Friday, 13 March 2015

Secure your network ports from unwanted disconnects


Secure Network Ports — Only When You Need To
These one-of-a-kind cables give you the ability to lock down critical network ports when you need to, without buying new patch cords.

  • Secure network ports from unauthorised access and accidental disconnects.
  • Insert the optional locking pin into the patented boot to lock down ports.
  • Cables stay locked in place — until you take them out.

How To Secure Network Ports ?


The hard-polymer boot and plug are integrated for better strength and strain-relief and to prevent tampering.
 Slip the locking pin into the built-in locking tab on the patented boot. Once inserted, it can only be released with the removal key.

A locked cable with locking pin inserted in the boot
To unlock, insert the key into the locking pin until it clicks
Pull the locking pin back and lift the key to release

Lockable Patch Cable Applications


Transportation 
Prevent network tampering and unauthorized access at publicly accessible terminals and kiosks.
Government
Lock up critical network port connections in data centers, wiring closets and offices Avoid critical data breaches.
Retail 
Eliminate disconnections of sales terminals.Prevent tampering in connections within sales outlets.

Health Care 
Prevent accidental unplugging of equipment, Secure vital network connections in operating,examination rooms, nurse’s stations
Finance 
Add an extra layer of physical security to your financial network without a big investment in hardware, software, and access systems
Monitoring 
Prevent tampering and disconnects of connections at wireless access points, security cameras, and PoE equipment connections.

Education 
Prevent students from damaging or disconnecting network ports.
Manufacturing 
Prevent downtime from accidental disconnects on the factory floor.
Data Center
Prevent accidental disconnections at your patch panels.

Why You Should Prefer GigaTrue 3 Cables 


  • Turn ports into a Layer 1 security key
    GigaTrue 3 cables are one of the simplest,most effective and inexpensive way to increase your Layer 1 security. Protect mission-critical and publicly accessible ports from unauthorised access. 
  • Premium performance
    You won't sacrifice performance for security. These component-level cables are tested to 550 MHz. Locking Option for Fiber Patch cables also available.
  • Two levels of security
    These cables can be fitted with two types of locking pins. The green Secure Locking Pin can be released by squeezing the butterfly clip.The red Key Locking Pin offers a higher security level, It can only be unlocked using the Removal Key.
  • Rugged, patented, slim line boot
    No one is going to break this boot or pull out your cable! The extremely rugged, hardpolymer plug and boot are integrated to protect the cable and to prevent tampering.
+91 7738 066 077            ι           Marketing_in@blackbox.com

Thursday, 12 March 2015

Data Security in Payment Card Industry


What is PCI DSS


Developed by the major credit card issuers, the Payment Card Industry Data Security Standard (PCI DSS) outlines best practices for credit card data,storage, processing, and transmission. Its intent is to protect credit card information from fraud, theft, or any other breach

Requirements of PCI DSS


  • Build and maintain a secure network.
  • Protect cardholder data.
  • Maintain a vulnerability management program.
  • Implement strong access control measures.
  • Regularly monitor and test networks.
  • Maintain an information security policy.

How does EncrypTight™ Help You Comply with PCI DSS


       EncrypTight enables secure data transmissions, which assures the confidentiality, authenticity, and integrity of data as it travels across anynetwork, regardless of size, type, or topology. You’ll get encryption and authentication of all data, including cardholder information. Acting as a cryptographic firewall that rejects any packets lacking the proper authentication, EncrypTight ensures access to data is limited to those who need to see it. By protecting the network and the data, EncrypTight helps you comply with PCI DSS

PCI Requirement VS How EncrypTight helps you with compliance


Scope of PCI assessment may include the entire network


  • Avoid major network changes by overlaying encryption on top of the existing network.
  • Strong cryptography and simple policies isolate the Cardholder Data Environment (CDE) from the rest of the network.
  • Get stronger security through encryption rather than firewall-based approaches. The network is isolated using encryption rather than relying only on packet headers.
  • Secure data without changing the physical or logical network topology.
  • Simplify by encrypting among network segments that store, process, or transmit cardholder data.
  • Save money during PCI assessments by reducing the scope of the assessments.
  • Setup and management is simplified with GUI-based policies that allowthe network headers to pass in the clear while encrypting the payload.

