Preview only show first 10 pages with watermark. For full document please download

The Hsl - Highseclabs

   EMBED


Share

Transcript

HSL SECURE KVM COMBINERS THE Simultaneously interact with multiple computers on the same screen 1 THE NEED S E C U R E K V M CO M B I N E R S Command & Control Demanding environments require real-time presentation of information from isolated computers on the same display Military & Defense Mobile Command & Control 2 WHAT IS A KVM COMBINER SWITCH? S E C U R E K V M CO M B I N E R S Move mouse to switch PCs Combiner is a Secure KVM switch which allows to simultaneously interact with and present multiple computers from different security classifications on a single display while keeping the data of each source completely separate. PC #4 PC #2 PC #3 Multiple Sources PC #1 #1 Single Keyboard & Mouse SECURE KVM COMBINER #2 #3 #4 3 COMBINER VERSATILE VIEW MODES (PRESETS) S E C U R E K V M CO M B I N E R S What are view modes? • View modes determine how multiple sources are presented on the combiner’s screen. • Versatile view modes allow various presentation layouts (Tile, Scale, Custom…etc.). • Simple switching allow the user to change view setting ‘on-the-fly’ to instantly fit with any work scenario. The user can switch between all presets at all times with a click of a mouse. • Custom view modes can be saved to preset any layout desired by the user for future work. 4 COMBINER VERSATILE VIEW MODES (PRESETS) S E C U R E K V M CO M B I N E R S Tile Mode Example: • In Tile mode all sources are spread equally on the screen, the user can independently interact with each source and enlarge any given source to maximum screen size by clicking on it. Demo Video Click to Enlarge Setup Channel 1 1 2 3 4 Channel 2 Channel 3 Channel 4 1 2 3 ? Scale 3 Tile Setup Channel 1 Channel 2 2 1 Channel 3 Channel 4 1 2 4 3 ? Scale Tile 5 COMBINER VERSATILE VIEW MODES (PRESETS) S E C U R E K V M CO M B I N E R S Scale Mode Example: • In Scale mode the user can interact with all sources while one source is enlarged and others are aligned vertically on the right screen side. Switch between the enlarged source by clicking on the aligned source. Demo Video Click to Enlarge 2 3 4 1 Setup Channel 1 Channel 2 Channel 3 Channel 4 1 2 3 ? Scale Tile 1 3 4 2 Setup Channel 1 Channel 2 Channel 3 Channel 4 1 2 3 ? Scale Tile 6 COMBINER VERSATILE VIEW MODES (PRESETS) S E C U R E K V M CO M B I N E R S Custom Mode Example: • In Custom mode the user can interact with all sources, rearrange screens layout and position according to his need and save the sources preset for future use. Demo Video Rearrange and Position screens as you want 1 Setup Channel 1 3 2 Channel 2 Channel 3 Channel 4 2 4 1 2 3 ? Scale Tile 1 3 4 Setup Channel 1 Channel 2 Channel 3 Channel 4 1 2 3 ? Scale Tile CURSOR NAVIGATION 7 VIRTUAL DISPLAY TECHNOLOGY (VDT) S E C U R E K V M CO M B I N E R S • Switch from one highly isolated computer system to another by simply moving the mouse cursor across display borders Drag mouse between screen boarders • No need to push any buttons • Audio and keyboard follow the mouse as its cursor crosses the display borders Screen border Mouse cursor movement path PERIPHERAL PORT (fUSB) 8 FOR SHARING AUTHENTICATION DEVICES AND MORE S E C U R E K V M CO M B I N E R S What is fUSB? USB port which is preconfigured to allow only USB • Dedicated authentication devices such as smartcard & biometric readers. functionality can be further enhanced by allowing an • fUSB administrator to explicitly enable a uniquely identified USB device. device approval / denial indication LED shows whether the • USB connected device is permitted for use. channel assignment LED indicates which source has • fUSB current access to the USB device. fUSB port switching. • Dynamic fUSB is automatically switched Primary Display between sources together with the keyboard and mouse. Authentication / Explicitly Approved USB Devices Approved USB Device