SlideShare a Scribd company logo
1 of 5
Download to read offline
SECURE
YOUR
OFFICE IOT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE
#4
IOT devices – MFDs, printers, scanners – don’t always arrive
‘data safe’ out of the box. Canon offers device hardening profiles
and services, configuring devices to precisely align settings with
incumbent security policies. Our approach is predicated on
a pre-assessment of a customers perceived risk appetite.
CANON SOLUTIONS
ENTERPRISE
OFFICE
Designed to achieve
optimal device hardening
for more demanding
security needs in excess
of 50 devices.
CUSTOM
SERVICE
Tailored to your discerning
device hardening needs.
(to-order option)
MID-SIZED
BUSINESS
OFFICE
Designed to achieve an
above average level of
device hardening with 5
to 50 devices.
SMALL OFFICE
NETWORK
Designed to satisfy a
base level of device
hardening expectations
for businesses with fewer
than five devices.
The Risks
Modern Multifunction Devices (MFDs)
provide print, copy, scan, send and fax
functionality. MFDs are computer
servers in their own right, providing a
number of networked services along
with significant hard drive storage.
When an organisation introduces these
devices into their infrastructure, there
are a number of areas that should be
addressed as part of the wider security
strategy, which should look to protect
the confidentiality, integrity and
availability of your networked systems.
Deployments differ and organisations
will have their own specific security
requirements. While we work together
to ensure that Canon devices are
shipped with appropriate initial security
settings, we aim to further support this
by providing a number of configuration
settings to enable you to more closely
align the device to the requirements of
your specific situation.
#4 SECURE
YOUR OFFICE
DEVICES
2 Secure Your Office IOT
Small Businesses rarely have in-house
technical experts to install devices and
offer advice on matters of device,
document and office network security.
For this reason, out-of-the-box
cloud and appliance solutions are
generally preferred.
Typically, this will be a small business
environment with an un-segmented
network topology. It uses one or two
MFDs for its internal use and these
devices are not accessible on the Internet.
Mobile applications are extremely
popular in small businesses that lack
infrastructure and these are available,
however additional solution
components will be required. For those
users operating printer services outside
of a LAN environment, a secure
connection is needed.
Canon’s small office network device
hardening focuses on basic intrinsic
device security, although attention
is paid to the security of the data
in transit between the device and
print infrastructure.
Organisations operating more than
five multi-functional devices inherit a
broader range of information security
challenges. As businesses migrate from
dedicated stand-alone devices to more
feature-rich and capable networked
devices, demands for secure User and
Guest authentication increase.
Document release at point of use
means that sensitive content can
continue to be printed safely, even
on networked devices.
Canon’s device hardening specifications
for medium-sized businesses take into
account the more common of these
added security concerns.
SMALL
OFFICE
NETWORK
MEDIUM-SIZED
BUSINESS
OFFICE
Secure Your Office IOT 54 Secure Your Office IOT
Canon encourages organisations with a
multi-site, multi-office environment, and
adopting a segmented architecture, to
operate network print/scan activities on
a separate VLAN accessible for internal
use via print server(s). In deployments
of this nature, it is uncommon for
devices to be made accessible from
the Internet.
This environment will usually have
a permanent expert team to support
its networking and back-office
requirements along with general
computer issues although it may be the
case that technicians lack specific
knowledge of computer printing and
Office IoT device technologies.
Canon’s device hardening
specifications for large enterprise
provide a comprehensive answer for
businesses operating complex network
topologies and technology
infrastructures seeking to minimise
office security vulnerabilities.
Canon offers a Pre-Delivery Inspection (PDI) and
Installation service that can be tailored to satisfy
customer requests as a to-order option.
Please ask for more details.
Please refer to Canon’s device
hardening guides for detailed
information on device
configuration possibilities.
Modern office devices are feature rich - the range of
device settings is broad and normally requires expert
knowledge to fully appreciate the configuration
possibilities and associated risks.
For network administrators seeking to create a
custom device hardening profile, what are the most
important steps to consider? Here are a few top tips
from our information security team:
LARGE
ENTERPRISE
OFFICE
CUSTOM
CONFIGURATION
SERVICES
1
Disable all functionality - Start with
a zero-feature capability (i.e. turn
everything off) and to then start
applying features, appreciating
with each added feature the likely
consequential vulnerabilities.
4
Enable what is needed to support
the solution.
2
Determine the functionality,
network services/protocols
needed to support the solution.
5
Test to identify any risks.
3
Determine device extrinsic controls
that are needed to additional
protect the network.
6 Secure Your Office IOT Secure your Office Devices 7
There is no fool-proof plug and
play office security solution.
Every business has to determine
what represents an acceptable
level of risk.
Canon is a pro-active partner to
businesses seeking to keep data
safe as part of a resilient enterprise
information security policy.
INTERESTED?
One voice
Our information security team is responsible for
both Canon’s internal information security, and the
advice and solutions we offer to our customer.
An ethos of security and
privacy by design
When we design or select technologies, products
and services for our customers, we consider their
likely information security impact on our customers’
environment, and incorporate security and measures
to enable protection to the desired level.
An inclusive approach
All organisations are different. There is no one-size-
fits-all solution when it comes to formulating a
appropriate information security approach for your
business. At Canon, our approach is to work closely
with our customers to build better information
security together.
Satisfy the information security expectations of:
• Shareholders
• Staff
• Customers
• Suppliers
• Partners
• Guests
• Channel Partners
• Contractors
Canon Inc.
Canon.com
Canon Europe
canon-europe.com
English Edition
© Canon Europa N.V., 2017
Canon Europe Ltd
3 The Square,
Stockley Park,
Uxbridge,
Middlesex
UB11 1ET
UK
Canon U.K. Ltd
Woodhatch
Reigate
Surrey
RH2 8BF
UK

