Thursday, 26 March 2015

Black Box 4 K Solutions

4K is the standard for professional and corporate video and signage applications. Transition to 4K and deploy video systems that wow your audience with Black Box's award-winning products and platinum support.

Video Wall Controller

Output 4K video across four or more screens with VideoPlex4 4K—a standalone display wall controller from Black Box. Ideal for use with edge-blending projectors. 

    Learn More    

4K Digital Signage

Ensure a great user experience. iCOMPEL™ offers scalable, easy-to-use digital signage with brilliant 4K output from one to 1000s of screens.

     Learn More     

HDMI Switching & Distribution

Distribute and switch HDMI audio and video with resolutions up to 4K x 2K. Your resolutions stay crystal clear with HDMI switches and splitters from Black Box.

4K Cables

Be sure to also check out the High-Speed HDMI Cables that support 4K resolutions.
High-Speed HDMI Cables
Hybrid Copper/Fiber

4K KVM Products

KVM extenders from Black Box transmit DisplayPort signals and support 4K resolutions. 
DKM FX Modular Interface Cards, DisplayPort Extension

There are many 4K elements to consider, including mismatched resolutions, bandwidth requirements, multiple AV interfaces, and new cable lengths. We've got you covered. Read the Piecing Together the 4K Puzzle white paper to learn more.
+91 7738 066 077          ι

Sunday, 22 March 2015

Black Box ServSwitch Agility - IP-based KVM Extension

As organisations continue to expand, IP-based Extension and Switching, as well as Cloud-Based Matrix Switching, will continue to enable Collaboration and Communication. These Flexible, Scalable systems are Low Latency, Cost-Effective and Improves Productivity

ServSwitch Agility and Its Applications

Black Box ServSwitch Agility operates over a LAN to extend DVI video, USB peripherals, including keyboard, video, and mouse, RS232, and audio. It uses multicast (IGMP) technology, so it doesn't slow down a network when distributing video.
Additionally, Agility KVM-over-IP is a managed switching and extension system to meet a number of configuration applications, including single-target sharing, point-to-point extension, and multicasting.

Agility Solution in Healthcare

Black Box solution enables the servers to be placed down the corridor in a secure environment, and using a Black Box ServSwitch Agility to extend the keyboard, monitor and mouse into operating theatres, x-ray and consulting rooms. Cleaning now is not an issue as the keyboards, displays and mice were of a medical standard ensuring they could be disinfected directly

Agility Solution Video Distribution

The Black Box ServSwitch Agility solution is a reliable method for transporting high resolution video across the train station, to the large screen. The Agility introduced no loss and transported the original video faithfully. Even on the large display, there were no signs of artefacts or anomalies.

Agility Solution Broadcasting

Using a TCP/IP network the Agility units connect the users within the various control rooms to the remote computers without loss in video quality. The Black Box ServSwitch Agility Receivers in the control rooms operate very quietly without a fan

Agility Solution Control Rooms

The Black Box ServSwitch Agility Receivers can flexibly be adapted to future changes. The Agility system turned out to be a very cost effective solution in comparison to other systems.           ι         +91 7738 066 077

Tuesday, 17 March 2015

KVM Applications and System Design Beyond the Data Center

High-Performance KVM

A KVM switch (with KVM being an abbreviation for "keyboard, video and mouse") is a hardware device that allows a user to control multiple Computers from one or more Keyboard, Video and Mouse

Modern digital extension and switching technology emphasizes the movement from  analog to digital video, and also away from fixed-user-to-computer KVM switching toward nearly freely scalable matrices (matrix switching). 

These new proprietary (using CATx or Fiber optic cables) and IP-based digital technologies offer real-time solutions — no delay, no skew. Along with extending digital video, these applications extend keyboard and mouse, digital or analog audio, serial, and USB.

Additionally, the designs that apply to the technologies outlined provide a quieter workplace and remove excess heat from the area by placing computers in low-dust, climate-controlled equipment rooms without sacrificing video quality, picture resolution, or real-time switching of peripherals
server maintenance, software updates, and network administration become centralized, plus time and cost associated with support is reduced.

Once considered a technology only for the data center, KVM solutions have advanced and expanded significantly over the years such that applications for KVM are now almost endless. This presentation covers applications for KVM technology, from desktop switching to advanced, high-performance matrix switching systems, with an emphasis on case studies that identify the best solutions for specific scenarios. In this webinar, you’ll:

  • acquire a high-level understanding of the KVM technology solutions spectrum.
  • Understand the thought process behind selecting a KVM technology for a specific application scenario.
  • Understand the return-on-investment benefits that KVM solutions can provide.

