{"id":57,"date":"2012-03-08T12:00:51","date_gmt":"2012-03-08T12:00:51","guid":{"rendered":"http:\/\/blog.gdsys.de\/en\/?p=57"},"modified":"2012-03-08T11:43:47","modified_gmt":"2012-03-08T11:43:47","slug":"managing-trust-with-kvm-3-steps-to-make-working-in-towers-more-secure","status":"publish","type":"post","link":"https:\/\/blog.gdsys.de\/en\/2012\/03\/08\/managing-trust-with-kvm-3-steps-to-make-working-in-towers-more-secure\/","title":{"rendered":"\u201cManaging Trust\u201d with KVM &#8211; 3 steps for more security in towers"},"content":{"rendered":"<p>With \u201cManaging Trust\u201d as <a title=\"&quot;Managing Trust&quot; - the keynote theme at CeBIT 2012\" href=\"http:\/\/www.cebit.de\/en\/about-the-trade-show\/topics-trends\/news\/managing-trust\" target=\"_blank\">keynote theme,<\/a> this year\u2019s CeBIT focuses on the topics trust and security in the digital age. According to CeBIT, \u201cthe greater the trust in the solutions and applications of the international <a href=\"http:\/\/tutor2u.net\/business\/ict\/intro_what_is_ict.htm\">ICT industry<\/a>, the faster the global economy can grow.\u201d But privacy, technical security and the reliability of systems still remain to be main concerns for both economy and users.<\/p>\n<p>As a manufacturer of <a title=\"KVM portfolio\" href=\"http:\/\/www.gdsys.de\/en\/products\/\" target=\"_blank\">KVM products<\/a>, we are deal with these concerns on a daily basis. By being able to access numerous computers at the same time, security is of paramount importance when it comes to developing and manufacturing KVM products. When I heard the CeBIT keynote theme, I immediately thought about what \u201cManaging Trust\u201d actually means for KVM.<\/p>\n<p>By taking a closer look at how KVM can be applied in <a title=\"Website of German air traffic control\" href=\"https:\/\/secais.dfs.de\/\" target=\"_blank\">air traffic control<\/a>, I will show you in three steps how KVM products help creating a secure working environment for controllers. How can KVM be applied to make sure that the monitors in the tower will not suddenly turn blank? And how does it help preventing system failures?<\/p>\n<h2>1. Removing computers from the tower<\/h2>\n<p><a href=\"https:\/\/blog.gdsys.de\/en\/files\/2012\/03\/d69e98f303.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignright size-thumbnail wp-image-58\" title=\"KVM extenders help removing computers from the tower\" src=\"https:\/\/blog.gdsys.de\/en\/files\/2012\/03\/d69e98f303-150x150.jpg\" alt=\"\" width=\"150\" height=\"150\" \/><\/a>If you ever had the chance to visit a tower at an airport or simply watched a movie giving you an idea of how they look like, you might have a pretty good idea of how packed these places can get. To provide air traffic controllers with more space, it is therefore useful to remove any computers from the tower into a separate server room. Now they can stretch their legs and are even able to work without being distracted by heat, noise or maintenance staff. But how can they access their computers if they are placed in a remote server room? That\u2019s exactly where KVM comes into play. <a title=\"Different kinds of KVM extenders\" href=\"http:\/\/www.gdsys.de\/en\/products\/kvm-extenders\/\" target=\"_blank\">KVM extenders<\/a> are the key for connecting the computers in the server room and the tower. Even over great distances, optical fibres transmit computer signals such as keyboard, video, mouse, audio or USB 2.0 in real time and without any loss in quality to the screens of the controllers.<\/p>\n<h2>2. Establishing a monitoring system<\/h2>\n<p><a href=\"https:\/\/blog.gdsys.de\/en\/files\/2012\/03\/26cb776c66.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignright size-thumbnail wp-image-61\" title=\"Establishing a monitoring system\" src=\"https:\/\/blog.gdsys.de\/en\/files\/2012\/03\/26cb776c66-150x150.jpg\" alt=\"Establishing a monitoring system\" width=\"150\" height=\"150\" \/><\/a>But, of course, simply removing computers from the tower doesn\u2019t prevent the systems from failing. To avoid failures, applying a monitoring system based on hardware comes in handy. The system, which is implemented in each KVM extender, monitors all system statuses of any connected extender lines, detects statuses that might lead to failures (according to defined thresholds, e.g. temperature) and sends an <a title=\"More info about SNMP\" href=\"http:\/\/en.wikipedia.org\/wiki\/Snmp\" target=\"_blank\">SNMP<\/a> trap to the IT warning them about said status.