SlideShare a Scribd company logo
1 of 40
Download to read offline
fundamentals of
security
Whitepaper
whitepaper
SECURITY
This fundamentals of security guide is a “living” document – this means it is continually updated. This guide is
intended solely for the use and information of Konica Minolta Business Solutions Europe GmbH, the European Konica
Minolta subsidiaries and distributors, and their employees. The information herein was obtained from various sources
that are deemed reliable by all industry standards. To the best of our knowledge, this information is accurate in all
respects. However, neither Konica Minolta nor any of its agents or employees shall be responsible for any inaccura-
cies contained herein.
©
2012 KONICA MINOLTA BUSINESS SOLUTIONS EUROPE, GmbH. All rights reserved. No part of this book may be
reproduced or transmitted in any form or by any means, electronically or mechanically, including photocopying, recording
or any information storage and retrieval system, without permission in writing from the publisher.
Some functions may require optional extras to be purchased. Please refer to the function availability table for the various
devices on page 37.
Fundamentals
of security
Fundamentals of security 2
Security without sacrifice 4
4		 Konica Minolta security standards	
Cause for concern everywhere – 		
	 security vulnerability 5
5		 Access control/Access security	
5		 Document security/Data security	
5		 Network security	
General system security 6
6		 Protection against virus from USB memory	
6		 Security for fax line	
6		 Security of remote diagnostic services	
7		 Security of RAM	
7		 Password handling	
Access control 8
8		 Copy/print accounting	
9		 User authentication – ID and password	
10		 User authentication – Finger vein scanner	
10		 User authentication – IC card reader	
11		 Auto log off	
11		 Function restrictions	
12		 Secure print (lock job)	
12		 Touch  Print/ID  Print	
13		 User box password protection	
14		 Event log	
14		 Driver user data encryption	
14		 Password for non-business hours	
Data security 15
15		 Hard disk password protection	
15		 Data encryption (hard disk)	
15		 Hard disk data overwrite	
17		 Temporary data deletion	
17		 Data auto deletion	
INDEX Whitepaper security 3
Network security 18
18		 IP filtering	
19		 Port and protocol access control	
19		 SSL/TLS encryption (https)	
20		 IPsec support	
20		 IEEE 802.1x support	
21		 NDS authentication	
22		 OpenAPI communication	
23		 Remote panel	
PageScope Enterprise Suite 24
24		 Summary of PageScope Enterprise Suite	
25		 PageScope Enterprise Suite – Communication security
28		 PageScope Enterprise Suite – Access restriction	
28		 PageScope Enterprise Suite – Data management
30		 Licence management for PageScope Enterprise Suite	
Scan security 31
31		 POP before SMTP	
31		 SMTP authentication (SASL)	
31		 S/MIME	
31		 Encrypted PDF
32		 PDF encryption via digital ID	
32		 PDF digital signature	
33		 Manual destination blocking	
33		 Address book access control	
Additional security functions 34
34		 Service mode/administration mode protection	
34		 Unauthorised access lock	
35		 Distribution number printing	
35		 Watermark/Overlay	
35		 Copy protection via watermark	
36		 Copy Guard function/Password Copy function	
36		 Fax rerouting	
Security features  availability 37
Konica Minolta realised early on the importance of security issues in the digital age, where the risk of seriously damaging
security breaches rises dramatically alongside rapidly growing worldwide communication possibilities.
In response to these threats, Konica Minolta has taken a leading role in developing and implementing security-based informa-
tion technology in our multifunctional products. Ever since the introduction of the first Konica Minolta MFP, Konica Minolta has
striven to develop and implement technology that safeguards the confidentiality of electronic documents.
The most important security standard in Europe is ISO 15408, also known as Common Criteria certification. Konica Minolta has
newly introduced multifunctional bizhub products validated to Common Criteria EAL3 security standards. Common Criteria (CC)
is the only internationally recognised standard for IT security testing. Printers, copiers and software with ISO 15408
certification are security evaluated, and guarantee the security levels that companies look for today. With the CC certification
users can rest assured that on Konica Minolta’s multifunctional devices their confidential data remains confidential.
This document discusses various generally important security requirements, and explains how Konica Minolta MFPs comply
with the rules and regulations set forth in ISO 15408 (Common Criteria).
Security without sacrifice
Konica Minolta security standards
ISO 15408 is divided into seven levels of EAL
(Evaluation Assurance Level) certification. Standard
off-the-shelf products can only achieve up to EAL4
certification. Most IT-related products are certified
at EAL3. A certification lab in Japan tests Konica
Minolta products. Konica Minolta certifications and
related documentation can be found at the following
website: http://www.commoncriteriaportal.org
SECURITY WITHOUT SACRIFICE Whitepaper security 4
Generally MFPs offer a huge range of combined and single functions and choices; therefore they represent a similarly
wide range of potential security loopholes. The scope of MFP security could be grouped into three main sections:
Access control/Access security
Despite security being high on the agenda in both public and corporate domains, MFPs are often ignored as being a security
risk at all. While some risks are perhaps identified, they are often simply neglected, especially where sensitive documents
and information is concerned. This is especially risky for those MFPs and printers located in public areas, where they can be
accessed by staff, contractors and even visitors.
Because the advanced features available on today’s MFPs deliberately make it easy for information to be copied and distributed
within and beyond actual and virtual corporate boundaries, the first logical step is to prevent unauthorised persons being able
to operate an MFP. Preventive measures are needed, firstly to control access to MFPs, and secondly to establish some kind
of security policy reflecting how the devices are actually used in real life - obviously none of these measures should restrict or
limit the user-friendliness of the systems. Konica Minolta is prepared for this, offering various security features and solutions.
Document security/Data security
Reflecting the fact that MFPs and printers are often located in public areas, where they can be easily accessed by staff,
contractors and visitors, it is necessary to implement appropriate data security policies. The situation is after all that
confidential data, for example stored on the MFP hard disk over a period of time, or simply confidential documents lying in
the MFP output tray as printouts, are initially unprotected and could fall into the wrong hands. Konica Minolta offers a range
of tailored security measures to ensure document and data security.
Network security
In today’s corporate environment, indeed in today’s business world, communications and connectivity are indispensable.
Konica Minolta office devices are designed to integrate into network environments. For example network printers and
multi-functional peripherals (MFP) have evolved to the point that they act as sophisticated document processing hubs integral
within the network, with the ability to print, copy and scan documents and data to network destinations, send emails and
more. This scenario also means that this office technology must cope with and comply with the same security risks and
policies as any other network device, and represents a risk if unprotected. In order to avoid any vulnerability from either
internal or external network attacks, Konica Minolta ensures that all equipment complies with the strictest security standards.
This is achieved using a number of measures.
Cause for concern
everywhere –
security vulnerability
With its comprehensive range of security features,
Konica Minolta provides professional solutions for
the detection and prevention of security breaches.
RISKS Whitepaper security 5
General System
security
Protection against virus from USB memory
Most of the Konica Minolta devices are equipped with an interface for USB memory sticks. This offers the possibility to print
documents directly from the USB memory without a PC. It is also possible to scan documents directly to the USB memory.
Generally, virus infection from USB memory is caused by program files automatically executing when the USB memory is
inserted in the device. Konica Minolta devices do not support functionality to automatically execute files by inserting the USB
memory. Therefore, Konica Minolta devices are not affected by these types of viruses.
Security for fax line
Any communication via fax line uses only fax protocol and does not support any other communication protocol. If someone
from outside attempts to intrude with a different protocol via a public line, or tries to send data that cannot be decompressed
as fax data, Konica Minolta products handle the event as an error and block such communication.
Security of remote diagnostic services
The remote diagnostic system uses a public telephone line for communication between the Konica Minolta system and the
service centre. With this system, Konica Minolta devices send main-body data to the service centre; and the service centre
can transmit data to change the main-body settings remotely. An ID preset on every main body and service centre ensures
that communication is only enabled if the IDs match.
public
telephone
line
Check whether correct
command response by G3
protocol is made or not.
If G3 protocol is used, the
communication is continued.
But if anything other than G3
protocol is used, the com-
munication is blocked off.Call to fax
line
Response by
G3 protocol
Response by
G3 protocol
2. 	Registration
	 is made with
	 password
3. 	Call to
	 get data
6. 	 Check the
	 password and
	 then start
	communication
1. 	Call for
	registration of 		
	communication
4. 	 Check the 		
	 password 		
	 and then start
	communication
5. 	Send the data
	 describing device 		
	status
Public telephone
line
GENERAL SYSTEM SECURITY Whitepaper security 6
Security of RAM
There are three types of RAM currently used in bizhub products:
Volatile RAM – typically volatile RAM would be:
–	 file memory
– 	 electronic sorting
–	 work memory
– 	 storing program parameters, temporary data and image conversion of controller
–	 fax memory
– 	 working RAM for fax
Data written to volatile RAM is held while the power is on. The data held in this type of RAM is
overwritten by the next page or job being printed. Once the job is printed the data is deleted from
the RAM. Also, as soon as the power is turned off the data in volatile RAM is deleted. Volatile
RAM is secure: if RAM is removed after an engine is powered off, all the data on that RAM chip
will have already been deleted. It is impossible to remove the RAM while the engine power is on.
The only other way to possibly extract data would be via an indirect route or a security hole.
These access points are evaluated and tested by independent security consultants before the
Konica Minolta products are submitted for ISO 15408 certification. There are no indirect routes or
security holes in bizhub MFPs.
Non-volatile RAM (NV-RAM) – typically non-volatile RAM would be:
–	 counter data
–	 job settings
–	 utility settings
The data written to non-volatile RAM is not image or document data, meaning the data is not
confidential or private. Unlike volatile RAM this data is not cleared when the power is turned off.
It is important to note that when the HDD is formatted, the user/account data in NV-RAM will be
deleted and reset to factory default.
Flash memory – typically flash memory is utilised with:
–	 machine firmware
–	 control panel data
–	 printer-resident fonts
–	 copy-protect watermarks
Flash memory is embedded on an MFP circuit board and cannot be erased.
The data stored in flash memory is not critical, confidential or private.
Password handling
In general, all passwords are handled securely by the MFP following several security rules:
1.	 Independent of the functionality the setting of a password always has to be verified once.
2. 	All passwords entered via MFP panel, Web interface or application appear on the screen as
“xxx” to prevent illegal copying.
3. 	All passwords are encrypted for storage.
4. 	All passwords contain at least 8 to 64 alphanumeric characters. Depending on the MFP
	 functionality, passwords can be even longer.
5. 	Passwords transferred via a network can always be transmitted encrypted.
6.	 Passwords for user authentication and user boxes can only be reset by the administrator.
7.	 Administrator passwords can only be reset by a Konica Minolta certified engineer.
GENERAL SYSTEM SECURITY Whitepaper security 7
Copy/print accounting
Konica Minolta bizhub MFPs come with the ability to enable account tracking as standard. When this function is activated,
a user is required to enter a 4–8 digit personal identification number (PIN) to gain access to make a copy, send a print, or
perform other functions at the MFP. If a user does not submit or enter an authorised PIN (from the print driver), the print job
submitted will not be printed. If a user does not enter an authorised PIN at the copier control panel, they will be denied access
to the system. When logged in, the user’s activities are electronically recorded onto a log file inside the system. An administra-
tor or key operator can access this file. This is a very popular feature for many customers, who use this to invoice departments
and audit employees’ copier activities. In addition, it is possible to configure individual copy and print limits per user.
Access Control
This is an example of the accounting screen from the Konica Minolta bizhub C654 control panel.
User authentication - ID and password
Network
Supported external servers like Active Directory, Novell NDS, NTML v.1 and NTLMv.2;
a maximum of 64 characters can be utilised. Active Directory can support up to 20 domains.
In addition, authentication can be centrally managed via PageScope Enterprise Suite
Authentication Manager.
Machine
Internal authentication at the machine can support up to 1,000 user accounts.
Passwords can have up to eight alphanumeric characters.
Password protection
Passwords can be created for administrators and users, and can be alphanumeric with up to
eight characters. An administrator can maintain passwords. Passwords are protected by the
Kerberos system or SSL.
These are examples of the authentication screen from the Konica Minolta bizhub C654 control panel and printer driver.
Acess control Whitepaper security 9
User authentication – IC card reader
As a third authentication solution, Konica Minolta MFPs
can be equipped with an IC card reader. The non-contact
IC card contains a unique code which is linked in the MFP
authentication database to a user ID and password. The
biometric data, the IC card code and user information are
stored in an encrypted form on the MFP hard disk, and are
therefore protected.
As an alternative to storing authentication data on the MFP
hard disk, authentication data can be centrally provided via
the PageScope Enterprise Suite Authentication Manager.
User authentication – Finger vein scanner
Besides authentication via user ID and password, use of a biometric device is also possible. The data for the
biometric authentication device, is handled securely and cannot be used illegally.
The vein in the finger as biometric data:
The vein is located within the body and, unlike fingerprints, it cannot be scanned/read without the person noticing.
This makes it virtually impossible to forge.
The process implemented in this system:
This system implements the security guideline based on the U.S. Government Biometric Verification Mode Protection Profile
for Medium Robustness Environments (BVMPP-MR) version 1.0*; some of the important security/privacy specifications sup-
ported by this system are as follows.
Reconstruction of the biometric data:
The only data registered on the HDD are random numbers calculated on the basis of the feature of the scanned data,
and it is theoretically impossible to reconstruct the original vein data from the data in the HDD.
Structure of the data on the HDD:
The structure of the data on the HDD is not made public. This makes it impossible to forge.
Erasing of data in the authentication device:
The data left in the device is encrypted when temporarily stored in the RAM, and is erased after transferring to the MFP.
Source of the
near-infrared rays
Camera
Vein in the finger
Feature of
the scanned
data
Database for
registration
Authentication
is completed
Encrypt and register
Checking the feature of scanned data
by a unique technology owned by
Hitachi Soft
Result of
checking
Auto log off
Konica Minolta MFPs can be programmed to automati-
cally reset to a state that requires password input after a
predetermined time of inactivity. This ensures that the MFP
will reset to a secure state if a user forgets to log off from
an MFP when finished. Note that the reset timer can be
set from 1 to 60 minutes. Some Konica Minolta MFPs can
be programmed to reset in as little as 30 seconds. If the
machine has the account tracking function enabled the
machine will enter a state (after a pre-programmed period
of inactivity) that requires a user to enter a unique PIN
or password. This function should satisfy most concerns
about users forgetting to log off after they have finished
scanning or copying documents at the MFP.
Function restrictions
An advanced level of user security allows or prohibits the use and availability of specific machine features.
A user and/or administrator can control these features as needed throughout an organisation of any size.
The specific features are:
–	 scanning from the bizhub as a walk-up function or a remote function
–	 user box from the bizhub as a walk-up function or a remote function
–	 copying from the bizhub as a walk-up function, including the restrictions of only b/w copying or only colour copying
	 or neither b/w nor colour copying
–	 faxing from the bizhub as a walk-up function or a remote function
–	 printing as a remote function via the printer driver, including the restrictions of only b/w printing or only colour printing
	 or neither b/w nor colour printing
Function restrictions can be set in general either as a walk-up functionality or per user, depending on the user authentication.
This screen illustrates the administrator and user auto log-off timer setting that
is accessible via the MFP’s remote Web browser-based interface (PageScope
Web Connection).
This is an example of the function permission screen from the Konica Minolta bizhub C654 control panel.
Acess control Whitepaper security 11
Secure print (lock job)
Konica Minolta MFPs offer a standard feature called secure printing. This feature provides a user sending a print job with the
ability to hold the job in the memory of the system until the authorised user walks up to the machine and releases the job by
entering a unique secure PIN/password at the control panel of the MFP. This code is first specified by the user when he sub-
mits his print job from the PC workstation, ensuring that only the sender of the job can access an electronic document that
contains sensitive electronic information. In addition, those MFPs equipped with a hard drive have the ability to store digital
data inside the system. When these documents are stored – either by sending them from a PC or by scanning them in at the
copier – users cannot retrieve the document unless a secure PIN/password is entered on the copier’s control panel.
Touch  Print/ID  Print
If the machine is set up with user authentication, server or MFP-based, secure printing can be used via the
Touch  Print or ID  Print feature.
Instead of an additional secure print ID and password, the user authentication data will be used to identify a stored secure
print job, and will release the job after authentication at the device. This will avoid print jobs being released before the user
can remove them from the output bin, which will prevent confidential data being viewed by other persons.
Touch  Print is based on authentication via finger vein scanner or IC card reader.
ID  Print is based on user authentication via ID and password.
This is an example of the secure print screen from the Konica Minolta bizhub C654 printer driver.
Acess control Whitepaper security 12
User box password protection
The user box offers the functionality to store commonly used copy, print, scan or fax documents
on the hard disk of the MFP. Besides the general security features given to the hard disk, these
user boxes can be set with different access levels. On a walk-up MFP the user boxes can be
protected by an eight-character alphanumeric password.
If the MFP is set up with authentication, the user boxes can be set as a personal box (only vis-
ible for the linked authenticated user), group box (only visible for users who are set up to view
the box) or public box.
The access to the user box is automatically given via the authentication. But the additional
security keeps all users from seeing the box; therefore they have no opportunity to hack into it
by trying out passwords.
This is an example of set user box registration and user box view on the bizhub C654 panel.
Acess control Whitepaper security 13
Driver user data encryption
For secure printing, print authentication and print accounting it is necessary for the user to input certain information, e.g. user
ID and password, in the driver window for transmission to the MFP. To avoid network information from being sniffed, such
user data can be encrypted by the printer driver and decrypted on the MFP.
The encryption key can be set individually by the machine administrator with a length of up to 20 digits. If the encryption key
is not used by the local user or the print server, print jobs will be printed anyhow. However, confidential user access informa-
tion might not be safe.
Event log
All Konica Minolta MFPs offer the option to record all actions that have happened on the MFP, e.g. a print job including sender
name, document name and password. These event logs or histories can be downloaded and viewed by the administrator.
To automate the process of event-log downloading, the PageScope Log Management utility is available to register and view
any actions happening on the MFPs in the network.
This is an example of the Log Management Utility user interface.
This is an example of MFP (bizhub C654) password entry during non-business hours.
Password for non-business hours
If an MFP is not set up with user authentication, but
instead is used as a walk-up device, basically anybody
can access the machine and print/send data that is not
secure. To prevent this happening, the administrator can
program a “business timeframe”, during which the machine
can be used as a walk-up device, while outside this period
a password is necessary to access the machine.
Acess control Whitepaper security 14
Hard disk password protection
The built-in hard disk of the MFP is automatically protected by a password. This password is
stored in the hard disk BIOS and prevents access to the hard disk data, as long as the correct
password has not been entered. Therefore, even the removal of the hard disk and installation into
a PC, laptop or other MFP would not give access to the hard disk. The password is allocated
automatically but can be changed by the machine administrator.
Data security
This is an example of MFP password entry in the administration mode for hard-disk protection (bizhub C654).
Data encryption (hard disk)
Konica Minolta offers either a standard hard drive encryption kit or an advanced version as an
optional extra. If desired, electronic documents can be stored in a password-protected box on
the hard drive. If an organisation is concerned about the security of such data, this can be pro-
tected by encrypting it with the HD encryption kit available. The stored data is encrypted using
the advanced encryption standard (AES) supporting 128-bit key size. Once a HDD is encrypted
its data cannot be read, even if the HDD is removed from the MFP.
This is an example of the HDD encryption settings of the MFP (bizhub C654).
Data security Whitepaper security 15
Mode 1
Overwrite with 0x00	 Japan Electronic  Information Technology Association
Russian Standard (GOST)
Mode 2
Overwrite with random 1 byte numbers Current National Security Agency (NSA) standard
Overwrite with random 1 byte numbers
Overwrite with 0x00
Mode 3
Overwrite with 0x00	 National Computer Security Center (NCSC-TG-025)
Overwrite with 0xff US Navy (NAVSO P-5239-26)
Overwrite with random 1 byte numbers Department of Defense (DoD 5220.22M)
Mode 4
Overwrite with random 1 byte numbers Army Regulations (AR380-19)		
Overwrite with 0x00
Overwrite with 0xff
Mode 5
Overwrite with 0x00	 Former NSA Standard
Overwrite with 0xff
Overwrite with 0x00
Overwrite with 0xff
Mode 6
Overwrite with 0x00	 North Atlantic Treaty Organization – NATO Standard
Overwrite with 0xff
Overwrite with 0x00
Overwrite with 0xff
Overwrite with 0x00
Overwrite with 0xff
Overwrite with 512 bytes of specified data
Mode 7
Overwrite with 0x00	 US Air Force (AFSSI5020)
Overwrite with 0xff
Overwrite with 0x00
Overwrite with 0xff
Overwrite with 0x00
Overwrite with 0xff
Overwrite with 0xaa
Verified
Mode 8
Overwrite with 0x00	 US Air Force (AFSSI5020)
Overwrite with 0xff
Overwrite with 0x00
Overwrite with 0xff
Overwrite with 0x00
Overwrite with 0xff
Overwrite with 0xaa
Verified
Different modes of HDD overwriting
Hard disk data overwrite
When equipped with a hard disk drive (HDD), Konica Minolta
MFPs can store sensitive electronic information. The data
can be deleted by those users who own the documents that
reside inside the MFP’s HDD in password-protected boxes.
For added safety, a key operator, administrator or technician
can physically format (erase) the HDD if the MFP needs to
be relocated. The hard drives can be overwritten (sanitised)
using a number of different methods conforming to various
(e.g. military) specifications, as listed in the table below.
This is an example of the HDD overwrite settings of the MFP (bizhub C654).
The example shows an MFP panel for hard-disk formatting
in administration mode (bizhub C654).
Data security Whitepaper security 16
Mode 1 Overwrite with 0x00	
Mode 2
Overwrite with 0x00  Overwritten with Oxff 
Overwritten with the letter “A” (=x61)  Verified
Temporary data deletion
Depending on the file size for certain jobs, the MFP might use the hard disk to swap data for copy, scan,
print and fax information. As additional security to protect the information stored on the hard disk, the
machine can be set to format and overwrite this data on a per-job basis. Under this setting the temporarily