Friday, 13 March 2015

Secure your network ports from unwanted disconnects

Secure Network Ports — Only When You Need To
These one-of-a-kind cables give you the ability to lock down critical network ports when you need to, without buying new patch cords.

  • Secure network ports from unauthorised access and accidental disconnects.
  • Insert the optional locking pin into the patented boot to lock down ports.
  • Cables stay locked in place — until you take them out.

How To Secure Network Ports ?

The hard-polymer boot and plug are integrated for better strength and strain-relief and to prevent tampering.
 Slip the locking pin into the built-in locking tab on the patented boot. Once inserted, it can only be released with the removal key.

A locked cable with locking pin inserted in the boot
To unlock, insert the key into the locking pin until it clicks
Pull the locking pin back and lift the key to release

Lockable Patch Cable Applications

Prevent network tampering and unauthorized access at publicly accessible terminals and kiosks.
Lock up critical network port connections in data centers, wiring closets and offices Avoid critical data breaches.
Eliminate disconnections of sales terminals.Prevent tampering in connections within sales outlets.

Health Care 
Prevent accidental unplugging of equipment, Secure vital network connections in operating,examination rooms, nurse’s stations
Add an extra layer of physical security to your financial network without a big investment in hardware, software, and access systems
Prevent tampering and disconnects of connections at wireless access points, security cameras, and PoE equipment connections.

Prevent students from damaging or disconnecting network ports.
Prevent downtime from accidental disconnects on the factory floor.
Data Center
Prevent accidental disconnections at your patch panels.

Why You Should Prefer GigaTrue 3 Cables 

  • Turn ports into a Layer 1 security key
    GigaTrue 3 cables are one of the simplest,most effective and inexpensive way to increase your Layer 1 security. Protect mission-critical and publicly accessible ports from unauthorised access. 
  • Premium performance
    You won't sacrifice performance for security. These component-level cables are tested to 550 MHz. Locking Option for Fiber Patch cables also available.
  • Two levels of security
    These cables can be fitted with two types of locking pins. The green Secure Locking Pin can be released by squeezing the butterfly clip.The red Key Locking Pin offers a higher security level, It can only be unlocked using the Removal Key.
  • Rugged, patented, slim line boot
    No one is going to break this boot or pull out your cable! The extremely rugged, hardpolymer plug and boot are integrated to protect the cable and to prevent tampering.
+91 7738 066 077            ι 

Thursday, 12 March 2015

Data Security in Payment Card Industry

What is PCI DSS

Developed by the major credit card issuers, the Payment Card Industry Data Security Standard (PCI DSS) outlines best practices for credit card data,storage, processing, and transmission. Its intent is to protect credit card information from fraud, theft, or any other breach

Requirements of PCI DSS

  • Build and maintain a secure network.
  • Protect cardholder data.
  • Maintain a vulnerability management program.
  • Implement strong access control measures.
  • Regularly monitor and test networks.
  • Maintain an information security policy.

How does EncrypTight™ Help You Comply with PCI DSS

       EncrypTight enables secure data transmissions, which assures the confidentiality, authenticity, and integrity of data as it travels across anynetwork, regardless of size, type, or topology. You’ll get encryption and authentication of all data, including cardholder information. Acting as a cryptographic firewall that rejects any packets lacking the proper authentication, EncrypTight ensures access to data is limited to those who need to see it. By protecting the network and the data, EncrypTight helps you comply with PCI DSS

PCI Requirement VS How EncrypTight helps you with compliance

Scope of PCI assessment may include the entire network

  • Avoid major network changes by overlaying encryption on top of the existing network.
  • Strong cryptography and simple policies isolate the Cardholder Data Environment (CDE) from the rest of the network.
  • Get stronger security through encryption rather than firewall-based approaches. The network is isolated using encryption rather than relying only on packet headers.
  • Secure data without changing the physical or logical network topology.
  • Simplify by encrypting among network segments that store, process, or transmit cardholder data.
  • Save money during PCI assessments by reducing the scope of the assessments.
  • Setup and management is simplified with GUI-based policies that allowthe network headers to pass in the clear while encrypting the payload.

Use strong cryptography and security protocols to safeguard sensitive cardholder data during transmission over open, public networks

  • Quickly and simply encrypt card-holder data and other sensitive information across any network without affecting the applications and services that run over the network.
  • Encrypt data as it traverses a third-party service provider network or the Internet.
  • EncrypTight is an easy, drop-in solution that works with existing network and applications.
  • Doesn't affect existing failover, redundancy and load-sharing.

Track and monitor all access to network resources and cardholder data

  • Provide a full audit trail for logging and auditing.
  • Role-based access enables an auditor to monitor security.
  • Auditing and monitoring can be easily outsourced to a third party
+91 7738 066 077           ι