Skip to Content Skip to footer
Para ver o conteúdo específico da sua localização, retorne ao país ou região que corresponde à sua localização.


Kensington Slim NanoSaver® 2.0 hordozható kulcsos laptopzár

SKU K65026M


ZárTípus


Confirm Cart

You have items in your cart. Do you want to checkout with these items?

You have items in your cart. Do you want to checkout with these items?
Cart Items
Icon/Chevron Down
Cart Summary
Estimates based on ...
Item total (...): ...
Savings: ...
Est. Shipping:
...
Est. Tax:
...

Cart Total: ...
Cancel
Cart Summary
Icon/Chevron Down

Estimates based on ...
Item total (...): ...
Savings:
...
...
Est. Shipping:
...
Est. Tax:
...

Cart Total: ...
Cancel

Self-Coiling Carbon Steel Cable

Easily transportable and cut-resistant, stretching up to six feet (1.8m) and shrinking down to three inches (76mm). Protective sheathing helps keep attachment points such as desks and tables free from scratches.

Won’t Block Ports, Allows Ultra-Thin & 2-in-1 Laptops to Lie Flat and Stable

Slim nano lock head design won’t interfere with I/O ports or raise the device off its surface.

Verified and Tested

Each Kensington lock is precision engineered to meet or exceed rigorous industry standards for strength, physical endurance, and mechanical resilience.

5mm Keying System

Common across all of Kensington’s latest locks, so there’s only one keying system to manage. Smaller key opening helps thwart picking attempts.

Register & Retrieve™

Kensington’s online key registration program that allows for quick, secure, and free key replacement if ever lost or stolen.

Five-Year Limited Warranty

Rest assured knowing you’re covered by Kensington, inventor and a worldwide leader in laptop security locks.

Master Keyed

Provides administrative access, so the IT manager can have a key for all locks while each user has their own individual lock and key. Each employee can protect their device with their lock while a master key provides IT universal access to unlock any piece of equipment for upgrades, relocation, replacement or misplaced/lost keys.

Controles do Anexo A da ISO/IEC 27001

O uso deste produto auxilia na mitigação riscos para sua organização em termos de confidencialidade, integridade e disponibilidade de dados, e pode ajudar a atender aos controles do Anexo A 7.7, 7.8 e 7.9.



Especificações do Produto