swapped data is immediately deleted and overwritten as soon as the data is no longer necessary to end
the job in action.
For the temporary data deletion two modes are available.
Data auto deletion
The administrator can set an auto deletion timer for data stored in the personal or public user
boxes, as well as system boxes (e.g. secure print box or encrypted PDF print box). The auto
deletion setting will erase the copy, print, scan or fax jobs stored in boxes, depending on the
storage period and the timeframe selected for deletion.
PrintingDecompression
Overwriting
the former
data
Delete after
the job
Compression
(Konica Minolta
unique format)
Scanning
This is an illustration of the MFP copy process with temporary data deletion selected.
This is an example of the MFP setting for user box document auto deletion (bizhub C654).
Data security Whitepaper security 17
IP filtering
IP address filtering can be set at the machine where the network interface card of the MFP can
be programmed to permit or prohibit access to the device for a specific range of IP addresses for
client PCs.
Network security
The screenshot illustrates the PageScope Web Connection administrator access
to a bizhub C654. Here an administrator can set access permission or refusal to
a specific range of IP addresses.
network security Whitepaper security 18
SSL/TLS encryption (https)
The data communication via network to specific databases or applications can be encrypted by
SSL (Secure Sockets Layer) or TLS (Transport Layer Security). Supported versions of encryption
are SSL 2.0, SSL 3.0 and TLS 1.0.
The encryption of network communication is essential with regard to the transmission of,
for example, authentication data or administrator passwords.
Communication can be encrypted for:
–	 LDAP protocol
–	 SMTP protocol
–	 POP protocol
–	 IPP (IPPS) protocol
–	 Windows Active Directory
The MFP allows the programming of an SSL certificate via the administrator mode of
PageScope Web Connection.
Port and protocol access control
To prevent unnecessary open communication lines on the MFP, open ports and protocols can
be opened, closed or enabled and disabled through the administration mode at the machine or
remotely via PageScope Web Connection or PageScope Net Care.
The following ports can be opened or closed:
The following protocols can be enabled or disabled:
SNMP, SMB, POP, FTP, SMTP, IPP, Telnet, LDAP, HTTP
Port 20 – FTP
Port 21 – FTP
Port 25 – SMTP
Port 80 – HTTP
Port 123 – NTP
Port 161 – SNMP
Port 389 – LDAP
Port 631 – IPP
Port 110 – POP3
Port 636 – LDAP
for TLS/SSL
Port 9100 – PDL
The screenshot illustrates the PageScope Web Connection administrator access to the security settings for SSL certificates.
–	 PageScope Enterprise Server
–	 PageScope Data Administrator
–	 PageScope Addressbook Utility
–	 PageScope Web Connection (https)
network security Whitepaper security 19
IPsec support
To complete the encryption of any network data transmitted to or from the MFP, the bizhub devices also support IPsec
(IP security protocol). This protocol encrypts the whole network communication between the local intranet (server, client PC)
and the device itself. The IPsec protocol can be programmed via the IKE settings. Up to four groups of IPsec/IKE settings
can be stored.
IEEE 802.1x support
IEEE 802.1x is a port-based authentication standard for network access control to WAN and LAN networks.
The IEEE 802.1x authentication standard generates a secure network by closing any network communication (e.g. DHCP or
HTTP) to unauthorised devices except for authentication requests. This prevents devices gaining access to a network by sim-
ply acquiring an IP address via DHCP and, for instance, performing a man-in-the-middle attack to sniff data streams on the
network.
Only proper authentication, a password or certificate entered by the authenticator will grant access to the secure network.
This is an example of the MFP 802.1x authentication settings.
This is an example of MFP IPsec/IKE settings via the MFP panel (bizhub C654).
network security Whitepaper security 20
NDS authentication
NDS authentication is a method of user identification that performs authentication based on a
specified server, an entered user name and password for NDS (Novell Directory Services) run-
ning on NetWare 5.1 or later.
Conventionally, NDS authentication only supported IPX/SPX communication protocols.
However, the most recent MFPs also support NDS authentication via TCP/IP. NDS authentication
can be performed by specifying either IPX/SPX or TCP/IP protocols. NDS authentication via
TCP/IP obtains the IP address of the NDS authentication server by requesting the DNS server
for a specified tree and context.
This is an example of the MFP NDS authentication settings.
network security Whitepaper security 21
PC
1. 	Send
	 password for	
	 bizhub OpenAPI
3.	 Issue
	commands
MFP
2. 	 After checking 	
	 the password, 	
	 the result 	
	 (whether regis-­	
	 tration has 	
	 taken place or 	
	 not) is sent to 	
	 the PC.
4. 	Process the 	
	 command and 	
	 send the data
Network settings
Adressbook
utility
Information
on user
authentication
Communication by SSL
(Secure Socket Layer)
OpenAPI communication
Most of the Konica Minolta devices are equipped with OpenAPI. OpenAPI is Konica Minolta‘s own application
programming interface. This gives users the option of integrating Konica Minolta devices into application-controlled
workflows.
bizhub OpenAPI acquires and sets the data received from devices via networks using the SSL encryption protocol.
By using an original password, communication is rendered more secure.
When managing the important data of the device (e.g. setting information on user authentication), the data is safely protected.
network security Whitepaper security 22
Remote panel
The latest generations of Konica Minolta devices offer the option of a remote panel. This means administrators are able to have
realtime access to the MFP panel remotely, e. g. via a Web browser. Every function which is available on the MFP panel can
also be executed remotely.
There are various settings with which the remote panel feature can be configured, made secure or disabled.
This is an example of the remote panel on a Web browser (bizhub C654).
These are examples of the remote panel settings in PageScope Web Connection.
network security Whitepaper security 23
In modern society, where network infrastructure has already developed and information technology has spread, staggering
amounts of information are distributed. The information is collected in various forms and is utilised after it has been translated
into the higher-level information assets. In corporate activities, protecting these information assets, i.e. managing the risk, is
an important task.
This document introduces the basic security functions that are provided by Konica Minolta’s PageScope Enterprise Suite.
Summary of PageScope Enterprise Suite
PageScope Enterprise Suite is the generic name of the applications required for account management, authority management,
panel settings and management for individual users of the devices operating in offices. All applications are running on a server
and are operated in the Web browser. Combining them, you can build the system to suit your environment.
PageScope Enterprise Suite mainly consists of the following applications.
					Status management software; consolidates machines on the network
					 Software for document volume accounting management
					 Software for panel settings and management for individual user
					 Software for consolidating user authentication
					 PageScope My Print Manager
PageScope
Authentication Manager
PageScope
MyPanel Manager
PageScope
My print manager
PageScope
Net Care Device Manager
PageScope
Account Manager
PageScope
Enterprise Suite
security matters
Pagescope enterprise suite Whitepaper security 24
1. User authentication
In the communication of authentications by PageScope Authentication Manager, the authentication data is sent and received
safely by using SSL. And the permitted functions for each user are enabled.
If the environment is built to cooperate with an office‘s existing authentication server, it is possible to keep the authentication
information within the server.
The authentication methods supported by general authentication servers are shown below. Kerberos authentication or NTLM
authentication is enabled for Active Directory; Digest-MD5 authentication and simple authentication for LDAP servers; NDS
authentication for NDS servers, and NTLM authentication for NTLM servers.
Authentication data input to MFP for authentication, IC card data read by a card reader, and the biometric information read by
a finger vein reader are communicated for authentication using the SSL.
Biometric information (finger vein) is authenticated by Gateway for Biometric Authentication Manager (Gateway for B.A.M.).
Communication of user authentication (ID/password, IC card, biometrics).
ID/Password ID/Password
PageScope
Authentication
Manager
PageScope
Authentication
Manager
PageScope
Authentication
Manager
Result of
authentication
Biometric
data
Result of
authentication
Biometric
data
Existing
authentication
server
Existing
authentication
server
Result of
authentication
Result of
authentication
Result of
authentication
Result of
authentication
Gateway
for B.A.M.
IC card data IC card data
PageScope Enterprise Suite – Communication security
SSL
SSL
SSL
SSL
SSL
SSL
Pagescope enterprise suite Whitepaper security 25
2. Sending of counter information
Counter information is the basis of each division and individual. A file in XML format is created in
MFP. It is encrypted, and then it is sent to PageScope Account Manager. AES-256 is used as the
encryption system for models made after the Mosel/Thames series. For earlier models, DES is
used for encryption.
Send Data Protocol Encryption Scheme
Authentication data (user ID,
password/IC card data/
biometric data)
HTTP, LDAP SSL
Counter data FTP, WebDAV, HTTP
XML file is encrypted
and transferred.
MIB SNMP v1/v3
When SNMP v3 is used,
encrypted communication by DES
or AES is possible.
Pagescope enterprise suite Whitepaper security 26
3. Port number change
The port number of each application can be changed. Port number change prevents conflict
with the port number of the applications other than PageScope Enterprise Suite, and attacks
by unauthorised applications. (The port number of PageScope Authentication Manager and
PageScope Net Care Device Manager can be changed only during installation.)
For your reference, the port numbers currently used are shown below.
*	 The client PC accesses the server through port 80, but the port on the client PC side is allo-
cated a port number each time a connection is made.
**	 The server accesses MFP (or License Management Server) through port 80 (443) but the
port on the server side is allocated a port number each time a connection is made.
Type Port Number (default) Purpose of Use
HTTP 80
[Common]
Web access to the server *
[Net Care Device Manager]
Counter reading into MFP **
[Account Manager]
Data transmission from Print Log Tool *
Counter reading into MFP **
HTTPS 443
[Common]
Web access to the server *
Communication with Licence Management Server (LMS) **
[Net Care Device Manager]
Counter reading into MFP **
[Account Manager]
Data transmission from Print Log Tool *
Counter reading into MFP **
[Authentication Manager]
Communication with MFP
Communication with B.A.M server
LDAP 389
[Authentication Manager]
Communication with Active Directory Service
SNMP v1/v3 161
[Common]
Retrieval of MFP
Status confirmation of MFP
OpenAPI
50001, 50002 [In case of SSL:
50003]
[Authentication Manager]
Sending login information and result of printing to server
Sending upper limit information to MFP
[Account Manager]
Upper limit management
Acquisition of attribute information such as a user etc. from MFP
for a counter collection
[MyPanel Manager]
Sending setting information to MFP
SMTP 25
[Common]
Email transmission of the counter information from the server
FTP
21
A suitable port number is
allocated each time
[Account Manager]
Counter reading into the MFP
[Net Care Device Manager]
Counter reading into MFP **
Pagescope enterprise suite Whitepaper security 27
1. Management of IC card information and biometric information
Although IC card information is managed in the database of PageScope Authentication Manager, it is also possible to use the
IC card information managed by an existing authentication server.
Biometric (finger vein) information is managed in the database of Gateway for Biometric Authentication Manager (Gateway for
B.A.M.). When information such as a password or IC card has been leaked, it is possible to change the password or IC card.
For biometric information, however, this is not possible. Therefore, you should handle biometric information carefully. If only
biometric information has been leaked, it is not possible to determine whose biometric information it is. And the biometric
information to be managed includes only the features extracted. The information cannot be used in other systems because it is
the data for Gateway for B.A.M. only.
Link between Gateway for B.A.M. and biometric information.
Gateway
for B.A.M.
User A01001
User B01021
User C01022
01021 BioData1
01022 BioData2
01001 Biodata3PageScope
Authentication
Manager
PageScope Enterprise Suite – Access restriction
Although system administrators at the highest level can configure all settings, authority should be divided into the required
units to avoid careless settings in unrelated areas. Concerning access to PageScope Enterprise Suite, four types of user level
are provided. Only system administrators and the specified users are allowed to configure settings and management of soft-
ware. For example, the user specified as an administrator of PageScope Net Care Device Manager can register and remove the
devices of the managed object. Nobody other than the specified user can execute such operations.
Access to PageScope Enterprise Suite is performed in a Web browser. If authentication is completed successfully on the first
login screen, the operations are allowed.
Type DESCRIPTION
User General user. It is only possible for users to change their own password.
Group Administrator
The user specified as Group Administrator can manage the devices and the users within the group.
There are three types of groups: user group, account group, and device group. And it is possible to share
responsibility for the management of each group.
Application Administrator
The user specified as Application Administrator (set for each application) can manage application.
There are four types of application unit: Authentication Manager, Account Manager, MyPanel Manager, and
Net Care Device Manager. And it is possible to share responsibility for the management of each application.
System Administrator It is possible to manage all software, such as the settings of the Group Administrator or Application Administrator.
PageScope Enterprise Suite – Data management
Pagescope enterprise suite Whitepaper security 28
3. Registration using PageScope MyPanel
MyPanel is registered in the database of MyPanel Manager
using the exclusive Address Importer. Address Importer is
the software to be installed on a client PC. Address data is
exported from Outlook or an LDAP server. It is output as a
file to a client PC once, and it is registered on the registration
screen of MyPanel Manager by uploading the file. When
uploading a file, data is sent safely using SSL.
Only a user who is registered as an administrator of
MyPanel Manager can perform the registration.
2. IC card data and finger vein information registration
IC card and biometric (finger vein) information is registered in the database of PageScope Authentication Manager using the
exclusive Registration Tool software. The Registration Tool is software to be installed on a client PC. IC card or finger vein
information is read by a reader. It is output as a file to a client PC once, and it is registered on the registration screen of
PageScope Authentication Manager by uploading the file. When uploading a file, data is sent safely using SSL.
Only a user who is registered as an administrator of Pagescope Authentication Manager can perform the registration.
Uploaded IC card data is registered and managed on the database of PageScope Authentication Manager.
Biometric information is registered and managed on Gateway for B.A.M.
The files that are used between the PageScope Authentication Manager and Registration Tool can be encrypted (AES-256)
and saved.
Note: When using IC card data from the existing authentication server (Active Directory or LDAP server only),
the Registration Tool is not required.
IC card/biometric information registration using the Registration Tool.
Gateway
for B.A.M.
Registration
Tool
PageScope
Authentication
Manager
IC card data
Biometric
data
IC card data
Upload file
Biometric data
LDAP server
Email
Registration
Tool
Upload file
PageScope
MyPanel Manager
PageScope MyPanel registration using the Address Importer.
SSL
SSL
SSL
Pagescope enterprise suite Whitepaper security 29
Licence management for PageScope Enterprise Suite
The PageScope Enterprise Suite software must be purchased. In accordance with the devices to be managed, please
purchase the basic software module and the required number of licences. Communicate with the licence management server
on the Internet managed by Konica Minolta, and confirm the availability of the licence key. After that, PageScope Enterprise
Suite is available.
The key to enter for activation is a unique key that Konica Minolta issues, and it is tightly controlled by Konica Minolta. In
communication with the Licence Management Server, data is sent safely using SSL.
Licence
Management
Server
Activate
Activation to Licence Management Server.
Pagescope enterprise suite Whitepaper security 30
POP before SMTP
To secure access of the MFP with the intranet email server, it is possible to authenticate with an email account (POP3 – Post
Office Protocol) before an email is sent via the email server. This avoids the possibility of unauthorised email traffic with the
intranet email server, and with the domain/email suffix respectively.
In addition to the above email security, APOP (Authentication for Post Office Protocol) can be set. APOP is an authentica-
tion method with encrypted passwords which ensures increased safety in comparison to the usual unencrypted password
exchange used by POP for the retrieval of email messages.
SMTP authentication (SASL)
SMTP (Simple Mail Transfer Protocol) authentication can be activated on bizhub MFPs. This authorises a device to send
emails. For those customers who do not host their email services, the use of an ISP mail server is possible and supported by
the machine. SMTP authentication is required by, for example, AOL and for the prevention of SPAM.
S/MIME
For email transmission, the MFPs support S/MIME (Secure/Multipurpose Internet Mail Extensions) encryption.
S/MIME encryption is based on email certificates that can be registered on the MFP for all stored email addresses. The
encryption of the email information by the “public key” (given via the certificate) prevents the sniffing and unauthorised
decryption of email information at a high security level. For example, if an email is sent accidentally to a wrong destination,
the email information can still only be opened by the intended recipient, who is the only one in possession of the “private key”
necessary for decryption.
Encrypted PDF
bizhub OP-based products can encrypt scanned files in PDF format before sending them to a destination across the network.
The user has the ability to encrypt a scanned file by selecting the encryption key on the bizhub’s control panel. The encryption
option supports the PDF file type, and will require the decryption code to open the file from the recipient of the scan.
This feature is very similar to the Adobe Acrobat encryption process where a password is utilised for encryption and opening
a file, as well as to access the permissions area of the encryption process.
Scan security
This is an example of the MFP scan settings for PDF encryption (bizhub C654).
scan security Whitepaper security 31
PDF encryption via digital ID
PDF data that is attached to an email or sent to an FTP or SMB folder can be encrypted by a digital ID. Digital ID encryption
is based on the S/MIME encryption using a public key for encryption and private key for decryption. Compared to S/MIME, the
digital ID will only secure the attachment, which also allows using this transmission process for other transmission types than
email. In addition to digital ID stored on the MFP, certificates and/or public keys stored on the LDAP server can be used.
PDF digital signature
To prevent tampering with MFP-created PDF documents, it is possible to add a digital signature. The digital signature is
based on the SSL certificate installed on, or used by, the MFP.
The certificate information will be added to the PDF file without encryption. However, changes to the PDF after creation
(e.g. changing text, adding or deleting items) will be recorded in the PDF security information which is available in the PDF
reading applications.
In addition to preventing documents from being tampered with, the PDF signature gives information about the source of the
document, helping the program to recognise invalid document sources.
This screenshot is an example of a PDF document that has been signed with a
digital ID. The signature information shows that this document has been altered
since its creation and is no longer valid/trustworthy.
This is an example of the MFP digital signature settings for PDF files (bizhub C654).
Recipient’s
secret key
Encryption
Public key
KMBT
confidential
Sender’s
certificate
KMBT
confidential
Encrypted
email
RecipientSender
This illustration shows the encryption process via digital ID.
scan security Whitepaper security 32
User 3
User 0
User 5
Internal
email
Customer
Head-
quarters
This illustration shows the access levels of different users.
Manual destination blocking
The selection of manual destination blocking will prevent the direct input of, for example, email addresses for transmission
of scan files from the MFP. If it is set to “on”, the user only has the possibility to use destinations stored on the MFP, on the
PageScope Enterprise Server or a local email database available via LDAP search.
In addition to preventing the direct input of destinations, the user can be blocked from changing the FROM address for an
email transmission. If the machine is set to authentication, the user’s email address stored in the authentication data or Active
Directory will automatically be used.
Address book access control
The destinations (e.g. email, SMB, FTP) stored in the MFP or PageScope Enterprise Suite address book can be set with an
access level. These levels control the access/visibility of destinations for the user, depending on their security level as given in
the authentication data. Possible levels are 0–5.
scan security Whitepaper security 33
Service mode/administrator mode protection
The service mode and the administrator mode are protected by passwords or by codes. The service mode is only accessible
via a special code that is only known to Konica Minolta certified engineers.
The administrator mode is protected by an eight-digit alphanumeric password. This password can only be changed by the
service engineer or in the administration mode itself. This avoids any changes to passwords, destinations or other security-
related functions being made by unauthorised users.
Additional
security functions
This image shows the administrator login screen on the MFP panel (bizhub C654).
Unauthorised access lock
Like a cash terminal, the MFP can be set to reject a user if they attempt to authenticate with the wrong password. The MFP
administrator has the choice of two modes to lock the machine:
The unauthorised access lock can be extended to the system user box for confidential documents (secure print box).
The same modes will be applied in the case of unauthorised access to this document storage location.
Mode 1 The machine lock-out will be released after a certain time (1–60 minutes)
Mode 2 In addition to mode 1, the number of wrong attempts can be specified (1–5)
additional security functions Whitepaper security 34
This is an example of the MFP watermark settings (bizhub C654).
Distribution number printing
To index a certain number of printouts, it is possible to print a distribution number on every handout (first page or all pages).
This allows the easy identification of illegal copies made of this limited issue of documents.
Watermark/Overlay
All copies, prints and scans created on the MFP can be marked with a watermark or overlay image. This enables easy and
highly visible classification of the document security level. The stamping of the different document types can be set as default
by the administrator or individually as required by the user.
Copy protection via watermark
This function adds an invisible pattern to the original
printed document. When the original document is copied,
the message pattern (e.g. “Copy”) comes up, and clearly
distinguishes the copied document from the original one.
In addition to the message, the MFP serial number, as well
as the date and time the copy was made, can be set for
the pattern. The combination of the information in the pat-
tern and the audit log helps to trace the person who made
the illegal copy.
The Security Whitepaper
explains the security func-
tions of the bizhub series.
I.	Basic security policies
	 1.	Equipment with the 		
	 latest security
		technology
	 2.	Certification from
		independent company
Original document
with pattern
copied document
with message pattern
The Security Whitepaper
explains the security func-
tions of bizhub series.
I.	Basic security policies
	 1.	Equipment with the 		
	 latest security
		technology
	 2.	Certification from 		
		independent company
This illustration shows the copy protection functionality.
These are examples of the MFP copy security settings (bizhub C654).
additional security functions Whitepaper security 35
Printing in Copy
Guard/Password
Copy mode
Output with
invisible security
pattern
copy again
Copying in Copy
Guard/Password
Copy mode
A B C D E
F G H I J
K L M N
O P Q R S
T UVW X
Y Z
A B C D E
F G H I J
K L M N
O P Q R S
T UVW X
Y Z
original
Copy Guard function/Password Copy function
Many of the Konica Minolta devices could be equipped with a security kit which offers the Copy Guard and Password Copy
functions.
These functions allow administrators to embed a security pattern on the output. If a user tries to make a secondary copy of
the output, the device will display a message that says “Copying Prohibited” and will prohibit copying. The password copy
function allows administrators to set a password so the document can only be copied if the user enters the correct password.
Fax rerouting
	
