Transcript
HSL SECURE KVM COMBINERS THE
Simultaneously interact with multiple computers on the same screen
1
THE NEED
S E C U R E K V M CO M B I N E R S
Command & Control
Demanding environments require real-time presentation of information from isolated computers on the same display
Military & Defense
Mobile Command & Control
2
WHAT IS A KVM COMBINER SWITCH?
S E C U R E K V M CO M B I N E R S
Move mouse to switch PCs
Combiner is a Secure KVM switch which allows to simultaneously interact with and present multiple computers from different security classifications on a single display while keeping the data of each source completely separate.
PC #4 PC #2 PC #3
Multiple Sources
PC #1 #1
Single Keyboard & Mouse
SECURE KVM COMBINER
#2
#3
#4
3
COMBINER VERSATILE VIEW MODES (PRESETS)
S E C U R E K V M CO M B I N E R S
What are view modes?
• View modes determine how multiple sources are presented on the combiner’s screen.
• Versatile view modes allow various presentation layouts (Tile, Scale, Custom…etc.).
• Simple switching allow the user to change view setting ‘on-the-fly’ to
instantly fit with any work scenario. The user can switch between all presets at all times with a click of a mouse.
• Custom view modes can be saved to preset any layout desired by the user for future work.
4
COMBINER VERSATILE VIEW MODES (PRESETS)
S E C U R E K V M CO M B I N E R S
Tile Mode Example:
• In Tile mode all sources are spread equally on the screen, the user can independently interact with each source and enlarge any given source to maximum screen size by clicking on it.
Demo Video Click to Enlarge
Setup
Channel 1
1
2
3
4
Channel 2
Channel 3 Channel 4
1
2
3
?
Scale
3 Tile
Setup
Channel 1
Channel 2
2
1 Channel 3 Channel 4
1
2
4 3
?
Scale
Tile
5
COMBINER VERSATILE VIEW MODES (PRESETS)
S E C U R E K V M CO M B I N E R S
Scale Mode Example:
• In Scale mode the user can interact with all sources while one source is enlarged and others are
aligned vertically on the right screen side. Switch between the enlarged source by clicking on the aligned source.
Demo Video Click to Enlarge 2 3 4
1 Setup
Channel 1
Channel 2
Channel 3 Channel 4
1
2
3
?
Scale
Tile
1 3 4
2 Setup
Channel 1
Channel 2
Channel 3 Channel 4
1
2
3
?
Scale
Tile
6
COMBINER VERSATILE VIEW MODES (PRESETS)
S E C U R E K V M CO M B I N E R S
Custom Mode Example:
• In Custom mode the user can interact with all sources, rearrange screens layout and position according to his need and save the sources preset for future use.
Demo Video Rearrange and Position screens as you want
1 Setup
Channel 1
3
2 Channel 2
Channel 3 Channel 4
2
4 1
2
3
?
Scale
Tile
1 3 4
Setup
Channel 1
Channel 2
Channel 3 Channel 4
1
2
3
?
Scale
Tile
CURSOR NAVIGATION
7
VIRTUAL DISPLAY TECHNOLOGY (VDT)
S E C U R E K V M CO M B I N E R S
• Switch from one highly isolated computer system to another by simply moving the mouse cursor across display borders
Drag mouse between screen boarders
• No need to push any buttons • Audio and keyboard follow the mouse as its cursor crosses the display borders
Screen border Mouse cursor movement path
PERIPHERAL PORT (fUSB)
8
FOR SHARING AUTHENTICATION DEVICES AND MORE
S E C U R E K V M CO M B I N E R S
What is fUSB? USB port which is preconfigured to allow only USB • Dedicated authentication devices such as smartcard & biometric readers. functionality can be further enhanced by allowing an • fUSB administrator to explicitly enable a uniquely identified USB device. device approval / denial indication LED shows whether the • USB connected device is permitted for use. channel assignment LED indicates which source has • fUSB current access to the USB device. fUSB port switching. • Dynamic fUSB is automatically switched
Primary Display
between sources together with the keyboard and mouse.
