{"id":4653,"date":"2025-06-18T14:59:58","date_gmt":"2025-06-18T12:59:58","guid":{"rendered":"https:\/\/blog.gdsys.de\/en\/?p=4653"},"modified":"2025-06-18T14:59:58","modified_gmt":"2025-06-18T12:59:58","slug":"kvm-over-ip-less-secure-than-a-classical-system-debunking-the-myth","status":"publish","type":"post","link":"https:\/\/blog.gdsys.de\/en\/2025\/06\/18\/kvm-over-ip-less-secure-than-a-classical-system-debunking-the-myth\/","title":{"rendered":"KVM-over-IP \u2013 less secure than a classical system? Debunking the myth"},"content":{"rendered":"<p>A common argument against KVM-over-IP systems is that network-based transmission is less secure than the direct connection used in classical systems. This argument is often based on the belief that network connections are more vulnerable to attacks, and therefore pose a higher security risk. In this blog post, we aim to explore this topic and dispel the myth that KVM-over-IP systems are inherently less secure than their classical counterparts.<\/p>\n<blockquote>\n<h2>KVM-over-IP<\/h2>\n<p>What is KVM-over-IP? In a KVM-over-IP system, data packets are transmitted over Ethernet networks (OSI model Layer 2), while the communication is based on IP (Layer 3). In a classical KVM system, the connection is made through dedicated cables (Layer 1 \u2013 Physical Layer), enabling direct communication between the operator and the target computers.<\/p><\/blockquote>\n<p>Does the use of IP-based transmission increase the security risk, and how can effective protection against external cyber threats or internal threats via network access be ensured? Our KVM-over-IP solutions offer a variety of security features that enable you to control and secure access to the managed computers. These include, among others:<\/p>\n<h2>Encryption<\/h2>\n<p>When connecting devices to an IP matrix, data transmission is encrypted, for instance, through a VPN tunnel. G&amp;D utilizes two separate ports in its KVM-over-IP systems for transmitting all critical data within the IP network. Communication between the operator and the target computer is consistently protected by AES-256 encryption to ensure that unauthorized access is prevented. The bootloader, operating system, and firmware of the IP matrices together form a \u201cTrusted Computing Platform,\u201d which protects the system from third-party tampering. An integrated \u201cTrusted Platform Module\u201d (TPM hardware module) uses RSA encryption with a 2048-bit key to secure all access and configuration data from unauthorized access. Additionally, highly sensitive information, such as login data and passwords, is permanently stored in encrypted form. Any modification to the firmware is detected early, resulting in the boot process being aborted to prevent potential threats.<\/p>\n<h2>Authentication<\/h2>\n<p>To ensure that only authorized users can access the managed computers, our KVM-over-IP solutions support various authentication methods. In addition to user authentication via password, an optional <a href=\"https:\/\/blog.gdsys.de\/en\/2023\/08\/21\/2-factor-authentication-introducing-a-new-security-feature\/\" target=\"_blank\" rel=\"noopener\">Two-Factor Authentication (2FA)<\/a> can be implemented to add a second possession-based factor for enhanced security. This utilizes a Time-Based One-Time Password (TOTP), which is valid for a limited time and can only be used once. Depending on individual requirements and preferences, two-factor authentication can be carried out using either authenticator apps or hardware tokens. Users also have the flexibility to choose whether they want to use the device\u2019s internal authentication server or an external directory service, such as LDAP, Active Directory, RADIUS, or TACACS+.<\/p>\n<figure id=\"attachment_4256\" aria-describedby=\"caption-attachment-4256\" style=\"width: 840px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-scaled.