Biometric Reader Smart-Card Reader 1 Secondary Display fUSB Computers ? fUSB option allows • Freeze locking the USB device to a specific channel, preventing it from switching automatically. Keyboard Mouse Audio 2 3 4 9 COMBINER HIGHLIGHTS S E C U R E K V M CO M B I N E R S with multipule computers • Interact simultaneously Connect up to six computers and two displays to the KVM Combiner. User can interact with all computers at the same time using a single set of keyboard and mouse. screen layout options • Flexible Split the screen to display multiple sources on the same display. Resize source scaling and aspect ratio to create Tile, Scale and Custom display layouts that fit user needs. & Extend view modes • Duplicate Provide flexible presentation options to fit any meeting / control room use case scenario. touch screen support • Native Touch screen support allows interacting with all connected computers using touch screen gestures. Display Technology (VDT) • Virtual Seamlessly switch between the selected sources by moving the mouse cursor across screen boarders. Audio is switched automatically once control is switched to another source. cascading • Combiner Cascade combiners to view and control up to 36 sources on a single display, using one set of keyboard, mouse and audio. Expand any source to full screen. Keep all combiner-features throughout the cascaded chain (View modes, VDT…etc.). 10 COMBINER HIGHLIGHTS - SECURITY S E C U R E K V M CO M B I N E R S security by design • Highest Common Criteria EAL 4+ approved, compatible with NIAP security requirements. freely without compromising security • Work Display and control classified and non-classified computers without compromising security. Computers and peripherals are fully isolated from each other. reader support • Biometric/Smart-Card Connect a smartcard/biometric reader to the combiner’s fUSB secure port to support user authentication across multiple isolated computers. 11 COMBINER ADVANTAGES VS. MULTIPLE-DISPLAY SETUP S E C U R E K V M CO M B I N E R S VS Multiple Displays Combiner Feature Multiple Displays: Information from each source is displayed on a separate screen Combiner: Information from several isolated computers is seamlessly integrated on the same display in real-time Multiple Displays: The size of each PC screen is limited by the available free space on the user’s desk Combiner: Use one big screen instead of multiple small screens to better watch content on a Big & Wide Screen Multiple Displays: Requires connecting a dedicated touch screen to each PC. Combiner: Connect a touch enabled screen and get native touch screen support with all connected computers Multiple Displays: The user is required to push KM Switch buttons (or use multiple sets of keyboards, mouse and speakers) in order to switch the mouse, keyboard and audio between computers Combiner: Switch the mouse, keyboard and audio from one computer to another by simply moving the mouse cursor across display borders on the same screen Multiple Displays: No layout options. Screen alignment is derived from the physical monitor size and layout Combiner: Support of multiple screen layout options (tile/scale/custom) to best fit any use case scenario Multiple Combiner Displays ✘ ✔ ✘ ✔ ✘ ✔ ✘ ✔ ✘ ✔ 12 COMBINER MODELS S E C U R E K V M CO M B I N E R S Model K424F K424H K426E K426H # of sources (inputs) 4 4 6 6 # of projected displays (output) 2 2 2 2 Up to HD Resolutions (1920 X 1200 pixels) Computers (input) video Console (output) video Up to HD Resolutions (1920 X 1200 pixels) Up to 4K-2K Ultra HD Resolutions (3840 X 2160 pixels) Up to HD Resolutions (1920 X 1200 pixels) Up to 4K-2K Ultra HD Resolutions (3840 X 2160 pixels) USB & PS/2 Keyboard & mouse ports USB Peripheral Port (fUSB) ✓ ✓ ✓ ✓ Touch screen support ✓ ✓ ✓ ✓ Natural Windows Scaling ✓ ✓ ✓ ✓ # of customized presets 4 (including Tile) Unique Features: • Designed for comman d & control and any other environment requiring real