SlideShare a Scribd company logo
1 of 5
Download to read offline
TRUST IN
YOUR OFFICE
SOLUTIONS
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE
#3
Not all devices offer the same level of protection for your
networks or the data that exists in your office.
CANON SOLUTIONS
INDUSTRY
STANDARDS
CREATING A
DATA SAFE
PRINT AND
SCAN NETWORK
PRINTER
LANGUAGES
AND DRIVERS
HOW CANON
MITIGATES
RISKS POSED
TO ITS DEVICES
BY MALWARE
The Risks
A heightened awareness of information
security threats to the office have
increased buyer concerns over the
safety of computer printers and other
office equipment.
Risks might arise from the introduction
of malware to the operating systems
of devices, attacks originating from
printer languages like Postscript,
PCL and PJL; or as the result of
manufacturers not complying fully
with the latest industry standards.
In this brochure, find out about the
measures Canon takes to ensure the
printer technologies we recommend,
are safe for your data.
#3 TRUST IN
YOUR OFFICE
SOLUTIONS
YOUROPTIONS
Configure office
devices balance
access to features
against information
security risks
Consider the most
appropriate printer
control languages for
optimised use with
minimum risk
Determine the standards
that matter most when
it comes to protecting
your information,
devices and networks
Explore how a more
secure print and scan
environment can
mitigate device
security risks
• Canon adopts security by design ethos for its products and services; making
sure we build security considerations into the design of products and services.
• We also qualify the credentials of products and services we recommend from
third party suppliers through stringent security tests
• We encourage you to find out more about the advanced security features we
include in our office devices
2 Trust In Your Office Solutions
HOW CANON MITIGATES
RISKS POSED TO ITS
DEVICES BY MALWARE
PRINTER
LANGUAGES
AND DRIVERS
Businesses can minimise
information security risks
by selecting safer printer
languages and drivers.
Mitigate risks from malware
ADOPT A SPECIFICALLY
TAILORED DEVICE
CONFIGURATION THAT
LIMITS DEVICE RISKS
Roll-out of configurations can be centrally
managed, so that your service provider
can perform this service on your behalf.
ENSURE THAT DEVICES
ARE REGULARLY UPDATED
Canon recommends that devices are
configured with Canon eMaintenance.
This ensures that each device receives
the most up-to-date and appropriate
updates as they become available.
CHOOSE CANON DEVICES
Canon’s range of office MFPs, network
printers and scanners adopt strict
controls over administrative privileges
to prevent unauthorised access to, or
manipulation of the device and its
operating system.
• Optimised device configuration
• Centralised software and firmware updates*
• Access restriction to devices
UFR II
• Canon proprietary printer language
• Offers higher performance by supporting the
features a device has—maximising speed,
minimising superfluous programmatic capabilities
• As a proprietary Canon printer language, it is lesser
known, providing more protection from hackers
HP PCL
• Industry standard – business information – widely
used, so also exposed to a higher degree of risk
POSTSCRIPT
• PostScript™ is a powerful language and, as such,
presents more vulnerabilities
• Most commonly used for documents with high
graphical content demanding rich colour printing;
where colour accuracy is important
• Not all versions of PostScript™ are equal and some
are emulated giving a reduced opportunity of
compromising the devise
*Available with specific devices4 Trust In Your Office Solutions Trust In Your Office Solutions 5
With so much focus on end-point devices, it would be
easy to think the security of any device depends solely
on the protection provided by its intrinsic features.
In reality, while risks of malware attacks targeted
towards devices exist , they are far less numerous than
other threats to data security—like an employee walking
away with a list of customers on a USB memory, or a
disgruntled salesperson printing off pages of customer
details and walking out the door with them.
Network architects can do much to protect devices
beyond the security provisioning of the device itself.
For example, thoughtful network infrastructure design,
the segregation of networks and virtualisation of print
and scan networks can do much to add further