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\" wp-image-4256\" src=\"https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-807x1024.jpg\" alt=\"2-factor authentication for a matrix installation\" width=\"840\" height=\"1066\" srcset=\"https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-807x1024.jpg 807w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-236x300.jpg 236w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-768x975.jpg 768w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-1210x1536.jpg 1210w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-1613x2048.jpg 1613w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-473x600.jpg 473w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-scaled.jpg 2017w\" sizes=\"(max-width: 840px) 100vw, 840px\" \/><\/a><figcaption id=\"caption-attachment-4256\" class=\"wp-caption-text\">2-factor authentication for a matrix installation<\/figcaption><\/figure>\n<h2>Access control<\/h2>\n<p>The use of KVM systems to offload computer systems offers significant advantages, especially in terms of the physical security of IT systems. By using KVM systems, administrators can physically separate the computers from users\u2019 workplaces. This means that the actual servers and computers are housed in a secure, centralized room, while users access these systems remotely via IP-KVM systems. Administrators can configure access rights by determining which users or user groups are allowed to access specific computers or servers. This is done through the assignment of specific permissions and profiles, ensuring that each user only gains access to the systems for which they are authorized. This level of control greatly enhances security by preventing unauthorized individuals from gaining physical access to critical IT resources.<\/p>\n<h2>UID-Locking<\/h2>\n<p>This security feature allows for the definition and control of a specific pool of devices belonging to a particular KVM installation. UID Locking ensures that only authorized (KVM) devices within this pool can be used. This prevents the addition of new or replacement devices, enhancing the integrity and security of the system. In addition to restricting access to specific devices, USB 2.0 data connections can also be disabled. This means that no data transfers can occur via USB 2.0 ports, further reducing the risk of unauthorized data access or transfers.<\/p>\n<h2>Forward\/Backward Security<\/h2>\n<p>A unique feature of our devices is the forward\/backward security for generating new security keys. When a workplace module connects to a computer module, a security key is generated for that connection. If another workplace module connects to the same computer module, both workplace modules receive new security keys to ensure all connections remain optimally protected. Similarly, when one module disconnects, a new security key is sent to the remaining workplace module. This dynamic key management ensures maximum security. The continuous updating of security keys is a distinctive feature of G&amp;D devices, ensuring that every connection is individually secured. This minimizes the risk of unauthorized access and guarantees the integrity of the entire IT infrastructure.<\/p>\n<h2>Security Certifications<\/h2>\n<p>With our new <a href=\"https:\/\/blog.gdsys.de\/en\/2025\/01\/17\/securecert-new-feature-for-mission-critical-infrastructures\/\" target=\"_blank\" rel=\"noopener\">SecureCert<\/a> feature, our KVM-over-IP systems meet stringent security certifications that comply with the high requirements of security-critical environments. The listing of our systems on the DoDIN APL (Department of Defense Information Network Approved Products List) confirms that our solutions are approved for use in U.S. Department of Defense networks. The Common Criteria EAL2+ (Evaluation Assurance Level 2+) ensures an independent security evaluation based on international standards. Additionally, the FIPS 140-3 (Federal Information Processing Standard) certification guarantees that our systems meet strict cryptographic requirements. These external validations confirm the high security of our IP solutions and enable their use in security-critical and regulated environments such as government agencies, the military, and highly sensitive industrial applications.<\/p>\n<p><a href=\"https:\/\/blog.gdsys.de\/en\/files\/2025\/06\/Zertifizierungen.