Belkin Secure DVI-I Manual do Utilizador Página 3

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 8
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 2
3belkin.com 3belkin.com
UNSECURE LAN
JWICS LAN
SIPR LAN
UNSECURE
JWICS
SIPR
ENHANCED USABILITY
• Easy Identification
Reduce user error with customizable color
coding that labels ports associated with each
network. The port button also illuminates to indicate
which computer the console is controlling.
• Simplified Switching
Switch between systems without terminating
your session using intelligent CAC switching.
COMPATIBILITY
• Secure Testing
Expect the best compatibility out-of-the-gate
with a Secure KVM solution that’s designed
and vigorously tested to work seamlessly with
common systems and peripherals used by
the defense and intelligence community.
SUPERIOR SECURITY
• True Data Path Isolation
Prevent data breach with true data path isolation—
purposefully engineered to provide single, unbuffered,
dedicated processors for each KVM peripheral port.
• Peripheral Protection
Eliminate data leaks with hardware-controlled
unidirectional data flow that allows devices, such as a
keyboard or mouse, to communicate in only one direction,
keeping them from receiving data from the computer.
• End-to-End Tamper-Proof System
Guarantee that your device remains tamper-free
throughout the manufacturing and delivery process.
The uni-body chassis of the KVM switch is designed
to reduce entry points; serialized holographic FIPS-
compliant labels provide visual indication and prevention
of external tampering; and electronic sensors render
the KVM inoperable if the chassis is opened.
Key Features
Vista de página 2
1 2 3 4 5 6 7 8

Comentários a estes Manuais

Sem comentários