switch designed for environments in which the user needs to work at and monitor multiple computers, with different security levels, simultaneously

PLAYA VISTA, CA – November 5, 2013 – Belkin, a trusted leader of technology solutions for office, classroom, IT infrastructure, and mobile environments, today announced the expansion of its award-winning secure KVM product line with the first-to-market Belkin Secure Windowing KVM Switch. The new switch delivers superior peripheral security for government and high security agencies by providing true data path isolation between systems and networks--the hallmark of Belkin's Advanced Secure KVM product family.

Unlike conventional KVMs, the Belkin Secure Windowing KVM Switch requires no manual push-button switching between channels. The new switch enables simultaneous user interaction with multiple computers connected to networks with different security levels, using one mouse, one keyboard and one or two display monitors.

Traditional secure KVM switches allow users to work on only one channel or computer at a time. The new switch is the only product designed for environments in which the user needs to constantly work at and monitor multiple computers, with different security levels, simultaneously-- without quality loss, latency, reduced colors, or dropped frames. Using state-of-the-art video technology, the Belkin Secure Windowing KVM allows users to fit up to four full HD sources on a single HD display.

The Windowing KVM is fully compatible with legacy (using Belkin Smart Cables) and new government systems, and is Common Criteria validated to EAL 4+ to assure the highest level of protection.

Additional security features of Belkin's Secure Windowing KVM Switch include:

• Advanced scaling function, allowing users to scale the video source x 1/2 and x 1/4

• Two additional working modes: tile and scaling

• Dual-display model, the ideal setup for high-end users

• Easy customization of channels, colors, cursors, task bar, background, and more

"The new Secure Windowing KVM Switch brings the era of manual push-button switching between channels to an end, and makes simultaneous interaction with multiple computers a reality," said Luis Artiz, director of product management, Business Division, Belkin International. "Like all products in Belkin's award-winning Secure KVM portfolio, the Windowing KVM exemplifies our continued focus on improving workstation security, which pivots on true data path isolation between systems and networks. We will continue to advance our technology to meet the security requirements of government agencies, financial institutions, and other organizations that handle sensitive or confidential data on separate networks with different levels of security."

Belkin's Secure Windowing KVM Switch is now available through the company's network of authorized channel partners.

Belkin delivers the necessary components for workstation security, as well as every essential accessory and peripheral device to provide a complete, efficient, productive workstation that meets the demands of government use. For more information visit: Belkin Government.

About Belkin Business

Belkin Business, a division of Belkin International, offers technology solutions for office, classroom, IT infrastructure, and mobile environments. A proven technology leader for more than 30 years, organizations worldwide trust Belkin for its unwavering commitment to product quality, and expertise in creating solutions designed to address customer requirements in business, government and education. With a global supply chain and broad provider network, Belkin commands a purchasing power that delivers greater value and unparalleled execution advantages to customers. The company's line of commercial products are available through Belkin's global network of distributors and resellers. Headquartered in Playa Vista, California, the company is represented in more than 25 countries and can be found on the Web at http://www.belkinbusiness.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6335
Published: 2014-08-26
The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and ...

CVE-2014-0480
Published: 2014-08-26
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL ...

CVE-2014-0481
Published: 2014-08-26
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a d...

CVE-2014-0482
Published: 2014-08-26
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors relate...

CVE-2014-0483
Published: 2014-08-26
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.