Secure MIL-STD TEMPEST 4-Port KVM Switch

HIGHLIGHTS
HSL’s 4-Port Ruggedized secure KVM Switch, is designed to provide military users with superior security in the most challenging environmental conditions. It’s designed to be installed on a military vehicle, submarines and airborne platforms. For easier mounting and better situational awareness, the SK41D-4TR is optionally equipped with a remote control that can be mounted on the operator dashboard.
KVM device models addressed in this page:
- SK41D-4TR – Secure MIL-STDTE MPEST 4-Port HDMI KVM Switch
——————————————————————————-
Highly Ruggedized
The SK41D-4TR device designed for MILSTD harsh environmental requirements. It features robust sealed aluminum enclosure, all metallic MIL-DTL-38999 connectors and sealed front panel illuminated push-buttons.
Tempest level I complaint & NIAP Common Criteria PP4.0 Certification
The SK41D-4TR is the only KVM switch in the world that is NIAP PP 4.0 Compliant, Tempest level I complaint, Mil-STD 810G Complaint and MIL-STD-1275A complaint.
Versatile Interfaces
Product supports up to four computers/video sources with HDMI or DVI interfaces. Video sources supported ranging from 480p legacy to 1920×1200@60Hz, 2560×1600@60Hz and 3840×2160@30HZ (4K30) resolutions.
Unidirectional optical data diodes
HSL products provides the highest level of isolation between connected computers or sources. The SK41D-4TR KVM is equipped with four patented Unidirectional optical data diodes to prevent potential APT on the KVM from the host and from connected peripherals. No reverse data flow possible by design. Designed to support isolation between national security networks and internet.
Hardware Based peripheral protection/isolation
The SK41D-4TR security functions depend on physics. Absolutely no dependency on firmware or software. All firmware is in protected ROM (Read Only Memory). No keyboard buffering or memory. Peripheral devices can be defined through configurable white-list and black-list.
Display Plug & Play (DDC) protection
HSL patented EDID protection is the most secure video protection method in the market today. Leakage prevention through emulation technology.
Signaling attacks prevented by design.
Always-on Active Anti-tampering
Enclosure tampering attempt can be sensed by multiple sensors. Battery powered anti-tampering circuitry prevents normal KVM operation.
Protected Power Input
The KVM is powered directly from 12-28VDC power vehicle bus and is fully complaint with MIL-STD-1275A.
Product is optionally protected from High Radiation Nuclear events.
- Interact with four isolated computers using a single set of keyboard, video, mouse, audio and USB peripherals.
- Freeze USB (SK41DU-3, SK41PU-3, SK41HU-3):
Assign the USB port to a specific computer while switching the keyboard, video, mouse and audio between other computers. Useful for various scenarios, for instance, when a USB smart card reader must remain mapped to a certain computer.
- Smoothly switch between computers (Virtual Display Technology):
Automatically switch control from one computer to another by dragging the mouse cursor over the computer’s display border. Peripherals switch to the next computer without having to press any buttons once the mouse is passing the display border.
Keyboard & Mouse Threats Protection
Attack Type | Vulnerability | Risk |
Signal/Virus |
|
Data leakage from one system to another |
Solution Components | Solution Highlights | |
Unidirectional Optical Data Diodes |
|
|
Hardware-based Peripheral Isolation per Port |
|
|
Hardcoded HID Filter |
|
Monitor / Display Threats Protection
Attack Type | Vulnerability | Risk |
Signal/Virus |
|
Data leakage from one system to another |
Solution Components | Solution Highlights | |
Extended Display Identification Data (EDID) Emulation |
|
|
No Shared Circuitry |
|
|
Block Monitor Control Command Set (MCCS) |
|
Audio Threats Protection
Attack Type | Vulnerability | Risk |
Signal/Virus/Hot Microphone |
|
Data leakage and eavesdropping |
Solution Components | Solution Highlights | |
Unidirectional Diodes |
|
USB Threats Protection
Attack Type | Vulnerability | Risk |
Virus |
|
Data leakage from one system to another |
Solution Components | Solution Highlights | |
Block un-authorized USB |
|
|
Secure & Dedicated Keyboard / Mouse Ports |
|
|
Biometric/Smart-Card reader support |
|
|
Filter USB Peripherals |
|
Hardware Tampering Protection
Attack Type | Vulnerability | Risk |
Implant malicious hardware |
|
Data leakage and eavesdropping |
Solution Components | Solution Highlights | |
Always-ON tamper evident system |
|
|
Blinking LEDs provide a clear indication of a tampering event. |
|
Firmware Tampering Protection
Attack Type | Vulnerability | Risk |
Firmware Reprogramming |
|
Data leakage and eavesdropping |
Solution Components | Solution Highlights | |
Tamper-proof electrical design |
|
- View applications in Ultra High Definition (UHD) 4K video quality:
Never compromise on video quality. Run graphic-intensive, ultrahigh definition applications on all single and dual monitor KVM models.
- Avoid typing mistakes:
Since two-way communication is blocked by the KVM security, keyboard lock LEDs do not function. Help users avoid typing mistakes by visually indicating the status of keyboard locks (CAPS-LOCK | NUM LOCK | SCROLL LOCK) on the product’s front facing panel.
- Keep up with future requirements through interchangeable KVM / KM functionality:
Adjust with versatile setup scenarios. The device can be configured in two modes, KVM and KM. In KVM mode (default) one display, keyboard and mouse set is shared between all computers. In KM mode each computer is connected to a separate display while keyboard and mouse are shared, thus allowing simultaneous work on multiple computers.