How It Works This switching system allows users to switch safely and securely between computers operating at different classification levels from a single set of peripherals, providing continuous access to critical data. With multiple security features, the secure design prevents the transfer of data or information between the connected computers, ensuring data security is not compromised. Solving Problems Every day, news headlines report another cyber security breach. Military and government agencies, financial institutions, national health organizations, large media companies and multi-national retail chains - none are immune to major security events. While the importance of security at the network level has long been recognized, security management at the desktop is sometimes overlooked. Each desktop computer or device offers a potential point of entry into your network. Laptops, PCs, memory storage devices, smartphones, tablets - all of these can be the catalyst for malicious attack or intellectual property theft. Whether you are running an organization with limited IT resources or managing a department within a large organization, protecting the desktop environment is critical to reducing risk and abiding by privacy and security regulations. Adding Value The Cybex secure desktop KVM switch by Vertiv improves security at the desktop environment using premium security technology that eliminates the need for additional connected devices. Fewer connected devices not only provides improved security but it also saves costs and improves productivity. Features NIAP Protection Profile for Peripheral Sharing Switch v. 3.0 Compliant Zero delay switching Two, four and eight secure, isolated computer channels Single and dual head DVI-I, DisplayPort and HDMI connections providing resolutions up to 4k UHD @ 30 Hz Advanced isolation between computers and shared peripherals Isolated ports on the switch provide discrete processing paths to each system USB peripheral isolation via unidirectional optical data diodes enabling data flow from devices to host only Optional Dedicated Peripheral Port (DPP) for secure connection to USB peripherals including two-factor authentication devices such as CAC smart card readers, fingerprint readers and facial recognition Always-on active anti-tampering system, and holographic tamper evident seals