Tripp Lite by Eaton (B002A-UH2AC2) KVM Switchbox
Tripp Lite by Eaton (B002A-UH2AC2) KVM Switchbox
Tripp Lite by Eaton B002A-UH2AC2
- Free Shipping
- 3 Year Garantía
- Devoluciones de 30 días
- Neutral en carbono
Características clave del producto.
- Safely and securely switches between 2 isolated computers with different security levels
- Safely and securely switches between 2 isolated computers with different security levels
- Certified to NIAP/Common Criteria Protection Profile for Peripheral Sharing Switches V3.0
- Certified to NIAP/Common Criteria Protection Profile for Peripheral Sharing Switches V3.0
- Common Access Card (CAC) port supports biometric and other smart card readers
Tripp Lite by Eaton (B002A-UH2AC2) KVM Switchbox
Tripp Lite by Eaton B002A-UH2AC2
- Free Shipping
- 3 Year Garantía
- Devoluciones de 30 días
- Neutral en carbono
Características clave del producto.
- Safely and securely switches between 2 isolated computers with different security levels
- Safely and securely switches between 2 isolated computers with different security levels
- Certified to NIAP/Common Criteria Protection Profile for Peripheral Sharing Switches V3.0
- Certified to NIAP/Common Criteria Protection Profile for Peripheral Sharing Switches V3.0
- Common Access Card (CAC) port supports biometric and other smart card readers
Productos ads
Tripp Lite by Eaton
B002A-UH2AC2
Features
2-Port HDMI KVM Switch Is Ideal for Applications That Demand Secure Networks
This two-port KVM switch is recommended for any government, military, financial or healthcare environment where tight security of sensitive data is of utmost importance in a world of constantly changing cyberthreats. Each KVM port is an electronically isolated channel, making it impossible for data to be transferred between connected computers through the KVM. The dual-monitor switch supports crystal-clear Ultra HD video resolutions up to 3840 x 2160 (4K x 2K) at 30 Hz.
NIAP PP3.0 Certified to Meet Today's Top Information Assurance Standards
This KVM switch is certified by NIAP (National Information Assurance Partnership), which is operated by the National Security Agency (NSA), to the latest Common Criteria Protection Profile for Peripheral Sharing Switches Version 3.0. Discrete processing paths to each connected system prevent data leakage, transfer and crosstalk between adjacent ports. Peripheral isolation enables data to flow from device to host only.
Top-of-the-Line Security Features Keep Your Data Safe
Special protection prevents re-programming of firmware, so the switch's KVM logic remains unaltered. The keyboard buffer clears automatically after data transmission, ensuring no information is left stored. Plus, you can only access connected computers via buttons on the switch's panel. Other port-switching methods, such as On-Screen Display (OSD) and Hotkey Commands, have been excluded to further ensure data integrity.
CAC Port Supports Biometric and Other Smart Card Readers
The Common Access Card port supports smart cards, scanners and biometric readers, including fingerprint readers, to bolster security. You may assign and register specific peripherals to the CAC port, providing a secure connection for user authentication.
Anti-Tampering Protection Prevents Physical Breeches
If the housing is opened, internal anti-tamper switches will disable the unit, causing it to become inoperable and the front-panel LEDs to flash repeatedly. Seals on the enclosure will provide visual evidence of tampering.
Maintains Constant Keyboard and Mouse Emulation for Smooth No-Delay Switching
Full USB device filtering ensures support for keyboard and mouse only. This KVM switch also supports secure video emulation and EDID learning, which prevents unwanted data from transmitting through the DDC lines. Both keyboard/mouse and video emulation controllers restrict discovery of newly connected peripherals or monitors during switching operations, shielding your computers from potential vulnerabilities.
TAA-Compliant for GSA Schedule Purchases
The B002A-UH2AC2 is compliant with the Federal Trade Agreements Act (TAA), which makes it eligible for GSA (General Services Administration) Schedule and other federal procurement contracts.
Typical Applications
- Control up to 2 computers with different security levels from a single monitor/keyboard/mouse
- Operate smart cards, scanners, fingerprint readers and other biometric devices via the CAC port
- Protect private information, such as medical or military intelligence data, from cyberattacks
System Requirements
- HDMI monitors
- Wired USB mouse/keyboard with no internal hub or composite device functions (wireless mouse/keyboard not supported)
- Computer with HDMI and USB ports (USB 2.0 required for CAC support)
- Computer and speakers with 3.5 mm stereo audio port (optional)
- Windows, Mac, Linux or any other major operating system
Return Policy |
Time to Return |
Standard Return Policy |
We offer a hassle-free 30-day returns policy for domestic (US) orders, excluding non-refundable items. Refund or Replacement within 30 days of the delivery date. All products that fall under the Standard Return Policy qualify for our 30-Day Hassle-Free Returns. Please see the section above for more details. |
Replacement Only Return Policy |
Replacement within 30 days of the delivery date. |
Manufacturer Only Return Policy |
Covered by the manufacturer's warranty. Please refer to the terms and conditions for the manufacturer's warranty or contact the manufacturer. |
Holiday Extended Return Policies |
Extended Holiday Return Policy.Qualifying purchases of products displaying the " Extended Holiday Return Policy ", from November 1st, 2023 to December 25, 2023, are eligible for a Refund or Replacement until January 31, 2024. Extended Holiday Replacement-Only Return PolicyQualifying purchases of products displaying the " Extended Holiday Replacement-Only Return Policy ", from November 1st, 2023 to December 25, 2023, are eligible for a Replacement until January 31, 2024. |