Usually, incoming fax documents are immediately printed by a fax or MFP device. This enables anyone to view the
fax document in the output tray. To prevent all unauthorised access to arriving fax documents, it is possible to reroute
incoming faxes to a secure location. This could be any destination stored in the MFP address book (email, SMB, FTP
or user box). The user box is particularly suited as a destination for confidential fax receipt, and can digitally receive
incoming faxes with an F-Code. Besides the fact that digital fax receipt can speed up the fax reception process in
general, it completely prevents unauthorised access to fax information, confidential or not.
A B C D E
F G H I J
K L M N
O P Q R S
T U VW X
Y Z
Copy Guard
pattern detected
Password
pattern detected
Copying
prohibited
Protection
can be
cancelled by
entering a
password
A B C D E
F G H I J
K L M N
O P Q R S
T UV W X
Y Z
additional security functions Whitepaper security 36
x = standard o = option / = not available * for print only ** in evaluation *** with reservations
Features Print systems
bizhub
C25
bizhub
C35
bizhub
C224
C284
C364
C454
C554
bizhub
C654
C754
Konica
Minolta
240f
bizhub
20
bizhub
36
42
bizhub
215
bizhub
223
283
363
423
bizhub
552
652
bizhub
501
601
751
bizhub
C35P
bizhub
C353P
bizhub
20P
bizhub
40P
Access control/Access security
Copy/print accounting / x x x x / x x x x x / x / o
Function restriction
(copy/print/scan/fax/box/colour)
x*** x x x x x x / x x x o x / /
Secure printing (lock job) x x x x x x x x x x x o x / o
User box password protection / / x x x / / / x x x / x / /
User authentication (ID+password) o x x x x x x x x x x o x / o
Finger vein scanner / / o o / / / / o o o / o / /
IC card reader / o o o / / o / o o o / o / /
Event log / / x x / / / / x x x / x / /
Data security/Document security
Data encryption (hard disk) / x*** x x / / x*** / x x o / o / /
Hard disk data overwrite / x x x x / x / x x x / x / /
Hard disk password protection / / x x x / / / x x x / x / /
Data auto-deletion / / x x / / / / x x x / x / /
Network security
IP filtering x x x x x x x / x x x x x x x
Port and protocol access control x x x x x / x x*** x x x x x / x
SSL/TLS encryption (https) x x x x x x x x x x x x x x x
IP sec support x x x x / / x / x x x x x / x
S/MIME / x x x / / x / x x x / / / /
IEEE 802.1x support x x x x / / x / x x x x / / x
Scanning security
User authentication / x x x / x x / x x x / / / /
POP before SMTP x x x x x x x x x x x / / / /
SMTP authentication (SASL) x x x x x / x / x x x / / / /
Manual destination blocking / x x x / / x / x x x / / / /
Others
Service mode protection x x x x / x x / x x x x x x x
Admin mode protection x x x x x*** x x x x x x x x x x
Data capturing / / x x / / / / x x x / x / /
Unauthorised access lock / x x x / / x / x x x x x / /
Copy protection via watermark / x x x / / x / x x x / x / /
Encrypted PDF / x x x x / x / x x x / / / /
PDF signature / / o o / / / / o o o / / / /
PDF encryption via digital ID / / o o / / / / o o o / / / /
Copy Guard/Password Copy / / o o / / / / o o / / / / /
ISO 15408 certification
ISO 15408 EAL3 certified / x x** x** / / x** / x x** x / x / /
Multifunctional b/w systemsMultifunctional colour systems
SECURITY
FEATURES  AVAILABILITY
security features  Availability Whitepaper security 37
Notes
notes Whitepaper security 38
notes Whitepaper security 39
Konica Minolta
Business Solutions Europe GmbH
Europaallee 17
30855 Langenhagen Germany
Tel.: +49 (0) 511 74 04-0
Fax: +49 (0) 511 74 10 50
www.konicaminolta.eu
Your Konica Minolta Business Solutions Partner:

More Related Content

What's hot

Sb fortinet-nozomi
Sb fortinet-nozomiSb fortinet-nozomi
Sb fortinet-nozomiIvan Carmona
 
Protect your critical business information with information security solution...
Protect your critical business information with information security solution...Protect your critical business information with information security solution...
Protect your critical business information with information security solution...IBM India Smarter Computing
 
Protect your critical business information with information security solution...
Protect your critical business information with information security solution...Protect your critical business information with information security solution...
Protect your critical business information with information security solution...IBM India Smarter Computing
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltdNehul Gupta
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)Ivan Carmona
 
Forklift Impact Management, Defender system
Forklift Impact Management, Defender systemForklift Impact Management, Defender system
Forklift Impact Management, Defender systemTed Jurca
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0wendyking63
 
TrendMicro Worry Free Version 9
TrendMicro Worry Free Version 9TrendMicro Worry Free Version 9
TrendMicro Worry Free Version 9Motty Ben Atia
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data ProtectionGeekTek IT Services
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldE Radar
 
Physical security
Physical securityPhysical security
Physical securityDhani Ahmad
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015Jeffery Brown
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityDhani Ahmad
 
Mobile device security
Mobile device securityMobile device security
Mobile device securityLisa Herrera
 

What's hot (19)

Sb fortinet-nozomi
Sb fortinet-nozomiSb fortinet-nozomi
Sb fortinet-nozomi
 
Protect your critical business information with information security solution...
Protect your critical business information with information security solution...Protect your critical business information with information security solution...
Protect your critical business information with information security solution...
 