Authentication / Explicitly Approved USB Devices
Approved USB Device
Biometric Reader Smart-Card Reader
1
Secondary Display
fUSB
Computers
?
fUSB option allows • Freeze locking the USB device to a
specific channel, preventing it from switching automatically.
Keyboard
Mouse
Audio
2
3
4
9
COMBINER HIGHLIGHTS
S E C U R E K V M CO M B I N E R S
with multipule computers • Interact simultaneously Connect up to six computers and two displays to the KVM Combiner. User can interact with all computers at the same time using a single set of keyboard and mouse.
screen layout options • Flexible Split the screen to display multiple sources on the same display. Resize source scaling and aspect ratio to create Tile, Scale and Custom display layouts that fit user needs.
& Extend view modes • Duplicate Provide flexible presentation options to fit any meeting / control room use case scenario.
touch screen support • Native Touch screen support allows interacting with all connected computers using touch screen gestures.
Display Technology (VDT) • Virtual Seamlessly switch between the selected sources by moving the mouse cursor across screen boarders. Audio is switched automatically once control is switched to another source.
cascading • Combiner Cascade combiners to view and control up to 36 sources on a single display, using one set of keyboard, mouse and audio. Expand any source to full screen. Keep all combiner-features throughout the cascaded chain (View modes, VDT…etc.).
10
COMBINER HIGHLIGHTS - SECURITY
S E C U R E K V M CO M B I N E R S
security by design • Highest Common Criteria EAL 4+ approved, compatible with NIAP security requirements.
freely without compromising security • Work Display and control classified and non-classified computers without compromising security. Computers and peripherals are fully isolated from each other.
reader support • Biometric/Smart-Card Connect a smartcard/biometric reader to the combiner’s fUSB secure port to support user authentication across multiple isolated computers.
11
COMBINER ADVANTAGES VS. MULTIPLE-DISPLAY SETUP
S E C U R E K V M CO M B I N E R S
VS Multiple Displays
Combiner
Feature Multiple Displays: Information from each source is displayed on a separate screen Combiner: Information from several isolated computers is seamlessly integrated on the same display in real-time Multiple Displays: The size of each PC screen is limited by the available free space on the user’s desk Combiner: Use one big screen instead of multiple small screens to better watch content on a Big & Wide Screen Multiple Displays: Requires connecting a dedicated touch screen to each PC. Combiner: Connect a touch enabled screen and get native touch screen support with all connected computers Multiple Displays: The user is required to push KM Switch buttons (or use multiple sets of keyboards, mouse and speakers) in order to switch the mouse, keyboard and audio between computers Combiner: Switch the mouse, keyboard and audio from one computer to another by simply moving the mouse cursor across display borders on the same screen Multiple Displays: No layout options. Screen alignment is derived from the physical monitor size and layout Combiner: Support of multiple screen layout options (tile/scale/custom) to best fit any use case scenario
Multiple Combiner Displays
✘
✔
✘
✔
✘
✔
✘
✔
✘
✔
12
COMBINER MODELS
S E C U R E K V M CO M B I N E R S
Model
K424F
K424H
K426E
K426H
# of sources (inputs)
4
4
6
6
# of projected displays (output)
2
2
2
2
Up to HD Resolutions (1920 X 1200 pixels)
Computers (input) video Console (output) video
Up to HD Resolutions (1920 X 1200 pixels)
Up to 4K-2K Ultra HD Resolutions (3840 X 2160 pixels)
Up to HD Resolutions (1920 X 1200 pixels)
Up to 4K-2K Ultra HD Resolutions (3840 X 2160 pixels)
USB & PS/2
Keyboard & mouse ports USB Peripheral Port (fUSB)
✓
✓
✓
✓
Touch screen support
✓
✓
✓
✓
Natural Windows Scaling
✓
✓
✓
✓
# of customized presets
4 (including Tile) Unique Features: • Designed for comman d & control and any other environment requiring real time monit oring of multiple displays • An attractive alternati ve to Video wall controllers • Touch screen support • Flexible Windows-like GUI • Cursor navigation be tween sources
13
SPECIAL COMBINER MODELS
S E C U R E K V M CO M B I N E R S
2 Sources to 6 Displays
Coming Soon!
