Secure KVM switches protect against cyber intrusion and meet the strict requirements of the latest NIAP Protection Profile for Peripheral Sharing Devices version 3.0. The Black Box Secure KM switches allow a single operator to control up to eight computers simply by moving the mouse cursor from monitor to monitor saving time money and space. Connect the switch to all computers that need to be accessed and all monitors directly to the computers. They are ideal in secure command and control applications government agencies 911 emergency call centers and many more. The Secure KM Switches provide peace of mind knowing that each connection is secure. Options include 4-port or 8-port switches.The Secure KM Switches protect your sensitive data using the latest technology. The switches have isolated channels to ensure that data is not leaked between secure ports and the outside world. To prevent eavesdropping attempts through vulnerable devices the switches support uni-directional data flow from computer to peripheral. Mechanical electrical and optical isolation stop hacking and data leaks in environments where security is critical. Plus secure EDID learning prevents unwanted and unsecure data from being transmitted through DDC lines. The Secure KM Switches use protected firmware to keep intruders from re-programming or reading the firmware. Keyboard/internal cache wiping and chassis intrusion protection provide even more security. The Secure KM Switches also use anti-tamper switches and tamper-evident seals to shield your confidential data.Why Secure KVM Connecting peripherals such as monitor keyboard mouse and speakers to a PC introduces potential data leakage and hacking risks. Secure KVM Switches are designed for use in any application where sensitive data must be protected including defense government agencies and intelligence. Secure KVM Switches from Black Box are NIAP PP 3.0 certified and equipped with the highest security features that meet today's Information Assurance safe control standards. The switches contain unique hardware configurations that prevent data leakage between PCs and connected peripherals eliminating potential cyber threats.