Print.IT Reseller - issue 61

01732 759725 46 VOX POP ...continued of security across all of our products – from enterprise to SMB. We start with the small things that make a big difference like secure logins for users and ensure customers are aware that unsecured printing networks can actually be the weak link in an overall secure IT landscape. Our secure remote management provides a wide range of tools and device capabilities to effectively manage a fleet of networked laser printers and multifunction products. Mangers can restrict device management to authorised personnel and secure device settings through a combination of rigorously enforced device access, audit logging, digitally signed firmware upgrades, certificate management, HTTPS, SNMPv3 and secure password reset. “Our understanding of network environments and relevant security threats, particularly in relation to printing, gives us the knowledge to create unique solutions that secure our customers’ data in every possible way – a capability we’ve proven by working and overcoming security challenges in some of the most highly regulated organisations and industries on earth.” Aaron Anderson: “We previously evaluated all the potential multifunctional printer security weakness areas and compiled a check list of key areas for organisations to secure. These include: Capture – scanning and copying documents to uncontrolled destinations can breach data protection guidelines. Output tray, machine operating system, ports and protocols, management – without regular device scanning, persistent security holes could be exploited; network, cloud connection, device storage, operation panel and the human factor – employees can leave sensitive information on their desk. “The battle to eliminate cyber threats against print devices is entering a new chapter, with new risks and improved technological solutions. There is cause to be optimistic. But organisations must act now to significantly decrease their risk of falling victim.” Dave Weston: “Often, the risks that organisations run come down to bad working practice. One of the most common is users pressing print and then leaving confidential information uncollected on the printer exit tray. OKI looks to educate customers through its professional services team and its team of account managers about this kind of risk as well as the risk of hacks and other more complex cybersecurity breaches. “We also showcase our range of security solutions, including our SENDYS software suite to customers and prospects. SENDYS enables users to achieve secure document print release, which allows them to send a print job to a device but then have the peace of mind of knowing that it will only print off if they swipe a special pass or ID card or input a specific PIN number. “OKI also has encrypted secure passwords built into its printer drivers, so if users are sending a print job containing sensitive information, they can rest assured that hackers would not be able to access it.” James Pittick: “We take printer security extremely seriously and work in close collaboration with our partners to ensure security is at the heart of any deployment. We recommend that organisations follow a four-step approach to their security: audit and assess, protect the environment, be smart with devices and print systems and adopt a policy for protection. Following these steps puts cyber security at the heart of the internet-enabled workplace and avoids the common pitfalls of printer security. “We’re also continually working to make sure our products remain at the forefront of security. For example, the features at the core of our latest imageRUNNER ADVANCE third generation offers 360 security which covers document, network and device. By investing in the latest technology, and ensuring staff are properly trained and aware, the risks from printer security can be greatly reduced.” www.fiduciaconsultancy.co.uk www.followme.ringdale.com/ www.sharp.eu www.ysoft.com www.lexmark.co.uk www.kyoceradocumentsolutions. co.uk www.oki.com/uk www.canon.co.uk Part two – the channel’s perspective will appear in the next issue. Tony Lomax James Turner

RkJQdWJsaXNoZXIy NDUxNDM=