IHSE’s mission-critical KVM solutions - When uncompromising security is required (Sponsored)
This article is brought to you by IHSE
KVM stands for Keyboard, Video and Mouse, referring to the familiar workplace computer input and output devices. IHSE’s mission-critical system solutions extend the distance between the computer and peripheral devices (keyboard, monitor, mouse). Allowing users to select between different source devices to create more comfortable and efficient working environments and streamlined workflows.IHSE offers KVM products for the switching, sharing, extension and conversion of all types of computer signals, including analog and digital video and audio, USB and SDI video; applicable to all markets. Long distances are bridged by Cat X, fiber or mixed cabling, depending on security requirements and applications. IHSE KVM solutions stand for upmost security, preventing unauthorized access or injection of malware and guarding data security.
Protected computer access
IHSE’s Draco vario KVMA Isolated Secure Extender enables remote computer access in high-security environments that must meet stringent cyber security specifications – such as government, defense and critical infrastructure. Provisioned users can control multiple computers and systems using the same set of peripherals (keyboard, monitor, mouse) without exposing confidential data to attack. Extenders are equipped with specific shielding layers on both the hardware and integral firmware to prevent eavesdropping and signal detection from Radiofrequency (RF) Radiation. Restricted hardware access also protects from bulk data theft (e. g. via USB flash drive) or the injection of malware.
Common Criteria certified; NIAP PP4.0 and EAL4+ compliant
Developed in collaboration with security experts at HighSecLabs (HSL), the Draco vario KVMA Isolated Secure Extender is designed to meet the most stringent government and defense specifications. The devices comply with the highest IT security standards of the NIAP PP4.0 Common Criteria Protection Profile for Peripheral Sharing Devices version 4.0 and ISO/IEC 15408 Common Criteria (CC) EAL4+. This ensures up-to-date protection against data leakage.

Separation of Red and Black environments
The Draco vario KVMA Isolated Secure Extender allows provisioned users to select and control any computer located in the secured and access-restricted server room via the KVM matrix. Each connected Draco vario KVMA Isolated Secure Extender also acts as an isolator for the KVM system at the endpoints, keeping the integrity of the Secure Core KVM network intact. In combination with Draco tera KVM matrix switches and Draco vario extenders it is also possible to set up a secure combination of classified and unclassified endpoints. The IHSE KVM system enables precise user access rights management as required in government and defense installations with separated classified and unclassified environments.
High investment security
The system supports most current display resolutions and is already prepared for many future formats. This means that the Draco solution represents a long-lasting, high-ROI investment that will scale with user demands for many years to come.

Above: Draco vario KVMA Isolated Secure Extender
Total connectivity and flexible switching
Draco tera KVM matrix switches enable controlled access to (and management of) any size of computer installation. Sources can be accessed, switched and shared instantly by users. Any connected user console (consisting of keyboard, mouse, monitor or other peripherals) can access any computer within the network with defined access rights. Switches include comprehensive features such as multi-screen control and cross-conversion between AV signals and transmission media (Cat X and fiber). The Draco tera range extends from 8 to 576 non-blocking assignable ports. With mixed operation over copper and fiber cables the switches handle all types of computer signals including USB, audio and video (HD, 4K, 8K above). Draco tera is designed for 24/7 mission-critical operation with extensive redundancy features and hot-swap option of components. Users can instantaneously access any computer-based control and information system at the best possible video quality. Acting as Secure Core by design, the matrix provides a safe environment which is protected from cyber-attacks.
More from Industry Spotlights
-
How can you own the sky?
With an unparalleled range of solutions, RTX is equipping pilots with a distinct advantage, before the mission even begins.
-
Patria's 6x6: protecting the eyes and ears of the battlefield
Troops are more than boots on the ground — they’re an army’s eyes and ears. Wherever the mission leads, they must get there safely. Patria’s 6x6 delivers protected, dependable mobility — without compromise.
-
Tactical UAS: mission-driven innovation for a new battlefield era
As global conflicts evolve and the limitations of traditional UAS become clear, Aeronautics is redefining the tactical unmanned aerial systems space with platforms that prioritize survivability, flexibility, and mission effectiveness.
-
Managing risk in a changing world: how the Royal Navy can win
A fighting force such as the Royal Navy must inevitably focus on its core capabilities, platforms and readiness. But to avoid unexpected outcomes and costly oversights, a complex organisation like this needs to be underpinned by sound enterprise-level risk management principles and systems.
-
Delivering battlefield connectivity, empowering the warfighter, increasing lethality
As the British Army and allied militaries look to increase their resilience to electronic warfare, they will require unprecedented access to the latest communication capabilities – like software-defined radios, LEO, 5G – to be successful in today’s advanced and dynamic combat fighting environment. Enter MESHnet.