Skip to Content Skip to footer
Para ver o conteúdo específico da sua localização, retorne ao país ou região que corresponde à sua localização.


Universal 3-in-1 Keyed Laptop Lock

SKU K62319M


TipoDeTrava


Confirm Cart

You have items in your cart. Do you want to checkout with these items?

You have items in your cart. Do you want to checkout with these items?
Cart Items
Icon/Chevron Down
Cart Summary
Estimates based on ...
Item total (...): ...
Savings: ...
Est. Shipping:
...
Est. Tax:
...

Cart Total: ...
Cancel
Cart Summary
Icon/Chevron Down

Estimates based on ...
Item total (...): ...
Savings:
...
...
Est. Shipping:
...
Est. Tax:
...

Cart Total: ...
Cancel

One Lock for Any Slot

Fits standard, nano, or wedge-shaped laptop security slots, regardless of brand or generation, helping to “future-proof” your locking solution. Lock tips are easily changed; a tether keeps unused lock tips handy.

5mm Keying System

Common across all of Kensington’s latest locks, so there’s only one keying system to manage. Smaller key opening helps thwart picking attempts.

Patented Anti-Pick Hidden Pin™ Technology and Carbon Steel Cable

Resists tampering and offers peace-of-mind. 1.8m (6 ft.) cable with plastic sheath delivers cut and theft resistance.

Pivot and Rotate Lock Head

A special hinge allows flexible movement and easy key insertion.

Register & Retrieve™

Kensington’s online key registration program that allows for quick, secure, and free key replacement if ever lost or stolen.

Verified and Tested

Each Kensington lock is precision engineered to meet or exceed rigorous industry standards for strength, physical endurance, and mechanical resilience.

Master keyed

Provides administrative access so IT managers can have a key for all locks while each user has their own individual lock and key.

5-Year Warranty

Rest assured knowing you’re covered by Kensington, inventor and worldwide leader in laptop security locks.

Controles do Anexo A da ISO/IEC 27001

O uso deste produto auxilia na mitigação riscos para sua organização em termos de confidencialidade, integridade e disponibilidade de dados, e pode ajudar a atender aos controles do Anexo A 7.7, 7.8 e 7.9.



Especificações do Produto