Skip to Content Skip to footer
Para ver o conteúdo específico da sua localização, retorne ao país ou região que corresponde à sua localização.


Slim NanoSaver® 2.0 Keyed Laptop Lock

SKU K65022L


TipoDeTrava


Confirm Cart

You have items in your cart. Do you want to checkout with these items?

You have items in your cart. Do you want to checkout with these items?
Cart Items
Icon/Chevron Down
Cart Summary
Estimates based on ...
Item total (...): ...
Savings: ...
Est. Shipping:
...
Est. Tax:
...

Cart Total: ...
Cancel
Cart Summary
Icon/Chevron Down

Estimates based on ...
Item total (...): ...
Savings:
...
...
Est. Shipping:
...
Est. Tax:
...

Cart Total: ...
Cancel

Won’t Block Ports, Allows Ultra-Thin & 2-in-1 Laptops to Lie Flat and Stable

Slim nano lock head design won’t interfere with I/O ports or raise the device off its surface.

Verified and Tested

Each Kensington lock is precision engineered to meet or exceed rigorous industry standards for strength, physical endurance, and mechanical resilience.

Six-Foot (1.8m) Carbon Steel Cable

Resists cutting attempts. Protective sheathing helps keep attachment points such as desks and tables free from scratches.

5mm Keying System

Common across all of Kensington’s latest locks, so there’s only one keying system to manage. Smaller key opening helps thwart picking attempts.

Register & Retrieve™

Kensington’s online key registration program that allows for quick, secure, and free key replacement if ever lost or stolen.

Five-Year Limited Warranty

Rest assured knowing you’re covered by Kensington, inventor and a worldwide leader in laptop security locks.

Like Keyed

Provides administrative access designed for wider flexibility and freedom to all equipment. This solution provides employees with identical keys that can open all locks, offering a solid layer of security against non-employee theft without restricting employee access and productivity.

Controles do Anexo A da ISO/IEC 27001

O uso deste produto auxilia na mitigação riscos para sua organização em termos de confidencialidade, integridade e disponibilidade de dados, e pode ajudar a atender aos controles do Anexo A 7.7, 7.8 e 7.9.



Especificações do Produto