First Intel-Certified Thunderbolt™ 5 Dock

First Intel-Certified Thunderbolt™ 5 Dock

Seamless multi-monitor setups, 80Gbps transfers, 120Gbps bandwidth boost, and 140W power delivery.

Learn more

Skip to Content Skip to footer
To see content specific to your location, return to the country or region that matches your location..


N17 2.0 轻薄型钥匙式电脑锁(适用于楔形锁孔)

SKU K60500WW


防盗锁类型


Buying in Bulk?

Request a Quote

Confirm Cart

You have items in your cart. Do you want to checkout with these items?

You have items in your cart. Do you want to checkout with these items?
Cart Items
Icon/Chevron Down
Cart Summary
Estimates based on ...
Item total (...): ...
Savings: ...
Est. Shipping:
...
Est. Tax:
...

Cart Total: ...
Cancel
Cart Summary
Icon/Chevron Down

Estimates based on ...
Item total (...): ...
Savings:
...
...
Est. Shipping:
...
Est. Tax:
...

Cart Total: ...
Cancel

Slim Profile

Made especially for ultra-thin and 2-in-1 laptops. Tested and approved by Dell.

Does Not Block Valuable Ports

Allows for full use of laptop’s ports.

Allows Laptop to Lie Flat and Stable

Won’t raise the laptop off its surface and cause it to wobble.

Verified and Tested

Each Kensington lock is precision engineered to meet or exceed rigorous industry standards for strength, physical endurance, and mechanical resilience.

Six-Foot (1.8m) Carbon Steel Cable with Omnidirectional Pivoting Head and Rotating Anchor

Delivers the same level of cut-resistance and theft-resistance as thicker cables. Special hinges create great freedom of movement, eliminating awkward angles and allowing you to insert your key with complete ease.

5mm Keying System

Common across all of Kensington’s latest locks, so there’s only one keying system to manage.

Register & Retrieve™

Kensington’s online key registration program that allows for quick, secure, and free key replacement if ever lost or stolen.

Five-Year Warranty

Rest assured knowing you’re covered by Kensington, inventor and worldwide leader in laptop security locks.

ISO/IEC 27001 Annex A Controls

Using this product can help mitigate the risk to your organization in terms of confidentiality, integrity and availability of data and can help meet Annex A 7.7, 7.8 and 7.9 controls



Product Specifications