ATEN Technology, Inc. has announced the release of a new suite of secure Keyboard, Video and Mouse (KVM) solutions that are National Information Assurance Partnership (NIAP) certified PP v4.0 for use in highly sensitive applications that demand isolation between different network security enclaves, such as in the military and government.
Boosting network security and safeguarding data access, the switches enable operators to control multiple systems using the same set of peripherals (keyboard, mouse, monitor, speaker set, Common Access Card reader, etc.) without compromising real-time data visualization between connected computers of various security classifications.
In addition to the protections inherited from the previous version, such as data path isolation and unidirectional data flow, restricted peripheral connectivity and filtering, user data protection, configurable device filtering and management and always-on tamper-proof design, new features on the PP v4.0 compliant series include:
- Video quality up to 3840 x 2160 @ 60 Hz
- Strict audio filtration to protect against audio leakage
- Administrative configuration of keyboard/mouse port filtering to reject specific USB HID devices
- Secure port switching via pushbutton and Remote Port Selector (RPS) to enhance security – 2XRT-0019G
- LED indication to alert of unauthorized connection to USB HID devices
- Non-CAC (common access card reader) models available for selection
A total of 32 models are scheduled to be released in succession, with options including 2-port, 4-port and 8-port models, different video interfaces including DisplayPort, HDMI and DVI and single/dual displays availabilities for various customer demands.
“The new ATEN PP v4.0 secure KVM switches are specifically designed to enforce stringent desktop security by keeping sensitive assets isolated while providing advanced user data protection and flexible administrative security management features,” said Aaron Johnson, senior product manager, ATEN Technology, Inc. “They are suitable for deployment in any industry that needs to handle sensitive, confidential or proprietary information, or implement multi-level security on separate networks, such as government and military agencies like the Department of Defense, healthcare providers, banking and finance institutions and more.”