More Related Content

What's hot

Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Defense Foundation Product Brief
Defense Foundation Product BriefDefense Foundation Product Brief
Defense Foundation Product Briefwdjohnson1
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsWaterstons Ltd
 
A Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingA Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingIvanti
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYODWorksPad
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major playersWaterstons Ltd
 
M.Yassen_Sr.System & Network Admin_CV
M.Yassen_Sr.System & Network Admin_CVM.Yassen_Sr.System & Network Admin_CV
M.Yassen_Sr.System & Network Admin_CVMahmoud Yassin
 
Intranet Pdf
Intranet PdfIntranet Pdf
Intranet Pdfkhammett
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneLai Yoong Seng
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for DummiesSybase Türkiye
 
Enterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionEnterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionLai Yoong Seng
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment InnoTech
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityChief Optimist
 
Norton Zone File-Sharing Service
Norton Zone File-Sharing ServiceNorton Zone File-Sharing Service
Norton Zone File-Sharing ServiceSymantec
 

What's hot (20)

Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Lime access 2013-en
Lime access 2013-enLime access 2013-en
Lime access 2013-en
 
Defense Foundation Product Brief
Defense Foundation Product BriefDefense Foundation Product Brief
Defense Foundation Product Brief
 
Desktop Services
Desktop ServicesDesktop Services
Desktop Services
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
A Primer on iOS Management and What's Changing
A Primer on iOS Management and What's ChangingA Primer on iOS Management and What's Changing
A Primer on iOS Management and What's Changing
 
ESET Enterprise
ESET EnterpriseESET Enterprise
ESET Enterprise
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major players
 
M.Yassen_Sr.System & Network Admin_CV
M.Yassen_Sr.System & Network Admin_CVM.Yassen_Sr.System & Network Admin_CV
M.Yassen_Sr.System & Network Admin_CV
 
Intranet Pdf
Intranet PdfIntranet Pdf
Intranet Pdf
 
Enterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft IntuneEnterprise Mobility Suite-Microsoft Intune
Enterprise Mobility Suite-Microsoft Intune
 
Munawwar Khan
Munawwar KhanMunawwar Khan
Munawwar Khan
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for Dummies
 
Virtualization security audit
Virtualization security auditVirtualization security audit
Virtualization security audit
 
Enterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionEnterprise Mobility Suite- Introduction
Enterprise Mobility Suite- Introduction
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
Beyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats SecurityBeyond the PC: Combating Unmanaged Threats Security
Beyond the PC: Combating Unmanaged Threats Security
 