Protect your critical business information with information security solution...
Protect your critical business information with information security solution...Protect your critical business information with information security solution...
Protect your critical business information with information security solution...
 
Fortinet broch
Fortinet brochFortinet broch
Fortinet broch
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltd
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
 
Bank security
Bank securityBank security
Bank security
 
Secure Your Mobile Enterprise
Secure Your Mobile EnterpriseSecure Your Mobile Enterprise
Secure Your Mobile Enterprise
 
Forklift Impact Management, Defender system
Forklift Impact Management, Defender systemForklift Impact Management, Defender system
Forklift Impact Management, Defender system
 
Ibm Mobile Device Security Datasheet V2.0
Ibm Mobile Device Security   Datasheet   V2.0Ibm Mobile Device Security   Datasheet   V2.0
Ibm Mobile Device Security Datasheet V2.0
 
truMe
truMe truMe
truMe
 
TrendMicro Worry Free Version 9
TrendMicro Worry Free Version 9TrendMicro Worry Free Version 9
TrendMicro Worry Free Version 9
 
Mobile Device Management & Data Protection
Mobile Device Management & Data ProtectionMobile Device Management & Data Protection
Mobile Device Management & Data Protection
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital World
 
Physical security
Physical securityPhysical security
Physical security
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Mobile device security
Mobile device securityMobile device security
Mobile device security
 
880 st011
880 st011880 st011
880 st011
 

Similar to Fundamentals of Security White Paper

Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
Security Risk Solutions.pptx
Security Risk Solutions.pptxSecurity Risk Solutions.pptx
Security Risk Solutions.pptxFujifilmFbsg
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?William hendric
 
Orange Business Live 2013 Security Breakout
Orange Business Live 2013 Security BreakoutOrange Business Live 2013 Security Breakout
Orange Business Live 2013 Security BreakoutOrange Business Services
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutionsCanon Business CEE
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoTCanon Business CEE
 
Ps13 its 1212_printer_healthcare_industry_safemedi-docuprintsolution_br-1
Ps13 its 1212_printer_healthcare_industry_safemedi-docuprintsolution_br-1Ps13 its 1212_printer_healthcare_industry_safemedi-docuprintsolution_br-1
Ps13 its 1212_printer_healthcare_industry_safemedi-docuprintsolution_br-1Linda Sithole
 
Take the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionTake the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionVTECH SOLUTION
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint securityhassan latifi
 
u10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji Jacobu10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji JacobBeji Jacob
 
Why uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-securityWhy uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-securityCincoC
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111Jan Vekemans
 
amrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdfamrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdfamrapalibuildersreviews
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...OKsystem
 

Similar to Fundamentals of Security White Paper (20)

Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
Security Risk Solutions.pptx
Security Risk Solutions.pptxSecurity Risk Solutions.pptx
Security Risk Solutions.pptx
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Understanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For EveryoneUnderstanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For Everyone
 
Bizhub v care security white paper version 2
Bizhub v care security white paper version 2Bizhub v care security white paper version 2
Bizhub v care security white paper version 2
 
Orange Business Live 2013 Security Breakout
Orange Business Live 2013 Security BreakoutOrange Business Live 2013 Security Breakout
Orange Business Live 2013 Security Breakout
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #3 Trust in your office solutions
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
 
Ps13 its 1212_printer_healthcare_industry_safemedi-docuprintsolution_br-1
Ps13 its 1212_printer_healthcare_industry_safemedi-docuprintsolution_br-1Ps13 its 1212_printer_healthcare_industry_safemedi-docuprintsolution_br-1
Ps13 its 1212_printer_healthcare_industry_safemedi-docuprintsolution_br-1
 
Take the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionTake the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security Protection
 
Infowatch endpoint security
Infowatch endpoint securityInfowatch endpoint security
Infowatch endpoint security
 
u10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji Jacobu10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji Jacob
 
Why uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-securityWhy uem-is-the-key-to-enterprise-it-security
Why uem-is-the-key-to-enterprise-it-security
 
M I Dentity 3 G 040111
M I Dentity 3 G 040111M I Dentity 3 G 040111
M I Dentity 3 G 040111
 
amrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdfamrapali builders @@hacking printers.pdf
amrapali builders @@hacking printers.pdf
 
secureMFP
secureMFPsecureMFP
secureMFP
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Uniprint Infinity Citrix Printing Solution
Uniprint Infinity Citrix Printing SolutionUniprint Infinity Citrix Printing Solution
Uniprint Infinity Citrix Printing Solution
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
How endpoint security system works
How endpoint security system worksHow endpoint security system works
How endpoint security system works
 

More from Adrian Boucek

StandOut - Total Economic Impact Infographic
StandOut - Total Economic Impact InfographicStandOut - Total Economic Impact Infographic
StandOut - Total Economic Impact InfographicAdrian Boucek
 
Minting the New Currency of HR - Insights
Minting the New Currency of HR - InsightsMinting the New Currency of HR - Insights
Minting the New Currency of HR - InsightsAdrian Boucek
 
State of the Global Workplace - Gallup Report (2017)
State of the Global Workplace - Gallup Report (2017)State of the Global Workplace - Gallup Report (2017)
State of the Global Workplace - Gallup Report (2017)Adrian Boucek
 
Total Economic Impact of ADP Workforce Now
Total Economic Impact of ADP Workforce NowTotal Economic Impact of ADP Workforce Now
Total Economic Impact of ADP Workforce NowAdrian Boucek
 
The Tip of the Iceberg: The Hidden Costs of HR and Payroll Administration
The Tip of the Iceberg: The Hidden Costs of HR and Payroll AdministrationThe Tip of the Iceberg: The Hidden Costs of HR and Payroll Administration
The Tip of the Iceberg: The Hidden Costs of HR and Payroll AdministrationAdrian Boucek
 
Humans Wanted - How Canadian youth can thrive in the age of disruption
Humans Wanted - How Canadian youth can thrive in the age of disruptionHumans Wanted - How Canadian youth can thrive in the age of disruption
Humans Wanted - How Canadian youth can thrive in the age of disruptionAdrian Boucek
 
Aberdeen Group Time & Attendance Strategies, Beyond Compliance and Payroll Ac...
Aberdeen Group Time & Attendance Strategies, Beyond Compliance and Payroll Ac...Aberdeen Group Time & Attendance Strategies, Beyond Compliance and Payroll Ac...
Aberdeen Group Time & Attendance Strategies, Beyond Compliance and Payroll Ac...Adrian Boucek
 
ADP Workforce Now Brochure
ADP Workforce Now BrochureADP Workforce Now Brochure
ADP Workforce Now BrochureAdrian Boucek
 
PricewaterhouseCoopers HR Technology Survey
PricewaterhouseCoopers HR Technology SurveyPricewaterhouseCoopers HR Technology Survey
PricewaterhouseCoopers HR Technology SurveyAdrian Boucek
 
Evolution of Work 2.0: The Me vs. We Mindset
Evolution of Work 2.0: The Me vs. We MindsetEvolution of Work 2.0: The Me vs. We Mindset
Evolution of Work 2.0: The Me vs. We MindsetAdrian Boucek
 
Strategic People Management for the 21st Century
Strategic People Management for the 21st CenturyStrategic People Management for the 21st Century
Strategic People Management for the 21st CenturyAdrian Boucek
 
Exposing the Hidden Costs
Exposing the Hidden CostsExposing the Hidden Costs
Exposing the Hidden CostsAdrian Boucek
 
The Importance of Total Cost of Ownership: How Midsized Companies Can Find Co...
The Importance of Total Cost of Ownership: How Midsized Companies Can Find Co...The Importance of Total Cost of Ownership: How Midsized Companies Can Find Co...
The Importance of Total Cost of Ownership: How Midsized Companies Can Find Co...Adrian Boucek
 
The Hidden Reality of Payroll & HR Administration Costs
The Hidden Reality of Payroll & HR Administration CostsThe Hidden Reality of Payroll & HR Administration Costs
The Hidden Reality of Payroll & HR Administration CostsAdrian Boucek
 
In-house vs. Outsourced Payroll Processing: Separating Fact from Fiction
In-house vs. Outsourced Payroll Processing: Separating Fact from FictionIn-house vs. Outsourced Payroll Processing: Separating Fact from Fiction
In-house vs. Outsourced Payroll Processing: Separating Fact from FictionAdrian Boucek
 
Turning Documents into Data
Turning Documents into DataTurning Documents into Data
Turning Documents into DataAdrian Boucek
 
Managing Print as a Strategic Asset for Your Organization
Managing Print as a Strategic Asset for Your OrganizationManaging Print as a Strategic Asset for Your Organization
Managing Print as a Strategic Asset for Your OrganizationAdrian Boucek
 
The New Era of Smart Printing for Schools
The New Era of Smart Printing for SchoolsThe New Era of Smart Printing for Schools
The New Era of Smart Printing for SchoolsAdrian Boucek
 
The Life of a Document
The Life of a DocumentThe Life of a Document
The Life of a DocumentAdrian Boucek
 

More from Adrian Boucek (20)

StandOut - Total Economic Impact Infographic
StandOut - Total Economic Impact InfographicStandOut - Total Economic Impact Infographic
StandOut - Total Economic Impact Infographic
 
Minting the New Currency of HR - Insights
Minting the New Currency of HR - InsightsMinting the New Currency of HR - Insights
Minting the New Currency of HR - Insights
 
State of the Global Workplace - Gallup Report (2017)
State of the Global Workplace - Gallup Report (2017)State of the Global Workplace - Gallup Report (2017)
State of the Global Workplace - Gallup Report (2017)
 
Total Economic Impact of ADP Workforce Now
Total Economic Impact of ADP Workforce NowTotal Economic Impact of ADP Workforce Now
Total Economic Impact of ADP Workforce Now
 
The Tip of the Iceberg: The Hidden Costs of HR and Payroll Administration
The Tip of the Iceberg: The Hidden Costs of HR and Payroll AdministrationThe Tip of the Iceberg: The Hidden Costs of HR and Payroll Administration
The Tip of the Iceberg: The Hidden Costs of HR and Payroll Administration
 
Humans Wanted - How Canadian youth can thrive in the age of disruption
Humans Wanted - How Canadian youth can thrive in the age of disruptionHumans Wanted - How Canadian youth can thrive in the age of disruption
Humans Wanted - How Canadian youth can thrive in the age of disruption
 
Aberdeen Group Time & Attendance Strategies, Beyond Compliance and Payroll Ac...
Aberdeen Group Time & Attendance Strategies, Beyond Compliance and Payroll Ac...Aberdeen Group Time & Attendance Strategies, Beyond Compliance and Payroll Ac...
Aberdeen Group Time & Attendance Strategies, Beyond Compliance and Payroll Ac...
 
