Log in

ISM Article

Six Security Solutions to make your

31 May, 2005 By: Larry Kovnat imageSource

Six Security Solutions to make your

Threats to information security
are appearing more frequently and are of greater magnitude than ever before. The
threats can come both internally and externally and can be online, accidental or
purposefully malicious.

Since most of an organization’s secure information resides in documents,
document security has become an area of high importance. According to Dan
Corsetti, an analyst at market research firm IDC, document security is a
pressing concern for organizations in most industries.

"With regulations around privacy, document security is one of the greatest
challenges and demands on IT personnel and users in the market today," Corsetti
said. “Businesses are looking for security features that allow them to trust
their information systems and networks to function as required.”

While the need for document security is becoming widely recognized by dealers,
many companies are still unaware of what a major threat networked peripherals
can be. Each time a document is copied, printed, scanned or faxed, an image is
left behind on the system’s hard drive. That’s as much at risk of getting hacked
as the information on a PC.

Government, military, healthcare, legal, and financial sectors have started to
catch on due to a recent increase in regulations surrounding privacy, such as
HIPAA, Sarbanes-Oxley and Gramm-Leach-Bliley.

In order to help customers, vendors are now seeking the National Information
Assurance Partnership’s (NIAP) Common Criteria Certification for their products.
This internationally recognized security standard for IT products is a U.S
government initiative designed to meet the security testing needs of both
information technology manufacturers and users. The security evaluation, which
is required by the Department of Defense, includes analysis of products and the
testing of them for conformance to a set of security requirements.

Federal agencies and industries, including financial, insurance and legal, are
seeking third-party assurance from NIAP. By adopting the standards that federal
government agencies must meet for information security, organizations can be
confident that they are meeting the security and privacy needs for their most
sensitive information.

In addition to watching for the Common Criteria stamp of approval, buyers can
look at machines’ security features. Below are some examples of security options
you should be offering your customers:

1. Embedded Fax

While firewalls prevent unauthorized access to a customer’s system through the
network connection, unprotected fax connections in multifunction devices can be
an open back door into the network. Embedded fax offers complete separation of
the fax telephone line and the network connection.

2. Image Overwrite Option

Image overwrite security electronically “shreds” information stored on the hard
disk of devices as part of routine job processing. The electronic erasing can be
performed automatically when each print job is completed, or reset manually as
needed. During normal operation, an MFP temporarily stores image data on the
hard drive. The image overwrite function eradicates customer data by repeatedly
overwriting the disk surface with specific patterns of data.

3. Internal Auditron

People are required to enter an authorization code to use walk-up copy features
of the device. Administrators can also limit the number of copies available for
each person, track usage at an account or department level, and download data to
a PC to generate audit reports.

4. Network Authentication

Access to scan, email and fax features can be restricted by verifying network
user names and passwords in network directories prior to use of these functions.

5. Removable Disk

Drive Accessory Administrators can physically remove hard drives from the
machines, virtually eliminating the risk of unauthorized access to classified

6. Secure Print

Jobs are safely stored at the device until the owner enters a personal number to
release them. This controls unauthorized viewing of documents sent to the

Letting your customers know about the potential security risks they face, and
offering security solutions such as those mentioned above to them, makes you a
more valuable partner for clients now and in the future.

WebinarCase Studies and White PapersSand Exchange Blog

imageSource Magazine Quick Links
Upcoming Events
ITEX Expo & Conference
©2015 Questex, LLC. All rights reserved
Reproduction in whole or part is prohibited
Please send any technical comments or questions to our webmaster