Key Source International Unveils Auto-Locking Keyboard to Protect Sensitive Data

Key Source International has announced the SonarLocID, an integrated keyboard that addresses the most important aspect of workstation security: the logoff.

The SonarLocID keyboard solves security risks and privacy concerns with unattended computers. It uses integrated presence detection technology to identify whether a user is physically present. The workstation will remain active as long as the user is present but will securely lock when the user physically steps away, usually one meter or less from the sonar detector. Distance and timing are set by the SonarLocID software utility. Upon return, the SonarLocID will prompt the user for his or her username, password or proximity badge or fingerprint biometrics.

“The need for information security and protecting corporate data along with meeting government compliance is more of an imperative then ever. Leaving an unattended computer open with sensitive company data or patient information for all to see could cost your employer millions of dollars, in fines and stolen intellectual property. Or worst yet, it could cost you your job,” said Phil Bruno, vice president of marketing at Key Source International.

The SonarLocID keyboard attaches to the PC via a USB port and comes with a programming utility that allows the user to program custom keystrokes and delays to send a sequence to lock the computer when the user walks away. In addition, you can easily program commands for walk up prompts for re-authentication. No software is deployed on the client or server, just onboard configurable flash memory that holds user-definable keystrokes, delays and settings. The SonarLocID keyboard can be programmed to work seamlessly with most of the popular enterprise single-sign on and Web-based security applications.


Featured

  • Progressing in Capabilities

    Progressing in Capabilities

    Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments. Read Now

  • A Comprehensive Nationwide Solution

    A Comprehensive Nationwide Solution

    Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed. Read Now

  • Planning for Your Perimeter

    Planning for Your Perimeter

    The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable. Read Now

  • The Key Issue

    The Key Issue

    It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door. Read Now

Featured Cybersecurity

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • VideoEdge 2U High Capacity Network Video Recorder

    VideoEdge 2U High Capacity Network Video Recorder

    Johnson Controls announces a powerful recording solution to meet demanding requirements with its VideoEdge 2U High Capacity Network Video Recorder. This solution combines the powerful capabilities of victor with the intelligence of VideoEdge NVRs, fueled by Tyco Artificial Intelligence, for video management that provides actionable insights to save time, money and lives. 3

  • CyberAudit Introduced to Manage Systems, Intuitive Interface

    CyberAudit Web

    CyberLock, Inc. announces the release of CyberAudit Web 9.4! CyberAudit-Web (CAW), the software suite for managing CyberLock systems, provides an intuitive interface to assign keys, set expirations, monitor staff and configure access schedules. 3