strands of protection and control. Securing mobile
access to networks also makes good sense.
THE INDUSTRY STANDARDS
WE ADOPT IN OUR
DEVICES AND WHY A DATA
SAFE PRINT
AND SCAN
NETWORK
SECURE MOBILE
 GUEST
PRINTING
Canon offers a variety of
solutions to enable secure
mobile access to document
printing, scanning and sharing
on networks including for
example provision for
Direct Wi-Fi connection on
imageRUNNER ADVANCE
devices negating the need
to open network access
for guests.
UNIVERSAL
DRIVER
Select output management
software that adopts a
common universal driver
for all devices to minimise
technology variants. This
makes it easier to test and
qualify components, while
removing dependencies on
higher risk printer languages
like Postscript™.
IEEE 2600TM-
2008/ISO15408
This standard specifies
levels of appropriate security
defined depending on the
operating environment,
and security measures are
suggested accordingly.
Various logs allow you to
monitor activity around
your device, including
blocked communication
requests as well as
configuring ports as part of
your security policy settings.
WI-FI DIRECT
Enable peer-to-peer
connection for mobile
printing without the mobile
device needing access to
your network.
IPSEC COMMS
IPSec communication
prevents third parties from
intercepting or tampering
with IP packets transported
over the IP network. Use TLS
encrypted communication to
prevent sniffing, spoofing,
and tampering of data that is
exchanged between the
machine and other devices
such as computers.
IEEE 802.1X
AUTHENTICATION
Unauthorised network access
is blocked by a LAN switch
that only grants access
privileges to client devices
that are authorised by the
authentication server.
USER
AUTHENTICATION
We recommend organisations
adopt secure release
technology that requires users
to identify themselves at the
device before accessing
features. Canon offers a wide
range of User Authentication
methods including pin-code,
NFC, password, contactless
card and biometrics.
ACTIVITY
MONITORING
Canon Data Loss Prevention
(DLP) technologies for
printing offer customers a
robust way of logging and
reporting on user and device
behaviours. The act of
informing Users that device
output activities are being
monitored can be an effective
way to mitigate risk of
internal data breaches.
Industry standards perform an important role in providing consistent
technical specifications for benchmarking office devices. They help
information security professionals to identify security threats and
consistently apply solutions to overcome them.
International standards drive the Information
technology industry and dictate security techniques,
as well as introduce best practices on evaluating criteria
for IT security with the end result of protecting office
devices and the information they process and share.
Devices are safer on a secure
network print and scan environment
6 Trust In Your Office Solutions Trust In Your Office Solutions 7
INTERESTED?
One voice
Our information security team is responsible for
both Canon’s internal information security, and the
advice and solutions we offer to our customer.
Our is an ethos of security and
privacy by design
When we design or select technologies, products
and services for our customers, we consider their
likely information security impact on our customers’
environment, and incorporate security and measures
to enable protection to the desired level.
An inclusive approach
All organisations are different. There is no one-size-
fits-all solution when it comes to formulating a
appropriate information security approach for
your business. At Canon, our approach is to
work closely with our customers to build better
information security together.
Satisfy the information security expectations of:
• Shareholders
• Staff
• Customers
• Suppliers
• Partners
• Guests
• Channel Partners
• Contractors
PostScript is a trademark of Adobe Systems Incorporated
There is no fool-proof plug and
play office security solution.
Every business has to determine
what represents an acceptable
level of risk.
Canon is a pro-active partner to
businesses seeking to keep data
safe as part of a resilient enterprise
information security policy.
Canon Inc.
Canon.com
Canon Europe
canon-europe.com
English Edition
© Canon Europa N.V., 2017
Canon Europe Ltd
3 The Square,
Stockley Park,
Uxbridge,
Middlesex
UB11 1ET
UK
Canon U.K. Ltd
Woodhatch
Reigate
Surrey
RH2 8BF
UK