time monit oring of multiple displays • An attractive alternati ve to Video wall controllers • Touch screen support • Flexible Windows-like GUI • Cursor navigation be tween sources 13 SPECIAL COMBINER MODELS S E C U R E K V M CO M B I N E R S 2 Sources to 6 Displays Coming Soon! Displays Computers 1 CAC RDC 1 1 1 1 2 Audio 2 Keyboard 4 Sources to 4 Displays Mouse Displays 2 1 3 Computers CAC 1 2 3 4 RDC 4 Keyboard Mouse Audio 14 COMBINER CASCADING S E C U R E K V M CO M B I N E R S • Cascade combiners to view and control up to 36 sources on a single display, using one set of keyboard, mouse and audio. • Keep all combiner-features throughout the cascaded chain (View modes, VDT…etc.) • Native touchscreen support across all sources. • Independently resize and rearrange the screen layouts of each source. • Expand any source to full screen. • Support RS232 commands for easy screen layout switching programming. 15 COMBINER CASCADING S E C U R E K V M CO M B I N E R S Cascade combiners to view and control up to 36 sources on a single display, using one set of keyboard, mouse and audio. Child Combiner 1 Child Combiner 2 #1 #4 Child Combiner 4 Master Combiner #2 #3 #4 Child Combiner 4 #1 Child Combiner 2 Single Keyboard & Mouse #1 #3 Child Combiner 3 Child Combiner 1 Child Combiner 3 #2 #2 #1 #3 #4 #2 #3 #4 16 COMBINER CASCADING S E C U R E K V M CO M B I N E R S Independently resize and rearrange the screen layouts of each source. Child Combiner 1 Child Combiner 2 #1 #2 #1 #3 #4 Child Combiner 3 Scale View Scale View Quad View Single Keyboard & Mouse Master Combiner #3 #4 Child Combiner 4 #1 Custom View #2 #2 #1 #3 #4 #2 #3 #4 17 COMBINER CASCADING S E C U R E K V M CO M B I N E R S Child Combiner 1 e# f 1o c c h ild o m bi n e r # 1 to f u ll s c r e e n #1 #2 Child Combiner 2 #3 #4 #1 #2 #3 #4 Exp an ds ou rc Expand any source to full screen. Child Combiner 3 Child Combiner 1 #1 Expand source #1 of child combiner #1 to full screen. Child Combiner 2 Child Combiner 3 Child Combiner 4 Single Keyboard & Mouse Master Combiner #2 Child Combiner 4 #1 #3 #4 #2 #3 #4 18 COMBINER CASCADING S E C U R E K V M CO M B I N E R S Child Combiner 1 ou e# 1o ild f ch co m bi n er # 1 to f u l l s c r e e n # 1 o f m a s te r r ce u so ul l s c r e e n to f r e #1 #2 Exp an d com bin ds an Exp • Expand source #1 of child combiner #1 to full screen. rc Expand any source to full screen. Child Combiner 2 #3 #4 #1 Child Combiner 3 #1 • Expand source #1 of master combiner to full screen Single Keyboard & Mouse Master Combiner #2 #2 #3 #4 Child Combiner 4 #1 #3 #4 #2 #3 #4 19 FAQs S E C U R E K V M CO M B I N E R S • What is the difference between KVM and Combiner? KVM’s are designed to switch displays, allowing the user to only see and manage one target device at a time. Combiner allows the user to securely interact with multiple sources simultaneously. The Combiner uses advanced video processing technology to draw a high resolution dynamic “mosaic” of images generated by different sources. • Is the Combiner as secure as Secure KVM switches? Yes. The Combiner is a derivative of HSL Secure KVM product line, and is equipped with the same high security features: Active Always-On Anti-Tampering, Heavy-Duty Tamper-Resistant Enclosure, Tamper Evident Label, Unidirectional Data Paths, Dedicated Processors for Emulation, USB Port Protection, NonReprogrammable Firmware, Tamper-Proof Hardware, and more. • Can the Combiner scale video input? Yes, The HSL Combiner has an advanced scaling function allowing the user to scale the video source to ensure proper viewing and superb work experience. A user can now fit four full HD sources on a single or dual HD or UHD screen by scaling each source, all in real time with no data loss. In addition, natural Windows scaling and touch screen are supported, so the user can scale freely various sources and also them as one of the predefined Presets. it possible to use a mouse other than the mouse • Issupplied with the HSL Combiner? It is recommended to use the mouse supplied with the HSL Combiner but if another type of mouse is used, it must be a five-button mouse, with a recommended mouse DPI of 5400 for best performance. 