<\/p>\n<p>By actively monitoring all extender lines and thanks to redundant components within the applied KVM extenders, IT and controllers are able to detect possible failures before they even occur.<\/p>\n<h2>3. Implementing primary, redundant and fallback systems<\/h2>\n<p><a href=\"https:\/\/blog.gdsys.de\/en\/files\/2012\/03\/bc7fa87044.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignright size-thumbnail wp-image-63\" title=\"Three independent systems provide security\" src=\"https:\/\/blog.gdsys.de\/en\/files\/2012\/03\/bc7fa87044-150x150.jpg\" alt=\"Three independent systems provide security\" width=\"150\" height=\"150\" \/><\/a>To make entirely sure the systems won\u2019t fail despite being monitored, two additional connections, a redundant and a fallback system, are implemented. In case of a system failure, controllers now have access to two other active systems, because all three systems are connected to the <a title=\"Different kinds of KVM switches\" href=\"http:\/\/www.gdsys.de\/en\/products\/kvm-switches\/\" target=\"_blank\">KVM switch<\/a> placed at the controller\u2019s desk. Now you might ask yourself how controllers can be sure the additional systems are active and will work properly. That\u2019s simple: since all three systems are connected to the KVM switch, they are all monitored. Again, any possible failures are reported via SNMP trap. And just like that KVM makes sure that controllers always have an active system helping them monitor the air traffic.<\/p>\n<p>Another advantage of these three steps: By combining optimised working environments, an active monitoring system and three independent extender lines, controllers will never have to worry about their systems, can work highly concentrated and will always keep their cool. And you might want to have a concentrated air traffic controller if you are on that aeroplane taking you to your well deserved <a href=\"http:\/\/www.tripadvisor.com\/GoListDetail-i538-Favorite_Vacation_Destinations.html\" target=\"_blank\">holidays<\/a>.<\/p>\n<p>What do you think about security and trust in the applications of the ICT industry? What does \u201cManaging Trust\u201d mean to you?<\/p>\n<div class=\"shariff\" data-title=\"\u201cManaging Trust\u201d with KVM &#8211; 3 steps for more security in towers\" data-info-url=\"http:\/\/ct.de\/-2467514\" data-backend-url=\"https:\/\/blog.gdsys.de\/en\/wp-content\/plugins\/shariff-sharing\/backend\/index.php\" data-temp=\"\/tmp\" data-ttl=\"60\" data-service=\"tlx\" data-services='[\"facebook\",\"twitter\",\"linkedin\",\"xing\",\"whatsapp\",\"mail\",\"info\"]' data-image=\"https:\/\/blog.gdsys.de\/en\/files\/2012\/03\/d69e98f303-150x150.jpg\" data-url=\"https:\/\/blog.gdsys.de\/en\/2012\/03\/08\/managing-trust-with-kvm-3-steps-to-make-working-in-towers-more-secure\/\" data-lang=\"en\" data-theme=\"color\" data-orientation=\"horizontal\"><\/div>","protected":false},"excerpt":{"rendered":"<p>With \u201cManaging Trust\u201d as keynote theme, this year\u2019s CeBIT focuses on the topics trust and security in the digital age. According to CeBIT, \u201cthe greater the trust in the solutions and applications of the international ICT industry, the faster the global economy can grow.\u201d But privacy, technical security and the reliability of systems still remain &#8230;<\/p>\n","protected":false},"author":2,"featured_media":63,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[19],"tags":[22,21,20,342,24,23],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u201cManaging Trust\u201d with KVM - 3 steps for more security in towers - Corporate Blog from Guntermann &amp; Drunck<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.gdsys.de\/en\/2012\/03\/08\/managing-trust-with-kvm-3-steps-to-make-working-in-towers-more-secure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u201cManaging Trust\u201d with KVM - 3 steps for more security in towers - Corporate Blog from Guntermann &amp; Drunck\" \/>\n<meta property=\"og:description\" content=\"With \u201cManaging Trust\u201d as keynote theme, this year\u2019s CeBIT focuses on the topics trust and security in the digital age. According to CeBIT, \u201cthe greater the trust in the solutions and applications of the international ICT industry, the faster the global economy can grow.