More Related Content

What's hot

Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionSophos
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
It security
It securityIt security
It securityavi2607
 
Information systems security(1)
Information systems security(1)Information systems security(1)
Information systems security(1)Sandeep Agarwal
 
Software Datasheet Template
Software Datasheet TemplateSoftware Datasheet Template
Software Datasheet TemplateTDSmaker
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...Canon Business CEE
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in misVishal Patyal
 
AUTOMATING DATA FOR IIOT ASSET MANAGEMENT & CONTROL - A HOW TO FRAMEWORK
AUTOMATING DATA FOR IIOT ASSET MANAGEMENT & CONTROL - A HOW TO FRAMEWORKAUTOMATING DATA FOR IIOT ASSET MANAGEMENT & CONTROL - A HOW TO FRAMEWORK
AUTOMATING DATA FOR IIOT ASSET MANAGEMENT & CONTROL - A HOW TO FRAMEWORKAnastasia Govan Kuusk
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtityAhmed Sallam
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL PANKAJKUMAR2519
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theftDeepak John
 
Backstopp Slideshow 2003
Backstopp Slideshow 2003Backstopp Slideshow 2003
Backstopp Slideshow 2003Regan McCarthy
 
Phantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationPhantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationJose Bittencourt
 

What's hot (20)

Preparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless ProtectionPreparing Your School for BYOD with Sophos UTM Wireless Protection
Preparing Your School for BYOD with Sophos UTM Wireless Protection
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
It security
It securityIt security
It security
 
Desktop Services
Desktop ServicesDesktop Services
Desktop Services
 
Software-Brochure-2
Software-Brochure-2Software-Brochure-2
Software-Brochure-2
 
Information systems security(1)
Information systems security(1)Information systems security(1)
Information systems security(1)
 
Software Datasheet Template
Software Datasheet TemplateSoftware Datasheet Template
Software Datasheet Template
 
Solution
SolutionSolution
Solution
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Coud discovery chap 5
Coud discovery chap 5Coud discovery chap 5
Coud discovery chap 5
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
 
AUTOMATING DATA FOR IIOT ASSET MANAGEMENT & CONTROL - A HOW TO FRAMEWORK
AUTOMATING DATA FOR IIOT ASSET MANAGEMENT & CONTROL - A HOW TO FRAMEWORKAUTOMATING DATA FOR IIOT ASSET MANAGEMENT & CONTROL - A HOW TO FRAMEWORK
AUTOMATING DATA FOR IIOT ASSET MANAGEMENT & CONTROL - A HOW TO FRAMEWORK
 
BH SA A4 Brochure
BH SA A4 BrochureBH SA A4 Brochure
BH SA A4 Brochure
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtity
 
INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL INTRODUCTION TO FIREWELL
INTRODUCTION TO FIREWELL
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Backstopp Slideshow 2003
Backstopp Slideshow 2003Backstopp Slideshow 2003
Backstopp Slideshow 2003
 
Phantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop VirtualizationPhantosys overview - Intelligent Desktop Virtualization
Phantosys overview - Intelligent Desktop Virtualization
 

Similar to 8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions

8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...Canon Business CEE
 
Samsung knox the most secure android solution
Samsung knox   the most secure android solutionSamsung knox   the most secure android solution
Samsung knox the most secure android solutionJavier Gonzalez
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung Biz Mobile
 
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and PrinterseLearning Consortium 電子學習聯盟
 
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdfinfo382133
 
CNP Company overview
CNP Company overviewCNP Company overview
CNP Company overviewbwainscott
 
A practical guide to IT security-Up to University project
A practical guide to IT security-Up to University projectA practical guide to IT security-Up to University project
A practical guide to IT security-Up to University projectUp2Universe
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTrihedral
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Security Risk Solutions.pptx
Security Risk Solutions.pptxSecurity Risk Solutions.pptx
Security Risk Solutions.pptxFujifilmFbsg
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
Computer system and network configuration
Computer system and network configurationComputer system and network configuration
Computer system and network configurationVon Alvarez
 
Cloud Printing For SaaS Providers With OM Plus i-Sat
Cloud Printing For SaaS Providers With OM Plus i-SatCloud Printing For SaaS Providers With OM Plus i-Sat
Cloud Printing For SaaS Providers With OM Plus i-SatPlus Technologies
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperMohd Anwar Jamal Faiz
 
KMBS_SECURITY_WHITEPAPER_BRO_nochart_June2014
KMBS_SECURITY_WHITEPAPER_BRO_nochart_June2014KMBS_SECURITY_WHITEPAPER_BRO_nochart_June2014
KMBS_SECURITY_WHITEPAPER_BRO_nochart_June2014Randy Brown
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The CloudStephen Rose
 

Similar to 8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions (20)

8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
 
Samsung knox the most secure android solution
Samsung knox   the most secure android solutionSamsung knox   the most secure android solution
Samsung knox the most secure android solution
 
Samsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android SolutionSamsung KNOX - The Most Secure Android Solution
Samsung KNOX - The Most Secure Android Solution
 
