First Intel-Certified Thunderbolt™ 5 Dock

First Intel-Certified Thunderbolt™ 5 Dock

Seamless multi-monitor setups, 80Gbps transfers, 120Gbps bandwidth boost, and 140W power delivery.

Learn more

Skip to Content Skip to footer
To see content specific to your location, return to the country or region that matches your location...


Slim NanoSaver® 2.0 Portable Keyed Laptop Lock

SKU K65025WW


LockType


Buying in Bulk?

Request a Quote

Confirm Cart

You have items in your cart. Do you want to checkout with these items?

You have items in your cart. Do you want to checkout with these items?
Cart Items
Icon/Chevron Down
Cart Summary
Estimates based on ...
Item total (...): ...
Savings: ...
Est. Shipping:
...
Est. Tax:
...

Cart Total: ...
Cancel
Cart Summary
Icon/Chevron Down

Estimates based on ...
Item total (...): ...
Savings:
...
...
Est. Shipping:
...
Est. Tax:
...

Cart Total: ...
Cancel

Self-Coiling Carbon Steel Cable

Easily transportable and cut-resistant, stretching up to six feet (1.8m) and shrinking down to three inches (76mm). Protective sheathing helps keep attachment points such as desks and tables free from scratches.

Won’t Block Ports, Allows Ultra-Thin & 2-in-1 Laptops to Lie Flat and Stable

Slim nano lock head design won’t interfere with I/O ports or raise the device off its surface.

Verified and Tested

Each Kensington lock is precision engineered to meet or exceed rigorous industry standards for strength, physical endurance, and mechanical resilience.

5mm Keying System

Common across all of Kensington’s latest locks, so there’s only one keying system to manage. Smaller key opening helps thwart picking attempts.

Register & Retrieve™

Kensington’s online key registration program that allows for quick, secure, and free key replacement if ever lost or stolen.

Five-Year Limited Warranty

Rest assured knowing you’re covered by Kensington, inventor and a worldwide leader in laptop security locks.

ISO/IEC 27001 Annex A Controls

Using this product can help mitigate the risk to your organization in terms of confidentiality, integrity and availability of data and can help meet Annex A 7.7, 7.8 and 7.9 controls



Product Specifications