\u201d But privacy, technical security and the reliability of systems still remain ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.gdsys.de\/en\/2012\/03\/08\/managing-trust-with-kvm-3-steps-to-make-working-in-towers-more-secure\/\" \/>\n<meta property=\"og:site_name\" content=\"Corporate Blog from Guntermann &amp; Drunck\" \/>\n<meta property=\"article:published_time\" content=\"2012-03-08T12:00:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-03-08T11:43:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.gdsys.de\/en\/files\/2012\/03\/bc7fa87044.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"659\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bianca Schmidt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/#website\",\"url\":\"https:\/\/blog.gdsys.de\/en\/\",\"name\":\"Corporate Blog from Guntermann &amp; Drunck\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.gdsys.de\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/2012\/03\/08\/managing-trust-with-kvm-3-steps-to-make-working-in-towers-more-secure\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/blog.gdsys.de\/en\/files\/2012\/03\/bc7fa87044.jpg\",\"contentUrl\":\"https:\/\/blog.gdsys.de\/en\/files\/2012\/03\/bc7fa87044.jpg\",\"width\":\"659\",\"height\":\"600\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/2012\/03\/08\/managing-trust-with-kvm-3-steps-to-make-working-in-towers-more-secure\/#webpage\",\"url\":\"https:\/\/blog.gdsys.de\/en\/2012\/03\/08\/managing-trust-with-kvm-3-steps-to-make-working-in-towers-more-secure\/\",\"name\":\"\u201cManaging Trust\u201d with KVM - 3 steps for more security in towers - Corporate Blog from Guntermann &amp; Drunck\",\"isPartOf\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/2012\/03\/08\/managing-trust-with-kvm-3-steps-to-make-working-in-towers-more-secure\/#primaryimage\"},\"datePublished\":\"2012-03-08T12:00:51+00:00\",\"dateModified\":\"2012-03-08T11:43:47+00:00\",\"author\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/19f32c4e990411e27202f043c350ba08\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.gdsys.de\/en\/2012\/03\/08\/managing-trust-with-kvm-3-steps-to-make-working-in-towers-more-secure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.gdsys.de\/en\/2012\/03\/08\/managing-trust-with-kvm-3-steps-to-make-working-in-towers-more-secure\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/2012\/03\/08\/managing-trust-with-kvm-3-steps-to-make-working-in-towers-more-secure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u201cManaging Trust\u201d with KVM &#8211; 3 steps for more security in towers\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/19f32c4e990411e27202f043c350ba08\",\"name\":\"Bianca Schmidt\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/blog.gdsys.de\/en\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/23d836f6091c006c575b48f93a40b64e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/23d836f6091c006c575b48f93a40b64e?s=96&d=mm&r=g\",\"caption\":\"Bianca Schmidt\"},\"description\":\"Redakteurin, \u00dcbersetzerin und Bloggerin bei der Guntermann &amp; Drunck GmbH. Sie finden mich auch auf LinkedIn. Editor, translator and blogger at Guntermann &amp; Drunck. You can find me on LinkedIn.\",\"url\":\"https:\/\/blog.gdsys.de\/en\/author\/schmba\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u201cManaging Trust\u201d with KVM - 3 steps for more security in towers - Corporate Blog from Guntermann &amp; Drunck","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.gdsys.de\/en\/2012\/03\/08\/managing-trust-with-kvm-3-steps-to-make-working-in-towers-more-secure\/","og_locale":"en_US","og_type":"article","og_title":"\u201cManaging Trust\u201d with KVM - 3 steps for more security in towers - Corporate Blog from Guntermann &amp; Drunck","og_description":"With \u201cManaging Trust\u201d as keynote theme, this year\u2019s CeBIT focuses on the topics trust and security in the digital age. According to CeBIT, \u201cthe greater the trust in the solutions and applications of the international ICT industry, the faster the global economy can grow.