20 KEYBOARD AND MOUSE THREATS S E C U R E K V M CO M B I N E R S # Attack Type Vulnerability Risk Signal/Virus • Programmable components may include malicious code and are vulnerable to manipulation. • May include memory chips that can store data • Bi-directional keys (Num Lock, Scroll Lock, Cap Lock, Pause Break) can be used to send and decode data between systems Data leakage from one system to another Solution Components Solution Highlights Unidirectional Optical Data Diodes üü Allowing data to flow only in one direction, from the device- to-host computer. üü Preventing host-to-peripheral data flow eliminates data leakage through the shared peripheral. üü Preventing host-to-host connectivity isolates all hosts from each other. Hardware-based Peripheral Isolation per Port üü Each port is fully isolated from other ports. Hardcoded HID Filter üü Accepts only USB HID Devices (Keyboard & Mice) rules out others. üü Hardcoded ASCII keyboard / mice characters. üü Incapable of processing any other code than HID-ASCII. 21 AUDIO THREATS S E C U R E K V M CO M B I N E R S # Attack Type Vulnerability Risk Signal/Virus/Hot Microphone • Programmable components may include malicious code and are vulnerable to manipulation. • Manipulated sound card can reprogram a speaker into a microphone to act as an audio reception tool (e.g. microphone). Data leakage and eavesdropping Solution Components Solution Highlights Unidirectional Diodes üü Allow sound to travel only in one direction from the PC to the speaker. üü Prevent re-tasking of the audio line-in (headset/speaker) into a microphone line and thus block eavesdropping attempts by reprograming a speaker to act as an audio reception tool (e.g. microphone). 22 USB THREATS S E C U R E K V M CO M B I N E R S # Attack Type Vulnerability Risk Virus • Highly popular standard commonly used by computer and mobile users. • Provides on-the-fly high speed, bidirectional flow of data to and from the computer. • Multifunctional port: numerous device types can connect through the same physical port • Programmable components may include malicious code and are vulnerable to manipulation. • Can be used to store/inject data. Data leakage from one system to another Solution Components Solution Highlights Block un-authorized USB üü Completely block and disable unauthorized USB devices and traffic Secure & Dedicated Keyboard / Mouse Ports üü Accepts only USB HID Devices (Keyboard & Mice) rules out others üü Refer to Keyboard & Mouse threats table for additional information Biometric/Smart-Card reader support üü Special secured port (fUSB) for smart-card/biometric reader with patented Freeze function to support user authentication across multiple isolated networks. 23 HARDWARE & FIRMWARE TAMPERING THREATS S E C U R E K V M CO M B I N E R S # Attack Type Vulnerability Risk Firmware Reprogramming / Implant malicious hardware • Open product and implant malicious hardware. • Attempt to reprogram firmware components to include malicious code. • Attempt to store/inject data. Data leakage and eavesdropping Solution Components Solution Highlights Tamper-proof electrical design üü Firmware is stored on ROM (Read Only Memory) üü One-Time-Programmable (OTP) Microprocessors preventing firmware tampering/ rewrite No Memory buffers üü Peripheral signals are passed-through, with no data stored inside products Always-ON tamper evident system üü Internal: Tampering with product chassis triggers a switch that renders product inoperable. This is indicated to user via a specific LED behavior. üü External: Serialized holographic labels provide visual indication of any tampering attempt and warning labels are place on product chassis THANK YOU For more information, please visit www.highseclabs.com