System information

What are the potential security
risks when using an unsecure
KVM?
There are many cases where one user needs
to work simultaneously with a few computers,
operating at various security levels. Users
rely on the KVM used to protect the networks
from system breaches and data leakages.
If the KVM that is used is not secure, it may
be easily exploited by a remote attacker to
leak condential information to non-secure
networks, or even to the Internet.
Where are Belkin Secure KVMs
manufactured?
Belkin Secure KVMs are manufactured in
the USA, in an authorized factory meeting
all the security requirements dened by the
Common Criteria Protection Proles. Belkin
security products are also TAA-compliant and
therefore meet the requirements of the U.S.
Government’s Trade Agreements Act (TAA). The
product development and production life cycles
are similar to MIL-STD high-security products.
What measures are taken to make
sure that the Belkin Secure KVM
is not physically tampered or
interfered with throughout the
product life cycle?
1. The Belkin Secure KVM is equipped with
battery-backed, always-on, electronic sensors
that render the KVM inoperable if the chassis
is tampered with.
2. Secure, unique, and authenticated
packaging is used to pack the Belkin Secure
KVM when the KVM is ready for delivery.
The packaging can only be opened via a
tamper-evident label and ripstop banding
that needs to be completely torn to gain
access to the product. This packaging cannot
be resealed once opened.
3. Serialized, traceable, holographic FIPS-
compliant labels can be found on the Belkin
Secure KVM, providing a visual indication of
an external tampering attempt.
4. The reinforced, metal chassis is designed
to reduce entry points and electromagnetic
emissions.
5. All microcontrollers in the product are
locked and rmware is encrypted to prevent
possible rmware tampering.
What are optical data diodes and
what are they used for in Belkin
Secure KVMs?
At Belkin, we trust in physics, as software can
be hacked or modied! Optical data diodes
prevent peripherals from being used to breach
systems. The optical data diodes convert digital
data streams into light and back to digital to
assure unidirectional data ow between the
peripherals and the connected computers. The
optical data diodes make it impossible for a
computer to load information to a connected
peripheral even if the driver is breached.
Why are emulators used in
Belkin Secure KVMs and why
are the emulators isolated?
An emulator is a special circuitry that duplicates
the functions of one computer system into
another computer system, so that the emulated
behavior closely resembles the behavior of
the real system. In the Belkin Secure KVM, the
emulators are used as a rewall between the
peripheral device and the computer, making
sure that only “legal” information is passed. The
Belkin secure KVM has a separate emulator
for every computer port to assure that no
information is shared between the computers,
preventing data from being shared between
two computers.
Belkin Secure KVM
Security Features
Back to Table of Contents
2