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
 
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
CNP Company overview
CNP Company overviewCNP Company overview
CNP Company overview
 
A practical guide to IT security-Up to University project
A practical guide to IT security-Up to University projectA practical guide to IT security-Up to University project
A practical guide to IT security-Up to University project
 
Ten questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA softwareTen questions to ask before choosing SCADA software
Ten questions to ask before choosing SCADA software
 
Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Security Risk Solutions.pptx
Security Risk Solutions.pptxSecurity Risk Solutions.pptx
Security Risk Solutions.pptx
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Computer system and network configuration
Computer system and network configurationComputer system and network configuration
Computer system and network configuration
 
Cloud Printing For SaaS Providers With OM Plus i-Sat
Cloud Printing For SaaS Providers With OM Plus i-SatCloud Printing For SaaS Providers With OM Plus i-Sat
Cloud Printing For SaaS Providers With OM Plus i-Sat
 
Security is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White PaperSecurity is our duty and we shall deliver it - White Paper
Security is our duty and we shall deliver it - White Paper
 
KMBS_SECURITY_WHITEPAPER_BRO_nochart_June2014
KMBS_SECURITY_WHITEPAPER_BRO_nochart_June2014KMBS_SECURITY_WHITEPAPER_BRO_nochart_June2014
KMBS_SECURITY_WHITEPAPER_BRO_nochart_June2014
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The Cloud
 

More from Canon Business CEE

Canon CEE Customer Loyalty Survey 2018
Canon CEE Customer Loyalty Survey 2018Canon CEE Customer Loyalty Survey 2018
Canon CEE Customer Loyalty Survey 2018Canon Business CEE
 
Certificate EDP Award Vario Print 6000 TITAN
Certificate EDP Award Vario Print 6000 TITAN  Certificate EDP Award Vario Print 6000 TITAN
Certificate EDP Award Vario Print 6000 TITAN Canon Business CEE
 
There's still momentum in mono - Canon CEE
There's still momentum in mono - Canon CEEThere's still momentum in mono - Canon CEE
There's still momentum in mono - Canon CEECanon Business CEE
 
ЭРА МОНОХРОМНОЙ ПЕЧАТИ ПРОДОЛЖАЕТСЯ
ЭРА МОНОХРОМНОЙ ПЕЧАТИ ПРОДОЛЖАЕТСЯЭРА МОНОХРОМНОЙ ПЕЧАТИ ПРОДОЛЖАЕТСЯ
ЭРА МОНОХРОМНОЙ ПЕЧАТИ ПРОДОЛЖАЕТСЯCanon Business CEE
 
Evolution of the Digital Workplace - Office Insights 2018
Evolution of the Digital Workplace - Office Insights 2018Evolution of the Digital Workplace - Office Insights 2018
Evolution of the Digital Workplace - Office Insights 2018Canon Business CEE
 
Canon обновляет широкоформатные МФУ начального уровня
Canon обновляет широкоформатные МФУ начального уровняCanon обновляет широкоформатные МФУ начального уровня
Canon обновляет широкоформатные МФУ начального уровняCanon Business CEE
 
Sell out presentation of Canon varioPRINT 140 series
Sell out presentation of Canon varioPRINT 140 seriesSell out presentation of Canon varioPRINT 140 series
Sell out presentation of Canon varioPRINT 140 seriesCanon Business CEE
 
Canon imageRUNNER C3025i Press Release_Canon CEE
Canon imageRUNNER C3025i Press Release_Canon CEECanon imageRUNNER C3025i Press Release_Canon CEE
Canon imageRUNNER C3025i Press Release_Canon CEECanon Business CEE
 
Canon image formula DR-M260 – безграничные возможности сканирования и обработ...
Canon image formula DR-M260 – безграничные возможности сканирования и обработ...Canon image formula DR-M260 – безграничные возможности сканирования и обработ...
Canon image formula DR-M260 – безграничные возможности сканирования и обработ...Canon Business CEE
 
Government-owned company almost halves printing costs by migrating to uniFLOW...
Government-owned company almost halves printing costs by migrating to uniFLOW...Government-owned company almost halves printing costs by migrating to uniFLOW...
Government-owned company almost halves printing costs by migrating to uniFLOW...Canon Business CEE
 
Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...
Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...
Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...Canon Business CEE
 