Norton Zone File-Sharing Service
Norton Zone File-Sharing ServiceNorton Zone File-Sharing Service
Norton Zone File-Sharing Service
 

Similar to 8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT

8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...Canon Business CEE
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...David J Rosenthal
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsAnthony Daniel
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutionsFuji Xerox Singapore
 
Cloud Printing For SaaS Providers With OM Plus i-Sat
Cloud Printing For SaaS Providers With OM Plus i-SatCloud Printing For SaaS Providers With OM Plus i-Sat
Cloud Printing For SaaS Providers With OM Plus i-SatPlus Technologies
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...adeel hamid
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsColorTokens Inc
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Ajay Jassi
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 
Propalms Centralized Computing Solution Document
Propalms Centralized Computing   Solution DocumentPropalms Centralized Computing   Solution Document
Propalms Centralized Computing Solution DocumentVijender Yadav
 
Feature and benefit it words
Feature and benefit it wordsFeature and benefit it words
Feature and benefit it wordsApixel IT Support
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENolivier lussac
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Company Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptxCompany Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptxhendrik441443
 
CT Business Solutions Catalogue
CT Business Solutions CatalogueCT Business Solutions Catalogue
CT Business Solutions CatalogueEnda Folan
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfBoney Maundu Slim
 
qtipl_profile.pptx
qtipl_profile.pptxqtipl_profile.pptx
qtipl_profile.pptxssuser41d278
 

Similar to 8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT (20)

8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #7 Protect documents through their...
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefits
 
10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions10 Risky Employee Practices - Security solutions
10 Risky Employee Practices - Security solutions
 
Cloud Printing For SaaS Providers With OM Plus i-Sat
Cloud Printing For SaaS Providers With OM Plus i-SatCloud Printing For SaaS Providers With OM Plus i-Sat
Cloud Printing For SaaS Providers With OM Plus i-Sat
 
The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...The infrastructure and the Security Essentials of Information Technology in a...
The infrastructure and the Security Essentials of Information Technology in a...
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Propalms Centralized Computing Solution Document
Propalms Centralized Computing   Solution DocumentPropalms Centralized Computing   Solution Document
Propalms Centralized Computing Solution Document
 
Feature and benefit it words
Feature and benefit it wordsFeature and benefit it words
Feature and benefit it words
 
Cortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - ENCortado Corporate Server 7.2 - EN
Cortado Corporate Server 7.2 - EN
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Solution
SolutionSolution
Solution
 
Solution
SolutionSolution
Solution
 
Company Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptxCompany Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptx
 
CT Business Solutions Catalogue
CT Business Solutions CatalogueCT Business Solutions Catalogue
CT Business Solutions Catalogue
 
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdfComputer Networking for Small & Medium Businesses - Boney Maundu.pdf
Computer Networking for Small & Medium Businesses - Boney Maundu.pdf
 
qtipl_profile.pptx
qtipl_profile.pptxqtipl_profile.pptx
qtipl_profile.pptx
 

More from Canon Business CEE

8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...Canon Business CEE
 
Canon CEE Customer Loyalty Survey 2018
Canon CEE Customer Loyalty Survey 2018Canon CEE Customer Loyalty Survey 2018
Canon CEE Customer Loyalty Survey 2018Canon Business CEE
 
Certificate EDP Award Vario Print 6000 TITAN
Certificate EDP Award Vario Print 6000 TITAN  Certificate EDP Award Vario Print 6000 TITAN
Certificate EDP Award Vario Print 6000 TITAN Canon Business CEE
 
There's still momentum in mono - Canon CEE
There's still momentum in mono - Canon CEEThere's still momentum in mono - Canon CEE
There's still momentum in mono - Canon CEECanon Business CEE
 
ЭРА МОНОХРОМНОЙ ПЕЧАТИ ПРОДОЛЖАЕТСЯ
ЭРА МОНОХРОМНОЙ ПЕЧАТИ ПРОДОЛЖАЕТСЯЭРА МОНОХРОМНОЙ ПЕЧАТИ ПРОДОЛЖАЕТСЯ
ЭРА МОНОХРОМНОЙ ПЕЧАТИ ПРОДОЛЖАЕТСЯCanon Business CEE
 
