Kensington logo

Kensington: The Professional’s Choice

Enhance your workplace with quality products built for professionals with Kensington and CDW.

About Kensington

Kensington is a leading provider of desktop and mobile device accessories, trusted by IT, educators, business and home office professionals around the world for more than 35 years. Kensington strives to anticipate the needs and challenges of the ever-evolving workplace and craft professional-tier, award-winning solutions.

For advice, contact your dedicated account manager.

Call 800.800.4239

Stay Connected

Every Kensington docking station is quality-tested above industry standards and comes backed by extended warranties and unmatched sales support.

Try a Docking Station Today

Simply describe your organization’s docking needs and Kensington’s ProConcierge Program will configure a personalized solution for you to try, with no obligation to buy.


Wellness Equals Productivity

Kensington takes pride in making today’s essential business tools efficient, effective and easy to use. Help users become more productive, confident and comfortable as they live and work with the latest devices.  


Prevent Visual Hacking​

Privacy begins on screen. Prevent unauthorized viewing with a limited viewing angle of 30⁰ +/-. Kensington's patented magnetic design allowing for quick screen attachment and removal.


Other Security Solutions​

From computer cable locks, to biometrics and electronic locking, Kensington will keep your devices and information right where they belong.​


Resources

Hybrid Workspace Solutions

Kensington's security, connectivity and mobility solutions ensure business continuity and employee productivity.

View Infographic (PDF)


The Changing Office Environment

The return to work means new cleaning protocols, mobility solutions and office layouts. Let Kensington help configure your return-to-work strategy.

Read White Paper (PDF)


Improve Security with VeriMark Guard

Grow your remote workforce with VeriMark Guard and Azure Active Directory into your identity verification protocols.

Read Solution Overview (PDF)