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-4654\" src=\"https:\/\/blog.gdsys.de\/en\/files\/2025\/06\/Zertifizierungen-1024x512.jpg\" alt=\"\" width=\"840\" height=\"420\" srcset=\"https:\/\/blog.gdsys.de\/en\/files\/2025\/06\/Zertifizierungen-1024x512.jpg 1024w, https:\/\/blog.gdsys.de\/en\/files\/2025\/06\/Zertifizierungen-300x150.jpg 300w, https:\/\/blog.gdsys.de\/en\/files\/2025\/06\/Zertifizierungen-768x384.jpg 768w, https:\/\/blog.gdsys.de\/en\/files\/2025\/06\/Zertifizierungen-1536x768.jpg 1536w, https:\/\/blog.gdsys.de\/en\/files\/2025\/06\/Zertifizierungen-1200x600.jpg 1200w, https:\/\/blog.gdsys.de\/en\/files\/2025\/06\/Zertifizierungen.jpg 1600w\" sizes=\"(max-width: 840px) 100vw, 840px\" \/><\/a><\/p>\n<h2>Conclusion<\/h2>\n<p>When all these security features are properly configured and applied, KVM-over-IP can be utilized as securely as classical KVM systems. The ability to centrally control and monitor access to managed computers using a KVM system provides an additional security advantage. Of course, it is essential to consider the best security practices when implementing KVM-over-IP and to regularly perform security updates to address potential vulnerabilities. However, it is fundamentally incorrect to assume that KVM-over-IP is inherently less secure than classical KVM systems. With the right security measures in place, KVM-over-IP can be a secure and powerful alternative that offers many benefits.<\/p>\n<blockquote><p><strong>How can KVM-over-IP be deployed securely and efficiently in critical environments?<\/strong><br \/>\nOur white paper \u201cSecure KVM solutions: KVM-over-IP\u2122 matrix systems for mission-critical applications\u201d offers an in-depth look. It presents how the systems work, their benefits, expert knowledge, and best practices.<\/p>\n<p>&gt;&gt;<a href=\"https:\/\/www.gdsys.com\/en\/service\/campus\/know-how\/secure-kvm-solutions\" target=\"_blank\" rel=\"noopener\">Download for free<\/a>&lt;&lt;<\/p><\/blockquote>\n<p><strong>&gt;&gt; Other articles you might be interested in:<\/strong><\/p>\n<p><a href=\"https:\/\/blog.gdsys.de\/en\/2025\/01\/17\/securecert-new-feature-for-mission-critical-infrastructures\/\" target=\"_blank\" rel=\"noopener\">SecureCert: New Feature for Mission-Critical Infrastructures<\/a><\/p>\n<p><a href=\"https:\/\/blog.gdsys.de\/en\/2019\/03\/20\/classic-kvm-vs-kvm-over-ip-a-comparison\/\" target=\"_blank\" rel=\"noopener\">Classic KVM vs. KVM-over-IP \u2013 a comparison<\/a><\/p>\n<p>&nbsp;<\/p>\n<div class=\"shariff\" data-title=\"KVM-over-IP \u2013 less secure than a classical system? Debunking the myth\" data-info-url=\"http:\/\/ct.de\/-2467514\" data-backend-url=\"https:\/\/blog.gdsys.de\/en\/wp-content\/plugins\/shariff-sharing\/backend\/index.php\" data-temp=\"\/tmp\" data-ttl=\"60\" data-service=\"tlx\" data-services='[\"facebook\",\"twitter\",\"linkedin\",\"xing\",\"whatsapp\",\"mail\",\"info\"]' data-image=\"https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-807x1024.jpghttps:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-807x1024.jpg 807w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-236x300.jpg 236w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-768x975.jpg 768w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-1210x1536.jpg 1210w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-1613x2048.jpg 1613w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-473x600.jpg 473w, https:\/\/blog.gdsys.de\/en\/files\/2023\/08\/Skizze_2-Faktor-Authentifizierung_EN-scaled.jpg 2017w\" data-url=\"https:\/\/blog.gdsys.de\/en\/2025\/06\/18\/kvm-over-ip-less-secure-than-a-classical-system-debunking-the-myth\/\" data-lang=\"en\" data-theme=\"color\" data-orientation=\"horizontal\"><\/div>","protected":false},"excerpt":{"rendered":"<p>A common argument against KVM-over-IP systems is that network-based transmission is less secure than the direct connection used in classical systems. This argument is often based on the belief that network connections are more vulnerable to attacks, and therefore pose a higher security risk. In this blog post, we aim to explore this topic and &#8230;<\/p>\n","protected":false},"author":14,"featured_media":4659,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1,19],"tags":[770,771,769,4,467,795,341,413,361,793,794,24,797,796],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>KVM-over-IP \u2013 less secure than a classical system?