Displays
Computers
1
CAC
RDC
1
1
1
1
2
Audio
2
Keyboard
4 Sources to 4 Displays
Mouse
Displays
2
1
3
Computers CAC
1
2
3
4
RDC
4
Keyboard
Mouse
Audio
14
COMBINER CASCADING
S E C U R E K V M CO M B I N E R S
• Cascade combiners to view and control up to 36 sources on a single display, using one set of keyboard, mouse and audio.
• Keep all combiner-features throughout the cascaded chain (View modes, VDT…etc.)
• Native touchscreen support across all sources. • Independently resize and rearrange the screen layouts of each source. • Expand any source to full screen. • Support RS232 commands for easy screen layout switching programming.
15
COMBINER CASCADING
S E C U R E K V M CO M B I N E R S
Cascade combiners to view and control up to 36 sources on a single display, using one set of keyboard, mouse and audio.
Child Combiner 1
Child Combiner 2 #1
#4
Child Combiner 4
Master Combiner
#2
#3
#4
Child Combiner 4 #1
Child Combiner 2
Single Keyboard & Mouse
#1 #3
Child Combiner 3
Child Combiner 1
Child Combiner 3
#2
#2
#1 #3
#4
#2
#3
#4
16
COMBINER CASCADING
S E C U R E K V M CO M B I N E R S
Independently resize and rearrange the screen layouts of each source.
Child Combiner 1
Child Combiner 2 #1
#2
#1 #3
#4
Child Combiner 3
Scale View
Scale View
Quad View
Single Keyboard & Mouse
Master Combiner
#3
#4
Child Combiner 4 #1
Custom View
#2
#2
#1 #3
#4
#2
#3
#4
17
COMBINER CASCADING
S E C U R E K V M CO M B I N E R S
Child Combiner 1
e#
f 1o
c
c h ild
o m bi
n e r # 1 to f u ll s c r e e n #1
#2
Child Combiner 2 #3
#4
#1
#2
#3
#4
Exp
an
ds
ou
rc
Expand any source to full screen.
Child Combiner 3
Child Combiner 1
#1
Expand source #1 of child combiner #1 to full screen.
Child Combiner 2
Child Combiner 3
Child Combiner 4
Single Keyboard & Mouse
Master Combiner
#2
Child Combiner 4 #1
#3
#4
#2
#3
#4
18
COMBINER CASCADING
S E C U R E K V M CO M B I N E R S Child Combiner 1
ou
e#
1o
ild f ch
co m
bi n er # 1
to f u l l s c r e e n
# 1 o f m a s te r r ce u so ul l s c r e e n to f r e
#1
#2
Exp
an
d com bin
ds an
Exp
•
Expand source #1 of child combiner #1 to full screen.
rc
Expand any source to full screen.
Child Combiner 2 #3
#4
#1
Child Combiner 3 #1
• Expand source #1 of master combiner to full screen
Single Keyboard & Mouse
Master Combiner
#2
#2
#3
#4
Child Combiner 4 #1
#3
#4
#2
#3
#4
19
FAQs
S E C U R E K V M CO M B I N E R S
• What is the difference between KVM and Combiner?
KVM’s are designed to switch displays, allowing the user to only see and manage one target device at a time. Combiner allows the user to securely interact with multiple sources simultaneously. The Combiner uses advanced video processing technology to draw a high resolution dynamic “mosaic” of images generated by different sources.
• Is the Combiner as secure as Secure KVM switches? Yes. The Combiner is a derivative of HSL Secure KVM product line, and is equipped with the same high security features: Active Always-On Anti-Tampering, Heavy-Duty Tamper-Resistant Enclosure, Tamper Evident Label, Unidirectional Data Paths, Dedicated Processors for Emulation, USB Port Protection, NonReprogrammable Firmware, Tamper-Proof Hardware, and more.
• Can the Combiner scale video input?