\u201d But privacy, technical security and the reliability of systems still remain ...","og_url":"https:\/\/blog.gdsys.de\/en\/2012\/03\/08\/managing-trust-with-kvm-3-steps-to-make-working-in-towers-more-secure\/","og_site_name":"Corporate Blog from Guntermann &amp; Drunck","article_published_time":"2012-03-08T12:00:51+00:00","article_modified_time":"2012-03-08T11:43:47+00:00","og_image":[{"width":"659","height":"600","url":"https:\/\/blog.gdsys.de\/en\/files\/2012\/03\/bc7fa87044.jpg","type":"image\/jpeg"}],"twitter_misc":{"Written by":"Bianca Schmidt","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/blog.gdsys.de\/en\/#website","url":"https:\/\/blog.gdsys.de\/en\/","name":"Corporate Blog from Guntermann &amp; Drunck","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.gdsys.de\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/blog.gdsys.de\/en\/2012\/03\/08\/managing-trust-with-kvm-3-steps-to-make-working-in-towers-more-secure\/#primaryimage","inLanguage":"en-US","url":"https:\/\/blog.gdsys.de\/en\/files\/2012\/03\/bc7fa87044.jpg","contentUrl":"https:\/\/blog.gdsys.de\/en\/files\/2012\/03\/bc7fa87044.jpg","width":"659","height":"600"},{"@type":"WebPage","@id":"https:\/\/blog.gdsys.de\/en\/2012\/03\/08\/managing-trust-with-kvm-3-steps-to-make-working-in-towers-more-secure\/#webpage","url":"https:\/\/blog.gdsys.de\/en\/2012\/03\/08\/managing-trust-with-kvm-3-steps-to-make-working-in-towers-more-secure\/","name":"\u201cManaging Trust\u201d with KVM - 3 steps for more security in towers - Corporate Blog from Guntermann &amp; Drunck","isPartOf":{"@id":"https:\/\/blog.gdsys.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.gdsys.de\/en\/2012\/03\/08\/managing-trust-with-kvm-3-steps-to-make-working-in-towers-more-secure\/#primaryimage"},"datePublished":"2012-03-08T12:00:51+00:00","dateModified":"2012-03-08T11:43:47+00:00","author":{"@id":"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/19f32c4e990411e27202f043c350ba08"},"breadcrumb":{"@id":"https:\/\/blog.gdsys.de\/en\/2012\/03\/08\/managing-trust-with-kvm-3-steps-to-make-working-in-towers-more-secure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.gdsys.de\/en\/2012\/03\/08\/managing-trust-with-kvm-3-steps-to-make-working-in-towers-more-secure\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.gdsys.de\/en\/2012\/03\/08\/managing-trust-with-kvm-3-steps-to-make-working-in-towers-more-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u201cManaging Trust\u201d with KVM &#8211; 3 steps for more security in towers"}]},{"@type":"Person","@id":"https:\/\/blog.gdsys.de\/en\/#\/schema\/person\/19f32c4e990411e27202f043c350ba08","name":"Bianca Schmidt","image":{"@type":"ImageObject","@id":"https:\/\/blog.gdsys.de\/en\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/23d836f6091c006c575b48f93a40b64e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/23d836f6091c006c575b48f93a40b64e?s=96&d=mm&r=g","caption":"Bianca Schmidt"},"description":"Redakteurin, \u00dcbersetzerin und Bloggerin bei der Guntermann &amp; Drunck GmbH. Sie finden mich auch auf LinkedIn. Editor, translator and blogger at Guntermann &amp; Drunck. You can find me on LinkedIn.","url":"https:\/\/blog.gdsys.de\/en\/author\/schmba\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts\/57"}],"collection":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/comments?post=57"}],"version-history":[{"count":7,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts\/57\/revisions"}],"predecessor-version":[{"id":62,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/posts\/57\/revisions\/62"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/media\/63"}],"wp:attachment":[{"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/media?parent=57"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/categories?post=57"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.gdsys.de\/en\/wp-json\/wp\/v2\/tags?post=57"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}