Oil industry managed print sevices - (NIS case study) - Canon CEE
Oil industry managed print sevices - (NIS case study) - Canon CEEOil industry managed print sevices - (NIS case study) - Canon CEE
Oil industry managed print sevices - (NIS case study) - Canon CEECanon Business CEE
 
Experience uniFLOW IT Admin - Canon CEE
Experience uniFLOW IT Admin - Canon CEEExperience uniFLOW IT Admin - Canon CEE
Experience uniFLOW IT Admin - Canon CEECanon Business CEE
 
Experience uniFLOW executive - Canon CEE
Experience uniFLOW executive - Canon CEEExperience uniFLOW executive - Canon CEE
Experience uniFLOW executive - Canon CEECanon Business CEE
 
Experience uniFLOW enduser - Canon CEE
Experience uniFLOW enduser - Canon CEEExperience uniFLOW enduser - Canon CEE
Experience uniFLOW enduser - Canon CEECanon Business CEE
 
A scalable print management solution boosts labor productivity and improves d...
A scalable print management solution boosts labor productivity and improves d...A scalable print management solution boosts labor productivity and improves d...
A scalable print management solution boosts labor productivity and improves d...Canon Business CEE
 
Streamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEEStreamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEECanon Business CEE
 
Optimise your payment processes - Canon CEE
Optimise your payment processes - Canon CEEOptimise your payment processes - Canon CEE
Optimise your payment processes - Canon CEECanon Business CEE
 

More from Canon Business CEE (20)

Canon CEE Customer Loyalty Survey 2018
Canon CEE Customer Loyalty Survey 2018Canon CEE Customer Loyalty Survey 2018
Canon CEE Customer Loyalty Survey 2018
 
Certificate EDP Award Vario Print 6000 TITAN
Certificate EDP Award Vario Print 6000 TITAN  Certificate EDP Award Vario Print 6000 TITAN
Certificate EDP Award Vario Print 6000 TITAN
 
There's still momentum in mono - Canon CEE
There's still momentum in mono - Canon CEEThere's still momentum in mono - Canon CEE
There's still momentum in mono - Canon CEE
 
ЭРА МОНОХРОМНОЙ ПЕЧАТИ ПРОДОЛЖАЕТСЯ
ЭРА МОНОХРОМНОЙ ПЕЧАТИ ПРОДОЛЖАЕТСЯЭРА МОНОХРОМНОЙ ПЕЧАТИ ПРОДОЛЖАЕТСЯ
ЭРА МОНОХРОМНОЙ ПЕЧАТИ ПРОДОЛЖАЕТСЯ
 
Evolution of the Digital Workplace - Office Insights 2018
Evolution of the Digital Workplace - Office Insights 2018Evolution of the Digital Workplace - Office Insights 2018
Evolution of the Digital Workplace - Office Insights 2018
 
Océ VarioPrint 6000 TITAN
Océ VarioPrint 6000 TITANOcé VarioPrint 6000 TITAN
Océ VarioPrint 6000 TITAN
 
Canon обновляет широкоформатные МФУ начального уровня
Canon обновляет широкоформатные МФУ начального уровняCanon обновляет широкоформатные МФУ начального уровня
Canon обновляет широкоформатные МФУ начального уровня
 
Sell out presentation of Canon varioPRINT 140 series
Sell out presentation of Canon varioPRINT 140 seriesSell out presentation of Canon varioPRINT 140 series
Sell out presentation of Canon varioPRINT 140 series
 
Canon varioPRINT 140 series
Canon varioPRINT 140 seriesCanon varioPRINT 140 series
Canon varioPRINT 140 series
 
Canon imageRUNNER C3025i Press Release_Canon CEE
Canon imageRUNNER C3025i Press Release_Canon CEECanon imageRUNNER C3025i Press Release_Canon CEE
Canon imageRUNNER C3025i Press Release_Canon CEE
 
Canon image formula DR-M260 – безграничные возможности сканирования и обработ...
Canon image formula DR-M260 – безграничные возможности сканирования и обработ...Canon image formula DR-M260 – безграничные возможности сканирования и обработ...
Canon image formula DR-M260 – безграничные возможности сканирования и обработ...
 
Government-owned company almost halves printing costs by migrating to uniFLOW...
Government-owned company almost halves printing costs by migrating to uniFLOW...Government-owned company almost halves printing costs by migrating to uniFLOW...
Government-owned company almost halves printing costs by migrating to uniFLOW...
 
Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...
Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...
Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...
 
Oil industry managed print sevices - (NIS case study) - Canon CEE
Oil industry managed print sevices - (NIS case study) - Canon CEEOil industry managed print sevices - (NIS case study) - Canon CEE
Oil industry managed print sevices - (NIS case study) - Canon CEE
 
Experience uniFLOW IT Admin - Canon CEE
Experience uniFLOW IT Admin - Canon CEEExperience uniFLOW IT Admin - Canon CEE
Experience uniFLOW IT Admin - Canon CEE
 
Experience uniFLOW executive - Canon CEE
Experience uniFLOW executive - Canon CEEExperience uniFLOW executive - Canon CEE
Experience uniFLOW executive - Canon CEE
 
Experience uniFLOW enduser - Canon CEE
Experience uniFLOW enduser - Canon CEEExperience uniFLOW enduser - Canon CEE
Experience uniFLOW enduser - Canon CEE
 
A scalable print management solution boosts labor productivity and improves d...
A scalable print management solution boosts labor productivity and improves d...A scalable print management solution boosts labor productivity and improves d...
A scalable print management solution boosts labor productivity and improves d...
 
Streamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEEStreamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEE
 
Optimise your payment processes - Canon CEE
Optimise your payment processes - Canon CEEOptimise your payment processes - Canon CEE
Optimise your payment processes - Canon CEE
 

