IHSE’s mission-critical KVM solutions - When uncompromising security is required (Sponsored)
This article is brought to you by IHSE
KVM stands for Keyboard, Video and Mouse, referring to the familiar workplace computer input and output devices. IHSE’s mission-critical system solutions extend the distance between the computer and peripheral devices (keyboard, monitor, mouse). Allowing users to select between different source devices to create more comfortable and efficient working environments and streamlined workflows.IHSE offers KVM products for the switching, sharing, extension and conversion of all types of computer signals, including analog and digital video and audio, USB and SDI video; applicable to all markets. Long distances are bridged by Cat X, fiber or mixed cabling, depending on security requirements and applications. IHSE KVM solutions stand for upmost security, preventing unauthorized access or injection of malware and guarding data security.
Protected computer access
IHSE’s Draco vario KVMA Isolated Secure Extender enables remote computer access in high-security environments that must meet stringent cyber security specifications – such as government, defense and critical infrastructure. Provisioned users can control multiple computers and systems using the same set of peripherals (keyboard, monitor, mouse) without exposing confidential data to attack. Extenders are equipped with specific shielding layers on both the hardware and integral firmware to prevent eavesdropping and signal detection from Radiofrequency (RF) Radiation. Restricted hardware access also protects from bulk data theft (e. g. via USB flash drive) or the injection of malware.
Common Criteria certified; NIAP PP4.0 and EAL4+ compliant
Developed in collaboration with security experts at HighSecLabs (HSL), the Draco vario KVMA Isolated Secure Extender is designed to meet the most stringent government and defense specifications. The devices comply with the highest IT security standards of the NIAP PP4.0 Common Criteria Protection Profile for Peripheral Sharing Devices version 4.0 and ISO/IEC 15408 Common Criteria (CC) EAL4+. This ensures up-to-date protection against data leakage.
Separation of Red and Black environments
The Draco vario KVMA Isolated Secure Extender allows provisioned users to select and control any computer located in the secured and access-restricted server room via the KVM matrix. Each connected Draco vario KVMA Isolated Secure Extender also acts as an isolator for the KVM system at the endpoints, keeping the integrity of the Secure Core KVM network intact. In combination with Draco tera KVM matrix switches and Draco vario extenders it is also possible to set up a secure combination of classified and unclassified endpoints. The IHSE KVM system enables precise user access rights management as required in government and defense installations with separated classified and unclassified environments.
High investment security
The system supports most current display resolutions and is already prepared for many future formats. This means that the Draco solution represents a long-lasting, high-ROI investment that will scale with user demands for many years to come.
Above: Draco vario KVMA Isolated Secure Extender
Total connectivity and flexible switching
Draco tera KVM matrix switches enable controlled access to (and management of) any size of computer installation. Sources can be accessed, switched and shared instantly by users. Any connected user console (consisting of keyboard, mouse, monitor or other peripherals) can access any computer within the network with defined access rights. Switches include comprehensive features such as multi-screen control and cross-conversion between AV signals and transmission media (Cat X and fiber). The Draco tera range extends from 8 to 576 non-blocking assignable ports. With mixed operation over copper and fiber cables the switches handle all types of computer signals including USB, audio and video (HD, 4K, 8K above). Draco tera is designed for 24/7 mission-critical operation with extensive redundancy features and hot-swap option of components. Users can instantaneously access any computer-based control and information system at the best possible video quality. Acting as Secure Core by design, the matrix provides a safe environment which is protected from cyber-attacks.
More from Industry Spotlights
-
Mortar mobility: Patria’s TREMOS takes aim at the modern battlespace
In conversation... Patria’s Lauri Pauniaho talks to Shephard's Gerrard Cowan about how high mobility levels are essential for mortar systems in the face of modern counter-battery fire, and how a new platform-agnostic module can combine existing vehicles and mortar barrels into a cost-effective new weapon system.
-
Powerful, long-range electromagnetic attack capabilities
Dominate the electromagnetic spectrum. Make it an unfair fight with the EA-37B.
-
How complete is your Recognised Maritime Picture?
Deploy SitaWare Maritime to master your situational awareness above and below the waves
-
Pioneering the Future of Naval Defence: Fincantieri's Cutting-Edge Innovations
Fincantieri leads naval defence innovation, integrating advanced propulsion, digital tools, and sustainable technologies for modern military fleets.
-
AI innovation set to revolutionise military training landscape
Artificial intelligence offers unprecedented potential to revolutionise military training, enabling agile and decisive forces.
-
‘Never done before’: tiltrotor technology and the future battlespace
In conversation... Bell's Frank Lazzara talks to Shephard's Gerrard Cowan about the potential of tiltrotor designs to revolutionize U.S. Army maneuver operations, and how the technology could transform other mission sets across DoD and international armed services.