IHSE’s mission-critical KVM solutions - When uncompromising security is required (Sponsored)
This article is brought to you by IHSE
KVM stands for Keyboard, Video and Mouse, referring to the familiar workplace computer input and output devices. IHSE’s mission-critical system solutions extend the distance between the computer and peripheral devices (keyboard, monitor, mouse). Allowing users to select between different source devices to create more comfortable and efficient working environments and streamlined workflows.IHSE offers KVM products for the switching, sharing, extension and conversion of all types of computer signals, including analog and digital video and audio, USB and SDI video; applicable to all markets. Long distances are bridged by Cat X, fiber or mixed cabling, depending on security requirements and applications. IHSE KVM solutions stand for upmost security, preventing unauthorized access or injection of malware and guarding data security.
Protected computer access
IHSE’s Draco vario KVMA Isolated Secure Extender enables remote computer access in high-security environments that must meet stringent cyber security specifications – such as government, defense and critical infrastructure. Provisioned users can control multiple computers and systems using the same set of peripherals (keyboard, monitor, mouse) without exposing confidential data to attack. Extenders are equipped with specific shielding layers on both the hardware and integral firmware to prevent eavesdropping and signal detection from Radiofrequency (RF) Radiation. Restricted hardware access also protects from bulk data theft (e. g. via USB flash drive) or the injection of malware.
Common Criteria certified; NIAP PP4.0 and EAL4+ compliant
Developed in collaboration with security experts at HighSecLabs (HSL), the Draco vario KVMA Isolated Secure Extender is designed to meet the most stringent government and defense specifications. The devices comply with the highest IT security standards of the NIAP PP4.0 Common Criteria Protection Profile for Peripheral Sharing Devices version 4.0 and ISO/IEC 15408 Common Criteria (CC) EAL4+. This ensures up-to-date protection against data leakage.

Separation of Red and Black environments
The Draco vario KVMA Isolated Secure Extender allows provisioned users to select and control any computer located in the secured and access-restricted server room via the KVM matrix. Each connected Draco vario KVMA Isolated Secure Extender also acts as an isolator for the KVM system at the endpoints, keeping the integrity of the Secure Core KVM network intact. In combination with Draco tera KVM matrix switches and Draco vario extenders it is also possible to set up a secure combination of classified and unclassified endpoints. The IHSE KVM system enables precise user access rights management as required in government and defense installations with separated classified and unclassified environments.
High investment security
The system supports most current display resolutions and is already prepared for many future formats. This means that the Draco solution represents a long-lasting, high-ROI investment that will scale with user demands for many years to come.

Above: Draco vario KVMA Isolated Secure Extender
Total connectivity and flexible switching
Draco tera KVM matrix switches enable controlled access to (and management of) any size of computer installation. Sources can be accessed, switched and shared instantly by users. Any connected user console (consisting of keyboard, mouse, monitor or other peripherals) can access any computer within the network with defined access rights. Switches include comprehensive features such as multi-screen control and cross-conversion between AV signals and transmission media (Cat X and fiber). The Draco tera range extends from 8 to 576 non-blocking assignable ports. With mixed operation over copper and fiber cables the switches handle all types of computer signals including USB, audio and video (HD, 4K, 8K above). Draco tera is designed for 24/7 mission-critical operation with extensive redundancy features and hot-swap option of components. Users can instantaneously access any computer-based control and information system at the best possible video quality. Acting as Secure Core by design, the matrix provides a safe environment which is protected from cyber-attacks.
More from Industry Spotlights
-
Meeting the needs of tactical forces with innovative UAS for mission success (Sponsored)
With the growing global trend towards the use of UAS, Aeronautics is uniquely positioned as one of the leading companies in the world in that field
-
Multi-domain integration in the spotlight at AOC Europe 2023 (Sponsored)
Association of Old Crows (AOC) Europe heads to Bonn, Germany, in May 2023 to put ‘Multi-Domain Integration’ in the spotlight for the electromagnetic warfare (EW) community.
-
Disrupting enemy command and control (Sponsored Video)
With a multi-million dollar expansion in support of electronic warfare, BAE Systems is driving unparalleled enhancements to the EC-37B. Integrating our innovative Compass Call mission system into the platform enables warfighters to combat advanced threats and support special missions.
-
How to ensure ultimate fleet availability and performance over the entire lifecycle? (Sponsored)
Are you looking for a broad range service concept that ensures your fleets are always ready for critical operations with optimal costs? Patria has developed a modular service concept called Patria OPTIME, which covers air, land and sea domains. It is tailored to the customer needs and requirements and it is set up in phases together with the customer.
-
European military training shifts gear (Sponsored)
This article is brought to you by Clarion Events As the international training and simulation market reconvenes in Rotterdam, the Netherlands, for IT²EC 2023 later …
-
Changing the game of the modern battlefield (Sponsored)
Tactical forces today increasingly require autonomy in the field. The Orbiter 4 STUAS meets this need.