ADP Workforce Now Brochure
ADP Workforce Now BrochureADP Workforce Now Brochure
ADP Workforce Now Brochure
 
PricewaterhouseCoopers HR Technology Survey
PricewaterhouseCoopers HR Technology SurveyPricewaterhouseCoopers HR Technology Survey
PricewaterhouseCoopers HR Technology Survey
 
Evolution of Work 2.0: The Me vs. We Mindset
Evolution of Work 2.0: The Me vs. We MindsetEvolution of Work 2.0: The Me vs. We Mindset
Evolution of Work 2.0: The Me vs. We Mindset
 
Strategic People Management for the 21st Century
Strategic People Management for the 21st CenturyStrategic People Management for the 21st Century
Strategic People Management for the 21st Century
 
Exposing the Hidden Costs
Exposing the Hidden CostsExposing the Hidden Costs
Exposing the Hidden Costs
 
The Importance of Total Cost of Ownership: How Midsized Companies Can Find Co...
The Importance of Total Cost of Ownership: How Midsized Companies Can Find Co...The Importance of Total Cost of Ownership: How Midsized Companies Can Find Co...
The Importance of Total Cost of Ownership: How Midsized Companies Can Find Co...
 
The Hidden Reality of Payroll & HR Administration Costs
The Hidden Reality of Payroll & HR Administration CostsThe Hidden Reality of Payroll & HR Administration Costs
The Hidden Reality of Payroll & HR Administration Costs
 
In-house vs. Outsourced Payroll Processing: Separating Fact from Fiction
In-house vs. Outsourced Payroll Processing: Separating Fact from FictionIn-house vs. Outsourced Payroll Processing: Separating Fact from Fiction
In-house vs. Outsourced Payroll Processing: Separating Fact from Fiction
 
Turning Documents into Data
Turning Documents into DataTurning Documents into Data
Turning Documents into Data
 
Managing Print as a Strategic Asset for Your Organization
Managing Print as a Strategic Asset for Your OrganizationManaging Print as a Strategic Asset for Your Organization
Managing Print as a Strategic Asset for Your Organization
 
The Canon Challenge
The Canon ChallengeThe Canon Challenge
The Canon Challenge
 
The New Era of Smart Printing for Schools
The New Era of Smart Printing for SchoolsThe New Era of Smart Printing for Schools
The New Era of Smart Printing for Schools
 
The Life of a Document
The Life of a DocumentThe Life of a Document
The Life of a Document
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Fundamentals of Security White Paper

