OOOPS! 404

The page you are looking for has not been found. Try checking the URL for errors or simply scroll down to learn more about our company and products.

Cutting Edge Cyber-Security Solutions
Cutting Edge Cyber-Security Solutions
iPGARD is dedicated to solving your digital security challenges with solutions that best fit those issues. From designing the ideal switch to crafting secure remote command interfaces, iPGARD will keep your private information safe. Designed and made in the USA, iPGARD solutions include infrastructure protection products, NIAP approved secure KM and KVM switches, and secure accessories to better safeguard your critical information.
NIAP Approved Secure Switches
iPGARD's secure switches offer absolute mechanical, electrical, and optical signal isolation between computers and the switch’s ports, shielding each connected device from data leakage and hacking. Secure switches are tamper-protected, ensuring your networks are safe from malicious cyber interference.

 

iPGARD's Secure KM and KVM Switches are BAA compliant and approved by The National Information Assurance Partnership (NIAP).
Secure KVM and KM Switching Solutions
Our Secure KVM Products Range from 2 to 16 port DVI-I, DP, and HDMI to DP Solutions.
SDVN-4D-P

SDVN-4D-P

 

Secure 4-port, dual-head DVI-I KVM switch with dedicated CAC port & 4K support.
SDVN-8S-P

SDVN-8S-P

 

Secure 8-port, dual-link DVI-I KVM switch with dedicated CAC port.
SDVN-16S-P

SDVN-16S-P

 

Secure 16-port, dual-link DVI-I KVM switch with dedicated CAC port.
Control Room
Intelligent Safeguards

Our solutions are specifically catered to organizations who handle confidential information including but not limited to:
• Government Operations
• Defense & Intelligence Applications
• Secure Control Rooms
• Corporate Communications
• Server Operations
• Educational Administrations
• Medical Facilities
• Banking Network
• Transit Management
• Industrial Operations
SDVN-4D-P Diagram
Secure KVM

Why Secure KVM?

iPGARD’s Secure KVM Switches are designed for use in secure defense and intelligence applications where sensitive data must be protected. Secure switches prevent data leakage between computers that can run at different security levels, and eliminate any potential cyber threat by allowing users to control KVM (Keyboard, Video and Mouse) operations to multiple computers with DVI, HDMI or VGA displays. It features mechanical, electrical and optical signal isolation to prevent hacking and data leakage in environments where security is paramount.
Keyboard and Mouse Emulation

Keyboard & Mouse Emulation

The Secure KVM emulates the presence of a keyboard and mouse for every attached computer through a USB cable. Both selected and non-selected computers maintain a constant connection with the unit’s keyboardmouse emulation controllers, allowing for ultra-fast switching and restricting discovery of newly connected peripherals during switching operations. Emulation of keyboard and mouse also prevents direct connection between the peripherals and the connected computers, shielding systems from potential vulnerabilities.
CAC Support

CAC Support

Many secure KVM switches support CAC (Common Access Card) devices, such as smart-card and biometric readers, bolstering security when using the device. However, iPGARD takes CAC security even further, allowing users to assign specific peripheral devices to iPGARD'S Secure switches' CAC port. Once a peripheral device has been registered by an authenticated admin, users can then switch the connection between that device and the PC’s along with KVM switching.
EDID Learn and Video Emulation

EDID Learn & Video Emulation

iPGARD's secure switching products simulate a generic EDID as default, allowing them to operate most of the connected monitors. Selected and non-selected computers maintain constant connection with the unit’s video and AUX emulation controllers, allowing for ultra-fast switching and restricting discovery of newly connected monitors during switching operations. This prevents unwanted and unsecure data from getting transmitted through DDC lines.
Loading…