The KVM Defender is designed for use in secure defense and intelligence applications where sensitive data must be protected and is designed to provide the highest possible computer and peripheral isolation required by government agencies and the military. Defend your unsecured peripherals or other non-secure computers that may introduce a security threat. Use the defender to control KVM (Keyboard, Video, and Mouse) operation on one computer with one DisplayPort display and CAC.
Certified for NIAP Protection Profile for Peripheral Sharing Device Version 4.0
The Secure KVM Switches are tested and certified under the USA scheme for NIAP Protection Profile 4.0 so you get the best data protection available on the market today.
Many secure KVM switches support CAC devices, such as smart-card and biometric readers, bolstering security when using the device. For extra protection, users can assign specific peripheral devices to the Defender's CAC port.
Isolated Data Channels and Non-Reprogrammable ROM Ensure Maximum Security
Data relays work one at a time to shield connections from outside intrusion. Inverted signals control the data relays. Each port uses its own isolated data channel and each unit features non-reprogrammable ROM to better protect the Defender's functions. There is no data leakage between ports. Would-be hackers can never gain access to your sensitive data by compromising the Defender's ROM.
Protects from Internet Data Breaches
The Defender offers the highest security when accessing classified and public networks over the internet through isolated connections. By isolating connections between networks, no data is leaked between secure ports and the outside world.
Secure EDID Learn and Video Emulation
The Secure KVM Defender emulates (simulates) the presence of a keyboard and mouse for every attached computer through a USB cable. Both selected and non-selected computers maintain a constant connection with the unit's keyboard-mouse emulation controllers, allowing for ultra-fast switching and restricting the discovery of newly connected peripherals during switching operations. Emulation of keyboard and mouse also prevents the direct connection between the peripherals and the connected computers, shielding systems from potential vulnerabilities.
Tamperproof Seals Protect Your Devices
Built-in tamperproof seals and a long-life internal anti-tamper battery add even more security for your devices.