<\/title>\n<meta name=\"description\" content=\"We show how modern KVM-over-IP systems can be operated securely and reliably when the right features are properly implemented.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.gdsys.de\/en\/2025\/06\/18\/kvm-over-ip-less-secure-than-a-classical-system-debunking-the-myth\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"KVM-over-IP \u2013 less secure than a classical system?\" \/>\n<meta property=\"og:description\" content=\"We show how modern KVM-over-IP systems can be operated securely and reliably when the right features are properly implemented.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.gdsys.de\/en\/2025\/06\/18\/kvm-over-ip-less-secure-than-a-classical-system-debunking-the-myth\/\" \/>\n<meta property=\"og:site_name\" content=\"Corporate Blog from Guntermann &amp; Drunck\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-18T12:59:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.gdsys.de\/en\/files\/2025\/06\/Visual_BP_Sicherheit_KVM-over-IP_1920x600_final.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eva Kring\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/#website\",\"url\":\"https:\/\/blog.gdsys.de\/en\/\",\"name\":\"Corporate Blog from Guntermann &amp; Drunck\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.gdsys.de\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/2025\/06\/18\/kvm-over-ip-less-secure-than-a-classical-system-debunking-the-myth\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/blog.gdsys.de\/en\/files\/2025\/06\/Visual_BP_Sicherheit_KVM-over-IP_1920x600_final.jpg\",\"contentUrl\":\"https:\/\/blog.gdsys.de\/en\/files\/2025\/06\/Visual_BP_Sicherheit_KVM-over-IP_1920x600_final.jpg\",\"width\":1920,\"height\":600},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/2025\/06\/18\/kvm-over-ip-less-secure-than-a-classical-system-debunking-the-myth\/#webpage\",\"url\":\"https:\/\/blog.gdsys.de\/en\/2025\/06\/18\/kvm-over-ip-less-secure-than-a-classical-system-debunking-the-myth\/\",\"name\":\"KVM-over-IP \u2013 less secure than a classical system?\",\"isPartOf\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/2025\/06\/18\/kvm-over-ip-less-secure-than-a-classical-system-debunking-the-myth\/#primaryimage\"},\"datePublished\":\"2025-06-18T12:59:58+00:00\",\"dateModified\":\"2025-06-18T12:59:58+00:00\",\"author\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/cf3599421b600233af815e573e4b03a5\"},\"description\":\"We show how modern KVM-over-IP systems can be operated securely and reliably when the right features are properly implemented.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/2025\/06\/18\/kvm-over-ip-less-secure-than-a-classical-system-debunking-the-myth\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.gdsys.de\/en\/2025\/06\/18\/kvm-over-ip-less-secure-than-a-classical-system-debunking-the-myth\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/2025\/06\/18\/kvm-over-ip-less-secure-than-a-classical-system-debunking-the-myth\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"KVM-over-IP \u2013 less secure than a classical system? Debunking the myth\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/cf3599421b600233af815e573e4b03a5\",\"name\":\"Eva Kring\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/37ffd0dfdce4985c554b348894db134b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/37ffd0dfdce4985c554b348894db134b?s=96&d=mm&r=g\",\"caption\":\"Eva Kring\"},\"description\":\"Markting Communications Manager bei der Guntermann &amp; Drunck GmbH. Sie finden mich auch auf LinkedIn. Marketing Communications Manager at Guntermann &amp; Drunck. You can find me on LinkedIn.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/eva-kring-61a027270\/\"],\"url\":\"https:\/\/blog.gdsys.de\/en\/author\/evakring\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"KVM-over-IP \u2013 less secure than a classical system?","description":"We show how modern KVM-over-IP systems can be operated securely and reliably when the right features are properly implemented.