Endpoint
11/6/2013
08:17 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Secure Windowing KVM Delivers Simultaneous Interaction With Multiple Computers

Belkin switch designed for environments in which the user needs to work at and monitor multiple computers, with different security levels, simultaneously

PLAYA VISTA, CA – November 5, 2013 – Belkin, a trusted leader of technology solutions for office, classroom, IT infrastructure, and mobile environments, today announced the expansion of its award-winning secure KVM product line with the first-to-market Belkin Secure Windowing KVM Switch. The new switch delivers superior peripheral security for government and high security agencies by providing true data path isolation between systems and networks--the hallmark of Belkin's Advanced Secure KVM product family.

Unlike conventional KVMs, the Belkin Secure Windowing KVM Switch requires no manual push-button switching between channels. The new switch enables simultaneous user interaction with multiple computers connected to networks with different security levels, using one mouse, one keyboard and one or two display monitors.

Traditional secure KVM switches allow users to work on only one channel or computer at a time. The new switch is the only product designed for environments in which the user needs to constantly work at and monitor multiple computers, with different security levels, simultaneously-- without quality loss, latency, reduced colors, or dropped frames. Using state-of-the-art video technology, the Belkin Secure Windowing KVM allows users to fit up to four full HD sources on a single HD display.

The Windowing KVM is fully compatible with legacy (using Belkin Smart Cables) and new government systems, and is Common Criteria validated to EAL 4+ to assure the highest level of protection.

Additional security features of Belkin's Secure Windowing KVM Switch include:

• Advanced scaling function, allowing users to scale the video source x 1/2 and x 1/4

• Two additional working modes: tile and scaling

• Dual-display model, the ideal setup for high-end users

• Easy customization of channels, colors, cursors, task bar, background, and more

"The new Secure Windowing KVM Switch brings the era of manual push-button switching between channels to an end, and makes simultaneous interaction with multiple computers a reality," said Luis Artiz, director of product management, Business Division, Belkin International. "Like all products in Belkin's award-winning Secure KVM portfolio, the Windowing KVM exemplifies our continued focus on improving workstation security, which pivots on true data path isolation between systems and networks. We will continue to advance our technology to meet the security requirements of government agencies, financial institutions, and other organizations that handle sensitive or confidential data on separate networks with different levels of security."

Belkin's Secure Windowing KVM Switch is now available through the company's network of authorized channel partners.

Belkin delivers the necessary components for workstation security, as well as every essential accessory and peripheral device to provide a complete, efficient, productive workstation that meets the demands of government use. For more information visit: Belkin Government.

About Belkin Business

Belkin Business, a division of Belkin International, offers technology solutions for office, classroom, IT infrastructure, and mobile environments. A proven technology leader for more than 30 years, organizations worldwide trust Belkin for its unwavering commitment to product quality, and expertise in creating solutions designed to address customer requirements in business, government and education. With a global supply chain and broad provider network, Belkin commands a purchasing power that delivers greater value and unparalleled execution advantages to customers. The company's line of commercial products are available through Belkin's global network of distributors and resellers. Headquartered in Playa Vista, California, the company is represented in more than 25 countries and can be found on the Web at http://www.belkinbusiness.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4448
Published: 2014-10-22
House Arrest in Apple iOS before 8.1 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information from a Documents directory by obtaining this UID.

CVE-2014-4449
Published: 2014-10-22
iCloud Data Access in Apple iOS before 8.1 does not verify X.509 certificates from TLS servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-4450
Published: 2014-10-22
The QuickType feature in the Keyboards subsystem in Apple iOS before 8.1 collects typing-prediction data from fields with an off autocomplete attribute, which makes it easier for attackers to discover credentials by reading credential values within unintended DOM input elements.

CVE-2012-5242
Published: 2014-10-21
Directory traversal vulnerability in functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the name parameter in a get_template action.

CVE-2012-5243
Published: 2014-10-21
functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to read arbitrary database information via a crafted request.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.