Recently uploaded

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions

  • 1. TRUST IN YOUR OFFICE SOLUTIONS 8 WAYS TO PROTECT THE DATA IN YOUR OFFICE #3
  • 2. Not all devices offer the same level of protection for your networks or the data that exists in your office. CANON SOLUTIONS INDUSTRY STANDARDS CREATING A DATA SAFE PRINT AND SCAN NETWORK PRINTER LANGUAGES AND DRIVERS HOW CANON MITIGATES RISKS POSED TO ITS DEVICES BY MALWARE The Risks A heightened awareness of information security threats to the office have increased buyer concerns over the safety of computer printers and other office equipment. Risks might arise from the introduction of malware to the operating systems of devices, attacks originating from printer languages like Postscript, PCL and PJL; or as the result of manufacturers not complying fully with the latest industry standards. In this brochure, find out about the measures Canon takes to ensure the printer technologies we recommend, are safe for your data. #3 TRUST IN YOUR OFFICE SOLUTIONS YOUROPTIONS Configure office devices balance access to features against information security risks Consider the most appropriate printer control languages for optimised use with minimum risk Determine the standards that matter most when it comes to protecting your information, devices and networks Explore how a more secure print and scan environment can mitigate device security risks • Canon adopts security by design ethos for its products and services; making sure we build security considerations into the design of products and services. • We also qualify the credentials of products and services we recommend from third party suppliers through stringent security tests • We encourage you to find out more about the advanced security features we include in our office devices 2 Trust In Your Office Solutions
  • 3. HOW CANON MITIGATES RISKS POSED TO ITS DEVICES BY MALWARE PRINTER LANGUAGES AND DRIVERS Businesses can minimise information security risks by selecting safer printer languages and drivers. Mitigate risks from malware ADOPT A SPECIFICALLY TAILORED DEVICE CONFIGURATION THAT LIMITS DEVICE RISKS Roll-out of configurations can be centrally managed, so that your service provider can perform this service on your behalf. ENSURE THAT DEVICES ARE REGULARLY UPDATED Canon recommends that devices are configured with Canon eMaintenance. This ensures that each device receives the most up-to-date and appropriate updates as they become available. CHOOSE CANON DEVICES Canon’s range of office MFPs, network printers and scanners adopt strict controls over administrative privileges to prevent unauthorised access to, or manipulation of the device and its operating system. • Optimised device configuration • Centralised software and firmware updates* • Access restriction to devices UFR II • Canon proprietary printer language • Offers higher performance by supporting the features a device has—maximising speed, minimising superfluous programmatic capabilities • As a proprietary Canon printer language, it is lesser known, providing more protection from hackers HP PCL • Industry standard – business information – widely used, so also exposed to a higher degree of risk POSTSCRIPT • PostScript™ is a powerful language and, as such, presents more vulnerabilities • Most commonly used for documents with high graphical content demanding rich colour printing; where colour accuracy is important • Not all versions of PostScript™ are equal and some are emulated giving a reduced opportunity of compromising the devise *Available with specific devices4 Trust In Your Office Solutions Trust In Your Office Solutions 5
  • 4. With so much focus on end-point devices, it would be easy to think the security of any device depends solely on the protection provided by its intrinsic features. In reality, while risks of malware attacks targeted towards devices exist , they are far less numerous than other threats to data security—like an employee walking away with a list of customers on a USB memory, or a disgruntled salesperson printing off pages of customer details and walking out the door with them. Network architects can do much to protect devices beyond the security provisioning of the device itself. For example, thoughtful network infrastructure design, the segregation of networks and virtualisation of print and scan networks can do much to add further strands of protection and control. Securing mobile access to networks also makes good sense. THE INDUSTRY STANDARDS WE ADOPT IN OUR DEVICES AND WHY A DATA SAFE PRINT AND SCAN NETWORK SECURE MOBILE GUEST PRINTING Canon offers a variety of solutions to enable secure mobile access to document printing, scanning and sharing on networks including for example provision for Direct Wi-Fi connection on imageRUNNER ADVANCE devices negating the need to open network access for guests. UNIVERSAL DRIVER Select output management software that adopts a common universal driver for all devices to minimise technology variants. This makes it easier to test and qualify components, while removing dependencies on higher risk printer languages like Postscript™. IEEE 2600TM- 2008/ISO15408 This standard specifies levels of appropriate security defined depending on the operating environment, and security measures are suggested accordingly. Various logs allow you to monitor activity around your device, including blocked communication requests as well as configuring ports as part of your security policy settings. WI-FI DIRECT Enable peer-to-peer connection for mobile printing without the mobile device needing access to your network. IPSEC COMMS IPSec communication prevents third parties from intercepting or tampering with IP packets transported over the IP network. Use TLS encrypted communication to prevent sniffing, spoofing, and tampering of data that is exchanged between the machine and other devices such as computers. IEEE 802.1X AUTHENTICATION Unauthorised network access is blocked by a LAN switch that only grants access privileges to client devices that are authorised by the authentication server. USER AUTHENTICATION We recommend organisations adopt secure release technology that requires users to identify themselves at the device before accessing features. Canon offers a wide range of User Authentication methods including pin-code, NFC, password, contactless card and biometrics. ACTIVITY MONITORING Canon Data Loss Prevention (DLP) technologies for printing offer customers a robust way of logging and reporting on user and device behaviours. The act of informing Users that device output activities are being monitored can be an effective way to mitigate risk of internal data breaches. Industry standards perform an important role in providing consistent technical specifications for benchmarking office devices. They help information security professionals to identify security threats and consistently apply solutions to overcome them. International standards drive the Information technology industry and dictate security techniques, as well as introduce best practices on evaluating criteria for IT security with the end result of protecting office devices and the information they process and share. Devices are safer on a secure network print and scan environment 6 Trust In Your Office Solutions Trust In Your Office Solutions 7
  • 5. INTERESTED? One voice Our information security team is responsible for both Canon’s internal information security, and the advice and solutions we offer to our customer. Our is an ethos of security and privacy by design When we design or select technologies, products and services for our customers, we consider their likely information security impact on our customers’ environment, and incorporate security and measures to enable protection to the desired level. An inclusive approach All organisations are different. There is no one-size- fits-all solution when it comes to formulating a appropriate information security approach for your business. At Canon, our approach is to work closely with our customers to build better information security together. Satisfy the information security expectations of: • Shareholders • Staff • Customers • Suppliers • Partners • Guests • Channel Partners • Contractors PostScript is a trademark of Adobe Systems Incorporated There is no fool-proof plug and play office security solution. Every business has to determine what represents an acceptable level of risk. Canon is a pro-active partner to businesses seeking to keep data safe as part of a resilient enterprise information security policy. Canon Inc. Canon.com Canon Europe canon-europe.com English Edition © Canon Europa N.V., 2017 Canon Europe Ltd 3 The Square, Stockley Park, Uxbridge, Middlesex UB11 1ET UK Canon U.K. Ltd Woodhatch Reigate Surrey RH2 8BF UK