Evolution of the Digital Workplace - Office Insights 2018
Evolution of the Digital Workplace - Office Insights 2018Evolution of the Digital Workplace - Office Insights 2018
Evolution of the Digital Workplace - Office Insights 2018Canon Business CEE
 
Canon обновляет широкоформатные МФУ начального уровня
Canon обновляет широкоформатные МФУ начального уровняCanon обновляет широкоформатные МФУ начального уровня
Canon обновляет широкоформатные МФУ начального уровняCanon Business CEE
 
Sell out presentation of Canon varioPRINT 140 series
Sell out presentation of Canon varioPRINT 140 seriesSell out presentation of Canon varioPRINT 140 series
Sell out presentation of Canon varioPRINT 140 seriesCanon Business CEE
 
Canon imageRUNNER C3025i Press Release_Canon CEE
Canon imageRUNNER C3025i Press Release_Canon CEECanon imageRUNNER C3025i Press Release_Canon CEE
Canon imageRUNNER C3025i Press Release_Canon CEECanon Business CEE
 
Canon image formula DR-M260 – безграничные возможности сканирования и обработ...
Canon image formula DR-M260 – безграничные возможности сканирования и обработ...Canon image formula DR-M260 – безграничные возможности сканирования и обработ...
Canon image formula DR-M260 – безграничные возможности сканирования и обработ...Canon Business CEE
 
Government-owned company almost halves printing costs by migrating to uniFLOW...
Government-owned company almost halves printing costs by migrating to uniFLOW...Government-owned company almost halves printing costs by migrating to uniFLOW...
Government-owned company almost halves printing costs by migrating to uniFLOW...Canon Business CEE
 
Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...
Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...
Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...Canon Business CEE
 
Oil industry managed print sevices - (NIS case study) - Canon CEE
Oil industry managed print sevices - (NIS case study) - Canon CEEOil industry managed print sevices - (NIS case study) - Canon CEE
Oil industry managed print sevices - (NIS case study) - Canon CEECanon Business CEE
 
Experience uniFLOW IT Admin - Canon CEE
Experience uniFLOW IT Admin - Canon CEEExperience uniFLOW IT Admin - Canon CEE
Experience uniFLOW IT Admin - Canon CEECanon Business CEE
 
Experience uniFLOW executive - Canon CEE
Experience uniFLOW executive - Canon CEEExperience uniFLOW executive - Canon CEE
Experience uniFLOW executive - Canon CEECanon Business CEE
 
Experience uniFLOW enduser - Canon CEE
Experience uniFLOW enduser - Canon CEEExperience uniFLOW enduser - Canon CEE
Experience uniFLOW enduser - Canon CEECanon Business CEE
 
A scalable print management solution boosts labor productivity and improves d...
A scalable print management solution boosts labor productivity and improves d...A scalable print management solution boosts labor productivity and improves d...
A scalable print management solution boosts labor productivity and improves d...Canon Business CEE
 
Streamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEEStreamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEECanon Business CEE
 

More from Canon Business CEE (20)

8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #8 Extend data loss prevention (dl...
 
Canon CEE Customer Loyalty Survey 2018
Canon CEE Customer Loyalty Survey 2018Canon CEE Customer Loyalty Survey 2018
Canon CEE Customer Loyalty Survey 2018
 
Certificate EDP Award Vario Print 6000 TITAN
Certificate EDP Award Vario Print 6000 TITAN  Certificate EDP Award Vario Print 6000 TITAN
Certificate EDP Award Vario Print 6000 TITAN
 
There's still momentum in mono - Canon CEE
There's still momentum in mono - Canon CEEThere's still momentum in mono - Canon CEE
There's still momentum in mono - Canon CEE
 
ЭРА МОНОХРОМНОЙ ПЕЧАТИ ПРОДОЛЖАЕТСЯ
ЭРА МОНОХРОМНОЙ ПЕЧАТИ ПРОДОЛЖАЕТСЯЭРА МОНОХРОМНОЙ ПЕЧАТИ ПРОДОЛЖАЕТСЯ
ЭРА МОНОХРОМНОЙ ПЕЧАТИ ПРОДОЛЖАЕТСЯ
 
Evolution of the Digital Workplace - Office Insights 2018
Evolution of the Digital Workplace - Office Insights 2018Evolution of the Digital Workplace - Office Insights 2018
Evolution of the Digital Workplace - Office Insights 2018
 