Use strong cryptography and security protocols to safeguard sensitive cardholder data during transmission over open, public networks


  • Quickly and simply encrypt card-holder data and other sensitive information across any network without affecting the applications and services that run over the network.
  • Encrypt data as it traverses a third-party service provider network or the Internet.
  • EncrypTight is an easy, drop-in solution that works with existing network and applications.
  • Doesn't affect existing failover, redundancy and load-sharing.

Track and monitor all access to network resources and cardholder data


  • Provide a full audit trail for logging and auditing.
  • Role-based access enables an auditor to monitor security.
  • Auditing and monitoring can be easily outsourced to a third party
+91 7738 066 077           ι          Marketing_in@blacbox.com

Tuesday, 3 March 2015

Black Box Surge Protectors

A surge is a brief rise in voltage that's caused when power is switched on or off to a high-powered device.
Surges can produce high-transient voltages, which damage LAN and serial interfaces that typically use less than 12 volts to transmit.

Black Box Featured Products For Surge Protection


Industrial-grade protection for CAT5e and PoE connections.
In-line surge protection in a compact DIN-rail mount format.

Protects network interfaces up to CAT6 from damaging power surges.
Guard your network against electrical damage.

Protectyour video equipment
Protect all 25 wires on your RS-232 lines.

Protects terminal adapters, NTUs, and other ISDN equipment
This data-line protector easier to install

View Our Catalogues Online



infrastructure
KVM
Networking & Datacom

Data Security in Payment Card Industry - Black Box EncrypTight


What is PCI DSS


Developed by the major credit card issuers, the Payment Card Industry Data Security Standard (PCI DSS) outlines best practices for credit card data,storage, processing, and transmission. Its intent is to protect credit card information from fraud, theft, or any other breach

Requirements of PCI DSS


  • Build and maintain a secure network.
  • Protect cardholder data.
  • Maintain a vulnerability management program.
  • Implement strong access control measures.
  • Regularly monitor and test networks.
  • Maintain an information security policy.

How does EncrypTight™ Help You Comply with PCI DSS


       EncrypTight enables secure data transmissions, which assures the confidentiality, authenticity, and integrity of data as it travels across anynetwork, regardless of size, type, or topology. You’ll get encryption and authentication of all data, including cardholder information. Acting as a cryptographic firewall that rejects any packets lacking the proper authentication, EncrypTight ensures access to data is limited to those who need to see it. By protecting the network and the data, EncrypTight helps you comply with PCI DSS

PCI Requirement VS How EncrypTight helps you with compliance


Scope of PCI assessment may include the entire network


  • Avoid major network changes by overlaying encryption on top of the existing network.
  • Strong cryptography and simple policies isolate the Cardholder Data Environment (CDE) from the rest of the network.
  • Get stronger security through encryption rather than firewall-based approaches. The network is isolated using encryption rather than relying only on packet headers.
  • Secure data without changing the physical or logical network topology.
  • Simplify by encrypting among network segments that store, process, or transmit cardholder data.
  • Save money during PCI assessments by reducing the scope of the assessments.
  • Setup and management is simplified with GUI-based policies that allowthe network headers to pass in the clear while encrypting the payload.

Use strong cryptography and security protocols to safeguard sensitive cardholder data during transmission over open, public networks


  • Quickly and simply encrypt card-holder data and other sensitive information across any network without affecting the applications and services that run over the network.
  • Encrypt data as it traverses a third-party service provider network or the Internet.
  • EncrypTight is an easy, drop-in solution that works with existing network and applications.
  • Doesn't affect existing failover, redundancy and load-sharing.

Track and monitor all access to network resources and cardholder data


  • Provide a full audit trail for logging and auditing.
  • Role-based access enables an auditor to monitor security.
  • Auditing and monitoring can be easily outsourced to a third party
+91 7738 066 077           ι          Marketing_in@blacbox.com