Contact Us
Language

Achieving air-tight cybersecurity with KVM -- GCN

tagsHdmi Splitter Arc Cec

Industry Insight

Cyber ​​attacks and data breaches occur every day-for government agencies and private sector organizations, the risk has never been higher. Data breach 

By 2020, it will increase by 273% in the first quarter of this year alone.

There are many technologies available for cyber threats, but hackers are innovating faster. After attackers enter the network, they will focus on finding more valuable assets while trying to hide their existence. This East-West attack vector is particularly troublesome because it is difficult to determine where the attackers are and what they have been exposed to.  

according to 

From 2019 to 2020, government departments have suffered 6,843 security incidents, of which 346 have been confirmed violations. The report pointed out that although there are many threat sources, other errors based on human factors are the causes.

As part of a broader network security defense strategy, agencies strive to isolate their networks and network assets to ensure that the most critical data will never be exposed to the public Internet and only those who are under strict control can access it. The air-gap network ensures that advanced signaling attacks that can damage desktop computers cannot be propagated to more sensitive systems because there is no route from one network to another. However, when peripheral equipment is shared between isolated systems, the air gap may be broken. Operators who need to access multiple systems to effectively perform their duties must handle multiple sets of redundant peripheral devices on their desks, otherwise they may introduce an attack path from the infected system to the secure system. 

An effective way to share peripherals while protecting the air gap isolation is to use a secure keyboard-video-mouse (KVM) switching device that allows government employees to move from a desktop to computers with various security levels. Switch between networks. These devices have been around for many years, but

Last year, the new version released by the National Information Assurance Partnership (National Information Assurance Partnership) drew new attention to secure peripheral switching equipment and allowed government agencies to reconsider how these tools benefit users. The new protection profile format in NIAP PP PSD 4.0 allows each of its modules to be independently updated or revised as needed, and the standard should be made more agile to cope with the rapid development of new vulnerability discovery and mitigation strategies.

The government is looking for solutions that meet the new standards and do not include user experience. Secure KVM protects critical network assets by maintaining isolation between channels, while improving the efficiency and effectiveness of operators when working across secure and non-secure systems on desktops. The agency deployed a secure KVM switch to allow a set of peripheral devices to be used on a set of different networks with different security levels to reduce desktop clutter, improve efficiency, and help save budgets by integrating desktop peripheral devices.

Most secure KVMs are built to support specific video standards, and large organizations may have three or more different computing platforms with various video interfaces. This makes it extremely difficult to properly manage secure KVM devices throughout the entire life cycle, imposing unnecessary burdens on the IT department, and ultimately wasting time and money. Safely and seamlessly accommodate KVMs of different video input/output formats, and the same KVM can be deployed across multiple users and deployment scenarios. 

Government agencies implement secure KVM solutions to prevent vulnerabilities on the desktop and maintain air gap isolation between secure and non-secure networks, while also providing efficient and flexible workspaces. By emphasizing user experience and prioritizing future-oriented technology solutions, agencies can provide stakeholders with limited compromises, thereby providing critical security. 

The threat is rising, and government data and computer systems have become the main targets of hostile foreign governments, terrorists and cybercriminals. Agents who purchase KVM equipment must carefully weigh all the safety and functional characteristics of these equipment to ensure that these equipment provide the safest, safest and user-friendly functions to prevent government assets from being damaged.

About the author

John Minasyan is the director of product management for Belkin's cybersecurity business unit.

More virtual collaborations can take place between peaks, between the stagnation of the digitization of archived records and the management of records in the data set, records management supervisors are dealing with new challenges.

The city has established cellular sites in government-owned facilities (such as the fire department and library) that are already connected to Tucson’s existing fiber optic backbone network.