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.gdsys.de\/en\/2025\/06\/18\/kvm-over-ip-less-secure-than-a-classical-system-debunking-the-myth\/","og_locale":"en_US","og_type":"article","og_title":"KVM-over-IP \u2013 less secure than a classical system?","og_description":"We show how modern KVM-over-IP systems can be operated securely and reliably when the right features are properly implemented.","og_url":"https:\/\/blog.gdsys.de\/en\/2025\/06\/18\/kvm-over-ip-less-secure-than-a-classical-system-debunking-the-myth\/","og_site_name":"Corporate Blog from Guntermann &amp; Drunck","article_published_time":"2025-06-18T12:59:58+00:00","og_image":[{"width":1920,"height":600,"url":"https:\/\/blog.gdsys.de\/en\/files\/2025\/06\/Visual_BP_Sicherheit_KVM-over-IP_1920x600_final.jpg","type":"image\/jpeg"}],"twitter_misc":{"Written by":"Eva Kring","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/blog.gdsys.de\/en\/#website","url":"https:\/\/blog.gdsys.de\/en\/","name":"Corporate Blog from Guntermann &amp; Drunck","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.gdsys.de\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/blog.gdsys.de\/en\/2025\/06\/18\/kvm-over-ip-less-secure-than-a-classical-system-debunking-the-myth\/#primaryimage","inLanguage":"en-US","url":"https:\/\/blog.gdsys.de\/en\/files\/2025\/06\/Visual_BP_Sicherheit_KVM-over-IP_1920x600_final.jpg","contentUrl":"https:\/\/blog.gdsys.de\/en\/files\/2025\/06\/Visual_BP_Sicherheit_KVM-over-IP_1920x600_final.jpg","width":1920,"height":600},{"@type":"WebPage","@id":"https:\/\/blog.gdsys.de\/en\/2025\/06\/18\/kvm-over-ip-less-secure-than-a-classical-system-debunking-the-myth\/#webpage","url":"https:\/\/blog.gdsys.de\/en\/2025\/06\/18\/kvm-over-ip-less-secure-than-a-classical-system-debunking-the-myth\/","name":"KVM-over-IP \u2013 less secure than a classical system?","isPartOf":{"@id":"https:\/\/blog.gdsys.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.gdsys.de\/en\/2025\/06\/18\/kvm-over-ip-less-secure-than-a-classical-system-debunking-the-myth\/#primaryimage"},"datePublished":"2025-06-18T12:59:58+00:00","dateModified":"2025-06-18T12:59:58+00:00","author":{"@id":"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/cf3599421b600233af815e573e4b03a5"},"description":"We show how modern KVM-over-IP systems can be operated securely and reliably when the right features are properly implemented.","breadcrumb":{"@id":"https:\/\/blog.gdsys.de\/en\/2025\/06\/18\/kvm-over-ip-less-secure-than-a-classical-system-debunking-the-myth\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.gdsys.de\/en\/2025\/06\/18\/kvm-over-ip-less-secure-than-a-classical-system-debunking-the-myth\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.gdsys.de\/en\/2025\/06\/18\/kvm-over-ip-less-secure-than-a-classical-system-debunking-the-myth\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"KVM-over-IP \u2013 less secure than a classical system? Debunking the myth"}]},{"@type":"Person","@id":"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/cf3599421b600233af815e573e4b03a5","name":"Eva Kring","image":{"@type":"ImageObject","@id":"https:\/\/blog.gdsys.de\/en\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/37ffd0dfdce4985c554b348894db134b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/37ffd0dfdce4985c554b348894db134b?s=96&d=mm&r=g","caption":"Eva Kring"},"description":"Markting Communications Manager bei der Guntermann &amp; Drunck GmbH. Sie finden mich auch auf LinkedIn. Marketing Communications Manager at Guntermann &amp; Drunck. You can find me on LinkedIn.","sameAs":["https:\/\/www.linkedin.com\/in\/eva-kring-61a027270\/"],"url":"https:\/\/blog.gdsys.de\/en\/author\/evakring\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts\/4653"}],"collection":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/comments?post=4653"}],"version-history":[{"count":2,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts\/4653\/revisions"}],"predecessor-version":[{"id":4656,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts\/4653\/revisions\/4656"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/media\/4659"}],"wp:attachment":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/media?parent=4653"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/categories?post=4653"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/tags?post=4653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}