Yes, The HSL Combiner has an advanced scaling function allowing the user to scale the video source to ensure proper viewing and superb work experience. A user can now fit four full HD sources on a single or dual HD or UHD screen by scaling each source, all in real time with no data loss. In addition, natural Windows scaling and touch screen are supported, so the user can scale freely various sources and also them as one of the predefined Presets.
it possible to use a mouse other than the mouse • Issupplied with the HSL Combiner? It is recommended to use the mouse supplied with the HSL Combiner but if another type of mouse is used, it must be a five-button mouse, with a recommended mouse DPI of 5400 for best performance.
20
KEYBOARD AND MOUSE THREATS
S E C U R E K V M CO M B I N E R S
#
Attack Type
Vulnerability
Risk
Signal/Virus
• Programmable components may include malicious code and are vulnerable to manipulation. • May include memory chips that can store data • Bi-directional keys (Num Lock, Scroll Lock, Cap Lock, Pause Break) can be used to send and decode data between systems
Data leakage from one system to another
Solution Components
Solution Highlights
Unidirectional Optical Data Diodes
üü Allowing data to flow only in one direction, from the device- to-host computer. üü Preventing host-to-peripheral data flow eliminates data leakage through the shared peripheral. üü Preventing host-to-host connectivity isolates all hosts from each other.
Hardware-based Peripheral Isolation per Port
üü Each port is fully isolated from other ports.
Hardcoded HID Filter
üü Accepts only USB HID Devices (Keyboard & Mice) rules out others. üü Hardcoded ASCII keyboard / mice characters. üü Incapable of processing any other code than HID-ASCII.
21
AUDIO THREATS
S E C U R E K V M CO M B I N E R S
#
Attack Type
Vulnerability
Risk
Signal/Virus/Hot Microphone
• Programmable components may include malicious code and are vulnerable to manipulation. • Manipulated sound card can reprogram a speaker into a microphone to act as an audio reception tool (e.g. microphone).
Data leakage and eavesdropping
Solution Components
Solution Highlights
Unidirectional Diodes
üü Allow sound to travel only in one direction from the PC to the speaker. üü Prevent re-tasking of the audio line-in (headset/speaker) into a microphone line and thus block eavesdropping attempts by reprograming a speaker to act as an audio reception tool (e.g. microphone).
22
USB THREATS
S E C U R E K V M CO M B I N E R S
#
Attack Type
Vulnerability
Risk
Virus
• Highly popular standard commonly used by computer and mobile users. • Provides on-the-fly high speed, bidirectional flow of data to and from the computer. • Multifunctional port: numerous device types can connect through the same physical port • Programmable components may include malicious code and are vulnerable to manipulation. • Can be used to store/inject data.
Data leakage from one system to another
Solution Components
Solution Highlights
Block un-authorized USB
üü Completely block and disable unauthorized USB devices and traffic
Secure & Dedicated Keyboard / Mouse Ports
üü Accepts only USB HID Devices (Keyboard & Mice) rules out others üü Refer to Keyboard & Mouse threats table for additional information
Biometric/Smart-Card reader support
üü Special secured port (fUSB) for smart-card/biometric reader with patented Freeze function to support user authentication across multiple isolated networks.
23
HARDWARE & FIRMWARE TAMPERING THREATS
S E C U R E K V M CO M B I N E R S
#
Attack Type
Vulnerability
Risk
Firmware Reprogramming / Implant malicious hardware
• Open product and implant malicious hardware. • Attempt to reprogram firmware components to include malicious code. • Attempt to store/inject data.
Data leakage and eavesdropping
Solution Components
Solution Highlights
Tamper-proof electrical design
üü Firmware is stored on ROM (Read Only Memory) üü One-Time-Programmable (OTP) Microprocessors preventing firmware tampering/ rewrite
No Memory buffers
üü Peripheral signals are passed-through, with no data stored inside products
Always-ON tamper evident system
üü Internal: Tampering with product chassis triggers a switch that renders product inoperable. This is indicated to user via a specific LED behavior. üü External: Serialized holographic labels provide visual indication of any tampering attempt and warning labels are place on product chassis
THANK YOU For more information, please visit www.highseclabs.com