  • 2. This fundamentals of security guide is a “living” document – this means it is continually updated. This guide is intended solely for the use and information of Konica Minolta Business Solutions Europe GmbH, the European Konica Minolta subsidiaries and distributors, and their employees. The information herein was obtained from various sources that are deemed reliable by all industry standards. To the best of our knowledge, this information is accurate in all respects. However, neither Konica Minolta nor any of its agents or employees shall be responsible for any inaccura- cies contained herein. © 2012 KONICA MINOLTA BUSINESS SOLUTIONS EUROPE, GmbH. All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronically or mechanically, including photocopying, recording or any information storage and retrieval system, without permission in writing from the publisher. Some functions may require optional extras to be purchased. Please refer to the function availability table for the various devices on page 37. Fundamentals of security
  • 3. Fundamentals of security 2 Security without sacrifice 4 4 Konica Minolta security standards Cause for concern everywhere – security vulnerability 5 5 Access control/Access security 5 Document security/Data security 5 Network security General system security 6 6 Protection against virus from USB memory 6 Security for fax line 6 Security of remote diagnostic services 7 Security of RAM 7 Password handling Access control 8 8 Copy/print accounting 9 User authentication – ID and password 10 User authentication – Finger vein scanner 10 User authentication – IC card reader 11 Auto log off 11 Function restrictions 12 Secure print (lock job) 12 Touch Print/ID Print 13 User box password protection 14 Event log 14 Driver user data encryption 14 Password for non-business hours Data security 15 15 Hard disk password protection 15 Data encryption (hard disk) 15 Hard disk data overwrite 17 Temporary data deletion 17 Data auto deletion INDEX Whitepaper security 3 Network security 18 18 IP filtering 19 Port and protocol access control 19 SSL/TLS encryption (https) 20 IPsec support 20 IEEE 802.1x support 21 NDS authentication 22 OpenAPI communication 23 Remote panel PageScope Enterprise Suite 24 24 Summary of PageScope Enterprise Suite 25 PageScope Enterprise Suite – Communication security 28 PageScope Enterprise Suite – Access restriction 28 PageScope Enterprise Suite – Data management 30 Licence management for PageScope Enterprise Suite Scan security 31 31 POP before SMTP 31 SMTP authentication (SASL) 31 S/MIME 31 Encrypted PDF 32 PDF encryption via digital ID 32 PDF digital signature 33 Manual destination blocking 33 Address book access control Additional security functions 34 34 Service mode/administration mode protection 34 Unauthorised access lock 35 Distribution number printing 35 Watermark/Overlay 35 Copy protection via watermark 36 Copy Guard function/Password Copy function 36 Fax rerouting Security features availability 37
  • 4. Konica Minolta realised early on the importance of security issues in the digital age, where the risk of seriously damaging security breaches rises dramatically alongside rapidly growing worldwide communication possibilities. In response to these threats, Konica Minolta has taken a leading role in developing and implementing security-based informa- tion technology in our multifunctional products. Ever since the introduction of the first Konica Minolta MFP, Konica Minolta has striven to develop and implement technology that safeguards the confidentiality of electronic documents. The most important security standard in Europe is ISO 15408, also known as Common Criteria certification. Konica Minolta has newly introduced multifunctional bizhub products validated to Common Criteria EAL3 security standards. Common Criteria (CC) is the only internationally recognised standard for IT security testing. Printers, copiers and software with ISO 15408 certification are security evaluated, and guarantee the security levels that companies look for today. With the CC certification users can rest assured that on Konica Minolta’s multifunctional devices their confidential data remains confidential. This document discusses various generally important security requirements, and explains how Konica Minolta MFPs comply with the rules and regulations set forth in ISO 15408 (Common Criteria). Security without sacrifice Konica Minolta security standards ISO 15408 is divided into seven levels of EAL (Evaluation Assurance Level) certification. Standard off-the-shelf products can only achieve up to EAL4 certification. Most IT-related products are certified at EAL3. A certification lab in Japan tests Konica Minolta products. Konica Minolta certifications and related documentation can be found at the following website: http://www.commoncriteriaportal.org SECURITY WITHOUT SACRIFICE Whitepaper security 4
  • 5. Generally MFPs offer a huge range of combined and single functions and choices; therefore they represent a similarly wide range of potential security loopholes. The scope of MFP security could be grouped into three main sections: Access control/Access security Despite security being high on the agenda in both public and corporate domains, MFPs are often ignored as being a security risk at all. While some risks are perhaps identified, they are often simply neglected, especially where sensitive documents and information is concerned. This is especially risky for those MFPs and printers located in public areas, where they can be accessed by staff, contractors and even visitors. Because the advanced features available on today’s MFPs deliberately make it easy for information to be copied and distributed within and beyond actual and virtual corporate boundaries, the first logical step is to prevent unauthorised persons being able to operate an MFP. Preventive measures are needed, firstly to control access to MFPs, and secondly to establish some kind of security policy reflecting how the devices are actually used in real life - obviously none of these measures should restrict or limit the user-friendliness of the systems. Konica Minolta is prepared for this, offering various security features and solutions. Document security/Data security Reflecting the fact that MFPs and printers are often located in public areas, where they can be easily accessed by staff, contractors and visitors, it is necessary to implement appropriate data security policies. The situation is after all that confidential data, for example stored on the MFP hard disk over a period of time, or simply confidential documents lying in the MFP output tray as printouts, are initially unprotected and could fall into the wrong hands. Konica Minolta offers a range of tailored security measures to ensure document and data security. Network security In today’s corporate environment, indeed in today’s business world, communications and connectivity are indispensable. Konica Minolta office devices are designed to integrate into network environments. For example network printers and multi-functional peripherals (MFP) have evolved to the point that they act as sophisticated document processing hubs integral within the network, with the ability to print, copy and scan documents and data to network destinations, send emails and more. This scenario also means that this office technology must cope with and comply with the same security risks and policies as any other network device, and represents a risk if unprotected. In order to avoid any vulnerability from either internal or external network attacks, Konica Minolta ensures that all equipment complies with the strictest security standards. This is achieved using a number of measures. Cause for concern everywhere – security vulnerability With its comprehensive range of security features, Konica Minolta provides professional solutions for the detection and prevention of security breaches. RISKS Whitepaper security 5
  • 6. General System security Protection against virus from USB memory Most of the Konica Minolta devices are equipped with an interface for USB memory sticks. This offers the possibility to print documents directly from the USB memory without a PC. It is also possible to scan documents directly to the USB memory. Generally, virus infection from USB memory is caused by program files automatically executing when the USB memory is inserted in the device. Konica Minolta devices do not support functionality to automatically execute files by inserting the USB memory. Therefore, Konica Minolta devices are not affected by these types of viruses. Security for fax line Any communication via fax line uses only fax protocol and does not support any other communication protocol. If someone from outside attempts to intrude with a different protocol via a public line, or tries to send data that cannot be decompressed as fax data, Konica Minolta products handle the event as an error and block such communication. Security of remote diagnostic services The remote diagnostic system uses a public telephone line for communication between the Konica Minolta system and the service centre. With this system, Konica Minolta devices send main-body data to the service centre; and the service centre can transmit data to change the main-body settings remotely. An ID preset on every main body and service centre ensures that communication is only enabled if the IDs match. public telephone line Check whether correct command response by G3 protocol is made or not. If G3 protocol is used, the communication is continued. But if anything other than G3 protocol is used, the com- munication is blocked off.Call to fax line Response by G3 protocol Response by G3 protocol 2. Registration is made with password 3. Call to get data 6. Check the password and then start communication 1. Call for registration of communication 4. Check the password and then start communication 5. Send the data describing device status Public telephone line GENERAL SYSTEM SECURITY Whitepaper security 6
  • 7. Security of RAM There are three types of RAM currently used in bizhub products: Volatile RAM – typically volatile RAM would be: – file memory – electronic sorting – work memory – storing program parameters, temporary data and image conversion of controller – fax memory – working RAM for fax Data written to volatile RAM is held while the power is on. The data held in this type of RAM is overwritten by the next page or job being printed. Once the job is printed the data is deleted from the RAM. Also, as soon as the power is turned off the data in volatile RAM is deleted. Volatile RAM is secure: if RAM is removed after an engine is powered off, all the data on that RAM chip will have already been deleted. It is impossible to remove the RAM while the engine power is on. The only other way to possibly extract data would be via an indirect route or a security hole. These access points are evaluated and tested by independent security consultants before the Konica Minolta products are submitted for ISO 15408 certification. There are no indirect routes or security holes in bizhub MFPs. Non-volatile RAM (NV-RAM) – typically non-volatile RAM would be: – counter data – job settings – utility settings The data written to non-volatile RAM is not image or document data, meaning the data is not confidential or private. Unlike volatile RAM this data is not cleared when the power is turned off. It is important to note that when the HDD is formatted, the user/account data in NV-RAM will be deleted and reset to factory default. Flash memory – typically flash memory is utilised with: – machine firmware – control panel data – printer-resident fonts – copy-protect watermarks Flash memory is embedded on an MFP circuit board and cannot be erased. The data stored in flash memory is not critical, confidential or private. Password handling In general, all passwords are handled securely by the MFP following several security rules: 1. Independent of the functionality the setting of a password always has to be verified once. 2. All passwords entered via MFP panel, Web interface or application appear on the screen as “xxx” to prevent illegal copying. 3. All passwords are encrypted for storage. 4. All passwords contain at least 8 to 64 alphanumeric characters. Depending on the MFP functionality, passwords can be even longer. 5. Passwords transferred via a network can always be transmitted encrypted. 6. Passwords for user authentication and user boxes can only be reset by the administrator. 7. Administrator passwords can only be reset by a Konica Minolta certified engineer. GENERAL SYSTEM SECURITY Whitepaper security 7
  • 8. Copy/print accounting Konica Minolta bizhub MFPs come with the ability to enable account tracking as standard. When this function is activated, a user is required to enter a 4–8 digit personal identification number (PIN) to gain access to make a copy, send a print, or perform other functions at the MFP. If a user does not submit or enter an authorised PIN (from the print driver), the print job submitted will not be printed. If a user does not enter an authorised PIN at the copier control panel, they will be denied access to the system. When logged in, the user’s activities are electronically recorded onto a log file inside the system. An administra- tor or key operator can access this file. This is a very popular feature for many customers, who use this to invoice departments and audit employees’ copier activities. In addition, it is possible to configure individual copy and print limits per user. Access Control This is an example of the accounting screen from the Konica Minolta bizhub C654 control panel.
  • 9. User authentication - ID and password Network Supported external servers like Active Directory, Novell NDS, NTML v.1 and NTLMv.2; a maximum of 64 characters can be utilised. Active Directory can support up to 20 domains. In addition, authentication can be centrally managed via PageScope Enterprise Suite Authentication Manager. Machine Internal authentication at the machine can support up to 1,000 user accounts. Passwords can have up to eight alphanumeric characters. Password protection Passwords can be created for administrators and users, and can be alphanumeric with up to eight characters. An administrator can maintain passwords. Passwords are protected by the Kerberos system or SSL. These are examples of the authentication screen from the Konica Minolta bizhub C654 control panel and printer driver. Acess control Whitepaper security 9
  • 10. User authentication – IC card reader As a third authentication solution, Konica Minolta MFPs can be equipped with an IC card reader. The non-contact IC card contains a unique code which is linked in the MFP authentication database to a user ID and password. The biometric data, the IC card code and user information are stored in an encrypted form on the MFP hard disk, and are therefore protected. As an alternative to storing authentication data on the MFP hard disk, authentication data can be centrally provided via the PageScope Enterprise Suite Authentication Manager. User authentication – Finger vein scanner Besides authentication via user ID and password, use of a biometric device is also possible. The data for the biometric authentication device, is handled securely and cannot be used illegally. The vein in the finger as biometric data: The vein is located within the body and, unlike fingerprints, it cannot be scanned/read without the person noticing. This makes it virtually impossible to forge. The process implemented in this system: This system implements the security guideline based on the U.S. Government Biometric Verification Mode Protection Profile for Medium Robustness Environments (BVMPP-MR) version 1.0*; some of the important security/privacy specifications sup- ported by this system are as follows. Reconstruction of the biometric data: The only data registered on the HDD are random numbers calculated on the basis of the feature of the scanned data, and it is theoretically impossible to reconstruct the original vein data from the data in the HDD. Structure of the data on the HDD: The structure of the data on the HDD is not made public. This makes it impossible to forge. Erasing of data in the authentication device: The data left in the device is encrypted when temporarily stored in the RAM, and is erased after transferring to the MFP. Source of the near-infrared rays Camera Vein in the finger Feature of the scanned data Database for registration Authentication is completed Encrypt and register Checking the feature of scanned data by a unique technology owned by Hitachi Soft Result of checking
  • 11. Auto log off Konica Minolta MFPs can be programmed to automati- cally reset to a state that requires password input after a predetermined time of inactivity. This ensures that the MFP will reset to a secure state if a user forgets to log off from an MFP when finished. Note that the reset timer can be set from 1 to 60 minutes. Some Konica Minolta MFPs can be programmed to reset in as little as 30 seconds. If the machine has the account tracking function enabled the machine will enter a state (after a pre-programmed period of inactivity) that requires a user to enter a unique PIN or password. This function should satisfy most concerns about users forgetting to log off after they have finished scanning or copying documents at the MFP. Function restrictions An advanced level of user security allows or prohibits the use and availability of specific machine features. A user and/or administrator can control these features as needed throughout an organisation of any size. The specific features are: – scanning from the bizhub as a walk-up function or a remote function – user box from the bizhub as a walk-up function or a remote function – copying from the bizhub as a walk-up function, including the restrictions of only b/w copying or only colour copying or neither b/w nor colour copying – faxing from the bizhub as a walk-up function or a remote function – printing as a remote function via the printer driver, including the restrictions of only b/w printing or only colour printing or neither b/w nor colour printing Function restrictions can be set in general either as a walk-up functionality or per user, depending on the user authentication. This screen illustrates the administrator and user auto log-off timer setting that is accessible via the MFP’s remote Web browser-based interface (PageScope Web Connection). This is an example of the function permission screen from the Konica Minolta bizhub C654 control panel. Acess control Whitepaper security 11
  • 12. Secure print (lock job) Konica Minolta MFPs offer a standard feature called secure printing. This feature provides a user sending a print job with the ability to hold the job in the memory of the system until the authorised user walks up to the machine and releases the job by entering a unique secure PIN/password at the control panel of the MFP. This code is first specified by the user when he sub- mits his print job from the PC workstation, ensuring that only the sender of the job can access an electronic document that contains sensitive electronic information. In addition, those MFPs equipped with a hard drive have the ability to store digital data inside the system. When these documents are stored – either by sending them from a PC or by scanning them in at the copier – users cannot retrieve the document unless a secure PIN/password is entered on the copier’s control panel. Touch Print/ID Print If the machine is set up with user authentication, server or MFP-based, secure printing can be used via the Touch Print or ID Print feature. Instead of an additional secure print ID and password, the user authentication data will be used to identify a stored secure print job, and will release the job after authentication at the device. This will avoid print jobs being released before the user can remove them from the output bin, which will prevent confidential data being viewed by other persons. Touch Print is based on authentication via finger vein scanner or IC card reader. ID Print is based on user authentication via ID and password. This is an example of the secure print screen from the Konica Minolta bizhub C654 printer driver. Acess control Whitepaper security 12
  • 13. User box password protection The user box offers the functionality to store commonly used copy, print, scan or fax documents on the hard disk of the MFP. Besides the general security features given to the hard disk, these user boxes can be set with different access levels. On a walk-up MFP the user boxes can be protected by an eight-character alphanumeric password. If the MFP is set up with authentication, the user boxes can be set as a personal box (only vis- ible for the linked authenticated user), group box (only visible for users who are set up to view the box) or public box. The access to the user box is automatically given via the authentication. But the additional security keeps all users from seeing the box; therefore they have no opportunity to hack into it by trying out passwords. This is an example of set user box registration and user box view on the bizhub C654 panel. Acess control Whitepaper security 13
  • 14. Driver user data encryption For secure printing, print authentication and print accounting it is necessary for the user to input certain information, e.g. user ID and password, in the driver window for transmission to the MFP. To avoid network information from being sniffed, such user data can be encrypted by the printer driver and decrypted on the MFP. The encryption key can be set individually by the machine administrator with a length of up to 20 digits. If the encryption key is not used by the local user or the print server, print jobs will be printed anyhow. However, confidential user access informa- tion might not be safe. Event log All Konica Minolta MFPs offer the option to record all actions that have happened on the MFP, e.g. a print job including sender name, document name and password. These event logs or histories can be downloaded and viewed by the administrator. To automate the process of event-log downloading, the PageScope Log Management utility is available to register and view any actions happening on the MFPs in the network. This is an example of the Log Management Utility user interface. This is an example of MFP (bizhub C654) password entry during non-business hours. Password for non-business hours If an MFP is not set up with user authentication, but instead is used as a walk-up device, basically anybody can access the machine and print/send data that is not secure. To prevent this happening, the administrator can program a “business timeframe”, during which the machine can be used as a walk-up device, while outside this period a password is necessary to access the machine. Acess control Whitepaper security 14