Océ VarioPrint 6000 TITAN
Océ VarioPrint 6000 TITANOcé VarioPrint 6000 TITAN
Océ VarioPrint 6000 TITAN
 
Canon обновляет широкоформатные МФУ начального уровня
Canon обновляет широкоформатные МФУ начального уровняCanon обновляет широкоформатные МФУ начального уровня
Canon обновляет широкоформатные МФУ начального уровня
 
Sell out presentation of Canon varioPRINT 140 series
Sell out presentation of Canon varioPRINT 140 seriesSell out presentation of Canon varioPRINT 140 series
Sell out presentation of Canon varioPRINT 140 series
 
Canon varioPRINT 140 series
Canon varioPRINT 140 seriesCanon varioPRINT 140 series
Canon varioPRINT 140 series
 
Canon imageRUNNER C3025i Press Release_Canon CEE
Canon imageRUNNER C3025i Press Release_Canon CEECanon imageRUNNER C3025i Press Release_Canon CEE
Canon imageRUNNER C3025i Press Release_Canon CEE
 
Canon image formula DR-M260 – безграничные возможности сканирования и обработ...
Canon image formula DR-M260 – безграничные возможности сканирования и обработ...Canon image formula DR-M260 – безграничные возможности сканирования и обработ...
Canon image formula DR-M260 – безграничные возможности сканирования и обработ...
 
Government-owned company almost halves printing costs by migrating to uniFLOW...
Government-owned company almost halves printing costs by migrating to uniFLOW...Government-owned company almost halves printing costs by migrating to uniFLOW...
Government-owned company almost halves printing costs by migrating to uniFLOW...
 
Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...
Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...
Increased productivity and data security (Coca-Cola HBC Serbia case study) - ...
 
Oil industry managed print sevices - (NIS case study) - Canon CEE
Oil industry managed print sevices - (NIS case study) - Canon CEEOil industry managed print sevices - (NIS case study) - Canon CEE
Oil industry managed print sevices - (NIS case study) - Canon CEE
 
Experience uniFLOW IT Admin - Canon CEE
Experience uniFLOW IT Admin - Canon CEEExperience uniFLOW IT Admin - Canon CEE
Experience uniFLOW IT Admin - Canon CEE
 
Experience uniFLOW executive - Canon CEE
Experience uniFLOW executive - Canon CEEExperience uniFLOW executive - Canon CEE
Experience uniFLOW executive - Canon CEE
 
Experience uniFLOW enduser - Canon CEE
Experience uniFLOW enduser - Canon CEEExperience uniFLOW enduser - Canon CEE
Experience uniFLOW enduser - Canon CEE
 
A scalable print management solution boosts labor productivity and improves d...
A scalable print management solution boosts labor productivity and improves d...A scalable print management solution boosts labor productivity and improves d...
A scalable print management solution boosts labor productivity and improves d...
 
Streamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEEStreamlining paper processes in a digital world - Canon CEE
Streamlining paper processes in a digital world - Canon CEE
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT

  • 1. SECURE YOUR OFFICE IOT 8 WAYS TO PROTECT THE DATA IN YOUR OFFICE #4
  • 2. IOT devices – MFDs, printers, scanners – don’t always arrive ‘data safe’ out of the box. Canon offers device hardening profiles and services, configuring devices to precisely align settings with incumbent security policies. Our approach is predicated on a pre-assessment of a customers perceived risk appetite. CANON SOLUTIONS ENTERPRISE OFFICE Designed to achieve optimal device hardening for more demanding security needs in excess of 50 devices. CUSTOM SERVICE Tailored to your discerning device hardening needs. (to-order option) MID-SIZED BUSINESS OFFICE Designed to achieve an above average level of device hardening with 5 to 50 devices. SMALL OFFICE NETWORK Designed to satisfy a base level of device hardening expectations for businesses with fewer than five devices. The Risks Modern Multifunction Devices (MFDs) provide print, copy, scan, send and fax functionality. MFDs are computer servers in their own right, providing a number of networked services along with significant hard drive storage. When an organisation introduces these devices into their infrastructure, there are a number of areas that should be addressed as part of the wider security strategy, which should look to protect the confidentiality, integrity and availability of your networked systems. Deployments differ and organisations will have their own specific security requirements. While we work together to ensure that Canon devices are shipped with appropriate initial security settings, we aim to further support this by providing a number of configuration settings to enable you to more closely align the device to the requirements of your specific situation. #4 SECURE YOUR OFFICE DEVICES 2 Secure Your Office IOT
  • 3. Small Businesses rarely have in-house technical experts to install devices and offer advice on matters of device, document and office network security. For this reason, out-of-the-box cloud and appliance solutions are generally preferred. Typically, this will be a small business environment with an un-segmented network topology. It uses one or two MFDs for its internal use and these devices are not accessible on the Internet. Mobile applications are extremely popular in small businesses that lack infrastructure and these are available, however additional solution components will be required. For those users operating printer services outside of a LAN environment, a secure connection is needed. Canon’s small office network device hardening focuses on basic intrinsic device security, although attention is paid to the security of the data in transit between the device and print infrastructure. Organisations operating more than five multi-functional devices inherit a broader range of information security challenges. As businesses migrate from dedicated stand-alone devices to more feature-rich and capable networked devices, demands for secure User and Guest authentication increase. Document release at point of use means that sensitive content can continue to be printed safely, even on networked devices. Canon’s device hardening specifications for medium-sized businesses take into account the more common of these added security concerns. SMALL OFFICE NETWORK MEDIUM-SIZED BUSINESS OFFICE Secure Your Office IOT 54 Secure Your Office IOT
  • 4. Canon encourages organisations with a multi-site, multi-office environment, and adopting a segmented architecture, to operate network print/scan activities on a separate VLAN accessible for internal use via print server(s). In deployments of this nature, it is uncommon for devices to be made accessible from the Internet. This environment will usually have a permanent expert team to support its networking and back-office requirements along with general computer issues although it may be the case that technicians lack specific knowledge of computer printing and Office IoT device technologies. Canon’s device hardening specifications for large enterprise provide a comprehensive answer for businesses operating complex network topologies and technology infrastructures seeking to minimise office security vulnerabilities. Canon offers a Pre-Delivery Inspection (PDI) and Installation service that can be tailored to satisfy customer requests as a to-order option. Please ask for more details. Please refer to Canon’s device hardening guides for detailed information on device configuration possibilities. Modern office devices are feature rich - the range of device settings is broad and normally requires expert knowledge to fully appreciate the configuration possibilities and associated risks. For network administrators seeking to create a custom device hardening profile, what are the most important steps to consider? Here are a few top tips from our information security team: LARGE ENTERPRISE OFFICE CUSTOM CONFIGURATION SERVICES 1 Disable all functionality - Start with a zero-feature capability (i.e. turn everything off) and to then start applying features, appreciating with each added feature the likely consequential vulnerabilities. 4 Enable what is needed to support the solution. 2 Determine the functionality, network services/protocols needed to support the solution. 5 Test to identify any risks. 3 Determine device extrinsic controls that are needed to additional protect the network. 6 Secure Your Office IOT Secure your Office Devices 7
  • 5. There is no fool-proof plug and play office security solution. Every business has to determine what represents an acceptable level of risk. Canon is a pro-active partner to businesses seeking to keep data safe as part of a resilient enterprise information security policy. INTERESTED? One voice Our information security team is responsible for both Canon’s internal information security, and the advice and solutions we offer to our customer. An ethos of security and privacy by design When we design or select technologies, products and services for our customers, we consider their likely information security impact on our customers’ environment, and incorporate security and measures to enable protection to the desired level. An inclusive approach All organisations are different. There is no one-size- fits-all solution when it comes to formulating a appropriate information security approach for your business. At Canon, our approach is to work closely with our customers to build better information security together. Satisfy the information security expectations of: • Shareholders • Staff • Customers • Suppliers • Partners • Guests • Channel Partners • Contractors Canon Inc. Canon.com Canon Europe canon-europe.com English Edition © Canon Europa N.V., 2017 Canon Europe Ltd 3 The Square, Stockley Park, Uxbridge, Middlesex UB11 1ET UK Canon U.K. Ltd Woodhatch Reigate Surrey RH2 8BF UK