ADDER ADDERView Secure Analogue AVSV1002 プリント
製品コード
AVSV1002
KVM over IP
Solutions
Experts in
Connectivity
Solutions
ADDERView Secure Range
Ultimate Security - Hardwired Black
and Red isolated KVM
PRODUCT IN BRIEF
The AdderView Secure range of prod-
ucts are highly robust KVM switches
for critical applications. When informa-
tion absolutely must not be leaked
between systems or networks, the
AdderView Secure units combine the
necessary isolation with a desirable
ease of use.
ucts are highly robust KVM switches
for critical applications. When informa-
tion absolutely must not be leaked
between systems or networks, the
AdderView Secure units combine the
necessary isolation with a desirable
ease of use.
AdderView Secure units combine a
number of overlapping strategies that
are designed to defeat potential points
number of overlapping strategies that
are designed to defeat potential points
of infiltration or protect against user
error.
error.
ADDERView AVS Range
Ultimate Security - Hardwired Black and Red isolated secure KVM
FEATURES
TEMPEST qualified and EAL4+ certified
Tempest certified design (USA NSTISSAM
Level I and NATO SDIP-27 Level A), EAL4+
Common Criteria Evaluation Assurance Level 4
(augmented by ALC_FLR.2 and ATE_DPT.2).
Level I and NATO SDIP-27 Level A), EAL4+
Common Criteria Evaluation Assurance Level 4
(augmented by ALC_FLR.2 and ATE_DPT.2).
Physical port identification
Channel switching is controlled only from the
front panel buttons. No keyboard or mouse
switching commands are permitted.
front panel buttons. No keyboard or mouse
switching commands are permitted.
Hardwired port isolation
Data Diodes, implemented within hard-wired
electronic circuitry, rather than software, are
liberally employed to ensure that critical data
paths can flow only in one direction. These data
diodes ensure that a compromised peripheral, a
keyboard for instance, cannot read information
back from a connected system in order
to transfer such details to another system.
Whenever a channel is changed, the connected
keyboard and mouse are always powered down
and re-initialized to provide yet another level of
protection against hidden peripheral malware.
electronic circuitry, rather than software, are
liberally employed to ensure that critical data
paths can flow only in one direction. These data
diodes ensure that a compromised peripheral, a
keyboard for instance, cannot read information
back from a connected system in order
to transfer such details to another system.
Whenever a channel is changed, the connected
keyboard and mouse are always powered down
and re-initialized to provide yet another level of
protection against hidden peripheral malware.
No critical software reliance
In general, the role of software within
the unit has been reduced to an absolute
minimum to avoid the possibility of subversive
reprogramming. Additionally, all flash memory
has been banished from all security critical
areas of the design, to be replaced by one-time
programmable storage which cannot be altered.
the unit has been reduced to an absolute
minimum to avoid the possibility of subversive
reprogramming. Additionally, all flash memory
has been banished from all security critical
areas of the design, to be replaced by one-time
programmable storage which cannot be altered.
Minimal emission design
The outer casing contains extensive shielding
to considerably reduce electromagnetic
emissions. Additionally, the casing has been
designed with as few apertures as possible to
reduce the possibility of external probing and
several primary chassis screws are concealed
by tamper-evident seals to indicate any
unauthorized internal access. Shielding extends
also to the internal circuitry with strong levels
of electrical crosstalk isolation between ports
to protect against signals from one computer
becoming detectable on another.
to considerably reduce electromagnetic
emissions. Additionally, the casing has been
designed with as few apertures as possible to
reduce the possibility of external probing and
several primary chassis screws are concealed
by tamper-evident seals to indicate any
unauthorized internal access. Shielding extends
also to the internal circuitry with strong levels
of electrical crosstalk isolation between ports
to protect against signals from one computer
becoming detectable on another.
Physical port identification
AdderView Secure units are available in two
port and four port sizes. Each size can be
ordered in standard and enhanced versions.
The enhanced versions allow you to attach a
smart card reader that can be securely shared
between the connected systems. The enhanced
versions also contain anti-subversion and
authentication features that guard against
intrusion and allow you to prove that the unit
is genuine, respectively.
port and four port sizes. Each size can be
ordered in standard and enhanced versions.
The enhanced versions allow you to attach a
smart card reader that can be securely shared
between the connected systems. The enhanced
versions also contain anti-subversion and
authentication features that guard against
intrusion and allow you to prove that the unit
is genuine, respectively.
These are just a few of the many strategies
and innovations that have been combined to
reinforce the separation between differing
systems. Numerous other defences lie in wait
to defeat potential threats.
and innovations that have been combined to
reinforce the separation between differing
systems. Numerous other defences lie in wait
to defeat potential threats.
The switching section is hard
wired to allow only one channel
to be selected at any time.
to be selected at any time.
Common keyboard, mouse and video
monitor are able to access multiple
monitor are able to access multiple
high security computers/networks,
safe in the knowledge that data
will not be transferred from one
to another, either by user error or
safe in the knowledge that data
will not be transferred from one
to another, either by user error or
subversive attack.
Video
USB