Emerson Network Power recently worked with the National Information Assurance Partnership (NIAP) to update NIAP’s protection profile 3.0 for peripheral sharing switches. Building on this work with NIAP, Emerson Network Power today introduced a line of new secure KVM (keyboard, video, mouse) and KM (keyboard, mouse) switches designed to meet the new protection profile. In high-security environments, the Emerson portfolio of IT management solutions helps organizations streamline access to critical information and increase productivity.   

The new line of products includes the Cybex™ SC family of secure desktop KVM and all?new KM switches — the only KVM and KM switches on the market today designed to meet the new NIAP protection profile. These switches enable easy, secure access to up to four systems through discrete processing paths to each system, preventing data leakage, transfer or crosstalk between adjacent ports. Also, introduced today, the Avocent® SV family of KVM and KM switches provide industry-leading productivity features including the ability to share and easily transfer information between an array of devices — including PCs, printers, scanners, high-end graphic systems and mobile devices. Available in North America, Europe, Australia and Japan, these switches are part of an ongoing launch of new and enhanced solutions that deliver best-in-class security capabilities for government, multimedia, broadcast, financial, and IT operation center environments.

“Our collaboration with NIAP has given us a unique opportunity to work together to develop comprehensive security protocols that make a real difference in terms of security capabilities for these devices,” said Jay Wirts, general manager, Avocent Core Products at Emerson Network Power. “Our intent always has been to ensure the protocols provide the best possible security for users without compromising access and capabilities. The new protocol does just that, and our new line of KVM and KM switches are designed to those standards.”

Emerson Network Power’s work with NIAP illustrates its leadership position on issues concerning network security from desktop to data center and a heightened awareness within the industry of the propagation of vulnerabilities in today’s hyper-connected world. As security threats escalate, organizations increasingly separate sensitive information onto multiple networks.