Print.IT Reseller - issue 104

01732 759725 42 VOX POP continued... Print security like all other security is about finding the right level of protection in relation to the data that is being handled Mark Ash, CRO, Konica Minolta: The Quocirca Print Security Landscape, 2022 report showed that 70 per cent of respondents expect their print security spend to increase during the next 12 months, which is almost matched by 68 per cent who say they had data loss due to print security failures in the past year. If print security had been viewed as a lower priority in the past, clearly that is no longer the case. In our experience customers are increasingly aware of the dangers and the need to ensure their security, particularly with hybrid and remote working stretching their potential vulnerability beyond the more traditional workplace-based environment. We include embedded security in our products to ensure there is always a choice to better protect print security which has been well received by the market and we have seen a clear increase in demand for additional services which ensure that print doesn’t become the weak link in any IT network. Richard Hall, Solutions Manager, UTAX: UTAX has seen a huge increase in customers concerned about print security, and their IT security as a whole. Since the pandemic, the print landscape has changed with the increase of hybrid working patterns. As a result, security and audit capabilities were put in jeopardy, and hardware and solutions providers have had to modify their security offerings to prevent data breaches. Most multifunctional devices are often overlooked by IT professionals and deployed across their networks, not realising each MFP is effectively a network server and prone to attack. Arjan Paulussen, Managing Director, Western Europe & English Speaking Africa, Lexmark: Print security may have been one of the areas often overlooked in the past. However, it has risen in importance within the IT infrastructure over the last few years. This may be because of increased awareness around the pitfalls of not effectively securing your print devices – as it offers attackers back door access to a business's entire IT infrastructure. PrintIT Reseller: I think it’s fair to say that all printer brands offer a robust set of hardware-centric security features, but is that enough in itself to convince customers that their print infrastructure is secure or is the real valueadd in delivering adjacent software and services? Jon Palin: : We always encourage clients to use some of the built-in features such as secure print and ID code/account track if they are not taking up the optional add-on software such as Bitdefender, Trusted Platform Module, PDF encryption (LK-102 v3). Although we will always encourage additional security software options, very few clients take up this option apart from heavily secure sites or governmentbased industries. We do have a lot of clients that use PaperCut to track and securely release print jobs (although this also has to have regular security patches and updates). Clients seem quite happy to invest in the cost of PaperCut to manage and track their printing with schools and medium to large customers using the product. It has been around for a long time now and customers are still sceptical about changing to systems and products they are not sure of. Mark Bailey: In my view the leading printer brands have an obligation to take charge of the security of their own products. Whilst some might be a little late to the party, it’s good to see most of them now taking this seriously. With regards to the value-adding proposition for software it really depends on the business’ needs and requirements. For example, one device with a small user base will have completely different requirements to a multi-device print fleet with a large user base. With our consultancy-based approach we work with the client and explore if the combined package is necessary or if the standalone route will be adequate security for their network. Andy Ratcliffe: While printer brands do offer a set of hardware security features, it can sometimes be difficult for customers to differentiate which will best suit their needs now and in the future. We have been working with manufacturers to create an understanding of all their unique features and compress it into a simple cheat sheet. That being said, putting an extra safety net in place does bring our customers peace of mind, especially products in our last line of defence cyber security range. Prevention is better than a cure in these cases. Martin Randall: Whilst the market has indeed seen hardware vendors invest in more robust embedded security features, these can become a management bottleneck if they aren’t part of wider, centrally managed security ecosystem. Many of the latest generation multifunctional devices can have in excess of 250 security protocols and settings; managing these on a per-device basis, particularly in larger enterprise deployments, is no longer practical. To that end we utilise a portfolio of products and services to support and automate the proactive management of these features. Kerry Rush: As both a manufacturer and service provider, we need to take a holistic view and understand our customers’ requirements overall; ensuring we provide the right solutions which often come in combination with hardware and process implementation. Essentially, each solution must be tailored to individual customer needs. Mark Ash: Print security like all other security is about finding the right level of protection in relation to the data that is being handled. Standard hardware-based security features will be perfect for many applications, enabling the operator and user to adhere to the likes of GDPR when printing documents that include standard personal details (including identifying information such as email addresses etc). However, if you have a situation where you are printing highly confidential details that are subject to even stricter privacy regulations (such as the Markets in Financial Instruments Directive – MiFID) then it is imperative that additional security measures are in place to ensure compliance. We have taken the approach that there needs to be plenty of choice when it comes to finding the Mark Ash

RkJQdWJsaXNoZXIy NDUxNDM=