  • 15. Hard disk password protection The built-in hard disk of the MFP is automatically protected by a password. This password is stored in the hard disk BIOS and prevents access to the hard disk data, as long as the correct password has not been entered. Therefore, even the removal of the hard disk and installation into a PC, laptop or other MFP would not give access to the hard disk. The password is allocated automatically but can be changed by the machine administrator. Data security This is an example of MFP password entry in the administration mode for hard-disk protection (bizhub C654). Data encryption (hard disk) Konica Minolta offers either a standard hard drive encryption kit or an advanced version as an optional extra. If desired, electronic documents can be stored in a password-protected box on the hard drive. If an organisation is concerned about the security of such data, this can be pro- tected by encrypting it with the HD encryption kit available. The stored data is encrypted using the advanced encryption standard (AES) supporting 128-bit key size. Once a HDD is encrypted its data cannot be read, even if the HDD is removed from the MFP. This is an example of the HDD encryption settings of the MFP (bizhub C654). Data security Whitepaper security 15
  • 16. Mode 1 Overwrite with 0x00 Japan Electronic Information Technology Association Russian Standard (GOST) Mode 2 Overwrite with random 1 byte numbers Current National Security Agency (NSA) standard Overwrite with random 1 byte numbers Overwrite with 0x00 Mode 3 Overwrite with 0x00 National Computer Security Center (NCSC-TG-025) Overwrite with 0xff US Navy (NAVSO P-5239-26) Overwrite with random 1 byte numbers Department of Defense (DoD 5220.22M) Mode 4 Overwrite with random 1 byte numbers Army Regulations (AR380-19) Overwrite with 0x00 Overwrite with 0xff Mode 5 Overwrite with 0x00 Former NSA Standard Overwrite with 0xff Overwrite with 0x00 Overwrite with 0xff Mode 6 Overwrite with 0x00 North Atlantic Treaty Organization – NATO Standard Overwrite with 0xff Overwrite with 0x00 Overwrite with 0xff Overwrite with 0x00 Overwrite with 0xff Overwrite with 512 bytes of specified data Mode 7 Overwrite with 0x00 US Air Force (AFSSI5020) Overwrite with 0xff Overwrite with 0x00 Overwrite with 0xff Overwrite with 0x00 Overwrite with 0xff Overwrite with 0xaa Verified Mode 8 Overwrite with 0x00 US Air Force (AFSSI5020) Overwrite with 0xff Overwrite with 0x00 Overwrite with 0xff Overwrite with 0x00 Overwrite with 0xff Overwrite with 0xaa Verified Different modes of HDD overwriting Hard disk data overwrite When equipped with a hard disk drive (HDD), Konica Minolta MFPs can store sensitive electronic information. The data can be deleted by those users who own the documents that reside inside the MFP’s HDD in password-protected boxes. For added safety, a key operator, administrator or technician can physically format (erase) the HDD if the MFP needs to be relocated. The hard drives can be overwritten (sanitised) using a number of different methods conforming to various (e.g. military) specifications, as listed in the table below. This is an example of the HDD overwrite settings of the MFP (bizhub C654). The example shows an MFP panel for hard-disk formatting in administration mode (bizhub C654). Data security Whitepaper security 16
  • 17. Mode 1 Overwrite with 0x00 Mode 2 Overwrite with 0x00 Overwritten with Oxff Overwritten with the letter “A” (=x61) Verified Temporary data deletion Depending on the file size for certain jobs, the MFP might use the hard disk to swap data for copy, scan, print and fax information. As additional security to protect the information stored on the hard disk, the machine can be set to format and overwrite this data on a per-job basis. Under this setting the temporarily swapped data is immediately deleted and overwritten as soon as the data is no longer necessary to end the job in action. For the temporary data deletion two modes are available. Data auto deletion The administrator can set an auto deletion timer for data stored in the personal or public user boxes, as well as system boxes (e.g. secure print box or encrypted PDF print box). The auto deletion setting will erase the copy, print, scan or fax jobs stored in boxes, depending on the storage period and the timeframe selected for deletion. PrintingDecompression Overwriting the former data Delete after the job Compression (Konica Minolta unique format) Scanning This is an illustration of the MFP copy process with temporary data deletion selected. This is an example of the MFP setting for user box document auto deletion (bizhub C654). Data security Whitepaper security 17
  • 18. IP filtering IP address filtering can be set at the machine where the network interface card of the MFP can be programmed to permit or prohibit access to the device for a specific range of IP addresses for client PCs. Network security The screenshot illustrates the PageScope Web Connection administrator access to a bizhub C654. Here an administrator can set access permission or refusal to a specific range of IP addresses. network security Whitepaper security 18
  • 19. SSL/TLS encryption (https) The data communication via network to specific databases or applications can be encrypted by SSL (Secure Sockets Layer) or TLS (Transport Layer Security). Supported versions of encryption are SSL 2.0, SSL 3.0 and TLS 1.0. The encryption of network communication is essential with regard to the transmission of, for example, authentication data or administrator passwords. Communication can be encrypted for: – LDAP protocol – SMTP protocol – POP protocol – IPP (IPPS) protocol – Windows Active Directory The MFP allows the programming of an SSL certificate via the administrator mode of PageScope Web Connection. Port and protocol access control To prevent unnecessary open communication lines on the MFP, open ports and protocols can be opened, closed or enabled and disabled through the administration mode at the machine or remotely via PageScope Web Connection or PageScope Net Care. The following ports can be opened or closed: The following protocols can be enabled or disabled: SNMP, SMB, POP, FTP, SMTP, IPP, Telnet, LDAP, HTTP Port 20 – FTP Port 21 – FTP Port 25 – SMTP Port 80 – HTTP Port 123 – NTP Port 161 – SNMP Port 389 – LDAP Port 631 – IPP Port 110 – POP3 Port 636 – LDAP for TLS/SSL Port 9100 – PDL The screenshot illustrates the PageScope Web Connection administrator access to the security settings for SSL certificates. – PageScope Enterprise Server – PageScope Data Administrator – PageScope Addressbook Utility – PageScope Web Connection (https) network security Whitepaper security 19
  • 20. IPsec support To complete the encryption of any network data transmitted to or from the MFP, the bizhub devices also support IPsec (IP security protocol). This protocol encrypts the whole network communication between the local intranet (server, client PC) and the device itself. The IPsec protocol can be programmed via the IKE settings. Up to four groups of IPsec/IKE settings can be stored. IEEE 802.1x support IEEE 802.1x is a port-based authentication standard for network access control to WAN and LAN networks. The IEEE 802.1x authentication standard generates a secure network by closing any network communication (e.g. DHCP or HTTP) to unauthorised devices except for authentication requests. This prevents devices gaining access to a network by sim- ply acquiring an IP address via DHCP and, for instance, performing a man-in-the-middle attack to sniff data streams on the network. Only proper authentication, a password or certificate entered by the authenticator will grant access to the secure network. This is an example of the MFP 802.1x authentication settings. This is an example of MFP IPsec/IKE settings via the MFP panel (bizhub C654). network security Whitepaper security 20
  • 21. NDS authentication NDS authentication is a method of user identification that performs authentication based on a specified server, an entered user name and password for NDS (Novell Directory Services) run- ning on NetWare 5.1 or later. Conventionally, NDS authentication only supported IPX/SPX communication protocols. However, the most recent MFPs also support NDS authentication via TCP/IP. NDS authentication can be performed by specifying either IPX/SPX or TCP/IP protocols. NDS authentication via TCP/IP obtains the IP address of the NDS authentication server by requesting the DNS server for a specified tree and context. This is an example of the MFP NDS authentication settings. network security Whitepaper security 21
  • 22. PC 1. Send password for bizhub OpenAPI 3. Issue commands MFP 2. After checking the password, the result (whether regis-­ tration has taken place or not) is sent to the PC. 4. Process the command and send the data Network settings Adressbook utility Information on user authentication Communication by SSL (Secure Socket Layer) OpenAPI communication Most of the Konica Minolta devices are equipped with OpenAPI. OpenAPI is Konica Minolta‘s own application programming interface. This gives users the option of integrating Konica Minolta devices into application-controlled workflows. bizhub OpenAPI acquires and sets the data received from devices via networks using the SSL encryption protocol. By using an original password, communication is rendered more secure. When managing the important data of the device (e.g. setting information on user authentication), the data is safely protected. network security Whitepaper security 22
  • 23. Remote panel The latest generations of Konica Minolta devices offer the option of a remote panel. This means administrators are able to have realtime access to the MFP panel remotely, e. g. via a Web browser. Every function which is available on the MFP panel can also be executed remotely. There are various settings with which the remote panel feature can be configured, made secure or disabled. This is an example of the remote panel on a Web browser (bizhub C654). These are examples of the remote panel settings in PageScope Web Connection. network security Whitepaper security 23
  • 24. In modern society, where network infrastructure has already developed and information technology has spread, staggering amounts of information are distributed. The information is collected in various forms and is utilised after it has been translated into the higher-level information assets. In corporate activities, protecting these information assets, i.e. managing the risk, is an important task. This document introduces the basic security functions that are provided by Konica Minolta’s PageScope Enterprise Suite. Summary of PageScope Enterprise Suite PageScope Enterprise Suite is the generic name of the applications required for account management, authority management, panel settings and management for individual users of the devices operating in offices. All applications are running on a server and are operated in the Web browser. Combining them, you can build the system to suit your environment. PageScope Enterprise Suite mainly consists of the following applications. Status management software; consolidates machines on the network Software for document volume accounting management Software for panel settings and management for individual user Software for consolidating user authentication PageScope My Print Manager PageScope Authentication Manager PageScope MyPanel Manager PageScope My print manager PageScope Net Care Device Manager PageScope Account Manager PageScope Enterprise Suite security matters Pagescope enterprise suite Whitepaper security 24
  • 25. 1. User authentication In the communication of authentications by PageScope Authentication Manager, the authentication data is sent and received safely by using SSL. And the permitted functions for each user are enabled. If the environment is built to cooperate with an office‘s existing authentication server, it is possible to keep the authentication information within the server. The authentication methods supported by general authentication servers are shown below. Kerberos authentication or NTLM authentication is enabled for Active Directory; Digest-MD5 authentication and simple authentication for LDAP servers; NDS authentication for NDS servers, and NTLM authentication for NTLM servers. Authentication data input to MFP for authentication, IC card data read by a card reader, and the biometric information read by a finger vein reader are communicated for authentication using the SSL. Biometric information (finger vein) is authenticated by Gateway for Biometric Authentication Manager (Gateway for B.A.M.). Communication of user authentication (ID/password, IC card, biometrics). ID/Password ID/Password PageScope Authentication Manager PageScope Authentication Manager PageScope Authentication Manager Result of authentication Biometric data Result of authentication Biometric data Existing authentication server Existing authentication server Result of authentication Result of authentication Result of authentication Result of authentication Gateway for B.A.M. IC card data IC card data PageScope Enterprise Suite – Communication security SSL SSL SSL SSL SSL SSL Pagescope enterprise suite Whitepaper security 25
  • 26. 2. Sending of counter information Counter information is the basis of each division and individual. A file in XML format is created in MFP. It is encrypted, and then it is sent to PageScope Account Manager. AES-256 is used as the encryption system for models made after the Mosel/Thames series. For earlier models, DES is used for encryption. Send Data Protocol Encryption Scheme Authentication data (user ID, password/IC card data/ biometric data) HTTP, LDAP SSL Counter data FTP, WebDAV, HTTP XML file is encrypted and transferred. MIB SNMP v1/v3 When SNMP v3 is used, encrypted communication by DES or AES is possible. Pagescope enterprise suite Whitepaper security 26
  • 27. 3. Port number change The port number of each application can be changed. Port number change prevents conflict with the port number of the applications other than PageScope Enterprise Suite, and attacks by unauthorised applications. (The port number of PageScope Authentication Manager and PageScope Net Care Device Manager can be changed only during installation.) For your reference, the port numbers currently used are shown below. * The client PC accesses the server through port 80, but the port on the client PC side is allo- cated a port number each time a connection is made. ** The server accesses MFP (or License Management Server) through port 80 (443) but the port on the server side is allocated a port number each time a connection is made. Type Port Number (default) Purpose of Use HTTP 80 [Common] Web access to the server * [Net Care Device Manager] Counter reading into MFP ** [Account Manager] Data transmission from Print Log Tool * Counter reading into MFP ** HTTPS 443 [Common] Web access to the server * Communication with Licence Management Server (LMS) ** [Net Care Device Manager] Counter reading into MFP ** [Account Manager] Data transmission from Print Log Tool * Counter reading into MFP ** [Authentication Manager] Communication with MFP Communication with B.A.M server LDAP 389 [Authentication Manager] Communication with Active Directory Service SNMP v1/v3 161 [Common] Retrieval of MFP Status confirmation of MFP OpenAPI 50001, 50002 [In case of SSL: 50003] [Authentication Manager] Sending login information and result of printing to server Sending upper limit information to MFP [Account Manager] Upper limit management Acquisition of attribute information such as a user etc. from MFP for a counter collection [MyPanel Manager] Sending setting information to MFP SMTP 25 [Common] Email transmission of the counter information from the server FTP 21 A suitable port number is allocated each time [Account Manager] Counter reading into the MFP [Net Care Device Manager] Counter reading into MFP ** Pagescope enterprise suite Whitepaper security 27
  • 28. 1. Management of IC card information and biometric information Although IC card information is managed in the database of PageScope Authentication Manager, it is also possible to use the IC card information managed by an existing authentication server. Biometric (finger vein) information is managed in the database of Gateway for Biometric Authentication Manager (Gateway for B.A.M.). When information such as a password or IC card has been leaked, it is possible to change the password or IC card. For biometric information, however, this is not possible. Therefore, you should handle biometric information carefully. If only biometric information has been leaked, it is not possible to determine whose biometric information it is. And the biometric information to be managed includes only the features extracted. The information cannot be used in other systems because it is the data for Gateway for B.A.M. only. Link between Gateway for B.A.M. and biometric information. Gateway for B.A.M. User A01001 User B01021 User C01022 01021 BioData1 01022 BioData2 01001 Biodata3PageScope Authentication Manager PageScope Enterprise Suite – Access restriction Although system administrators at the highest level can configure all settings, authority should be divided into the required units to avoid careless settings in unrelated areas. Concerning access to PageScope Enterprise Suite, four types of user level are provided. Only system administrators and the specified users are allowed to configure settings and management of soft- ware. For example, the user specified as an administrator of PageScope Net Care Device Manager can register and remove the devices of the managed object. Nobody other than the specified user can execute such operations. Access to PageScope Enterprise Suite is performed in a Web browser. If authentication is completed successfully on the first login screen, the operations are allowed. Type DESCRIPTION User General user. It is only possible for users to change their own password. Group Administrator The user specified as Group Administrator can manage the devices and the users within the group. There are three types of groups: user group, account group, and device group. And it is possible to share responsibility for the management of each group. Application Administrator The user specified as Application Administrator (set for each application) can manage application. There are four types of application unit: Authentication Manager, Account Manager, MyPanel Manager, and Net Care Device Manager. And it is possible to share responsibility for the management of each application. System Administrator It is possible to manage all software, such as the settings of the Group Administrator or Application Administrator. PageScope Enterprise Suite – Data management Pagescope enterprise suite Whitepaper security 28
  • 29. 3. Registration using PageScope MyPanel MyPanel is registered in the database of MyPanel Manager using the exclusive Address Importer. Address Importer is the software to be installed on a client PC. Address data is exported from Outlook or an LDAP server. It is output as a file to a client PC once, and it is registered on the registration screen of MyPanel Manager by uploading the file. When uploading a file, data is sent safely using SSL. Only a user who is registered as an administrator of MyPanel Manager can perform the registration. 2. IC card data and finger vein information registration IC card and biometric (finger vein) information is registered in the database of PageScope Authentication Manager using the exclusive Registration Tool software. The Registration Tool is software to be installed on a client PC. IC card or finger vein information is read by a reader. It is output as a file to a client PC once, and it is registered on the registration screen of PageScope Authentication Manager by uploading the file. When uploading a file, data is sent safely using SSL. Only a user who is registered as an administrator of Pagescope Authentication Manager can perform the registration. Uploaded IC card data is registered and managed on the database of PageScope Authentication Manager. Biometric information is registered and managed on Gateway for B.A.M. The files that are used between the PageScope Authentication Manager and Registration Tool can be encrypted (AES-256) and saved. Note: When using IC card data from the existing authentication server (Active Directory or LDAP server only), the Registration Tool is not required. IC card/biometric information registration using the Registration Tool. Gateway for B.A.M. Registration Tool PageScope Authentication Manager IC card data Biometric data IC card data Upload file Biometric data LDAP server Email Registration Tool Upload file PageScope MyPanel Manager PageScope MyPanel registration using the Address Importer. SSL SSL SSL Pagescope enterprise suite Whitepaper security 29
  • 30. Licence management for PageScope Enterprise Suite The PageScope Enterprise Suite software must be purchased. In accordance with the devices to be managed, please purchase the basic software module and the required number of licences. Communicate with the licence management server on the Internet managed by Konica Minolta, and confirm the availability of the licence key. After that, PageScope Enterprise Suite is available. The key to enter for activation is a unique key that Konica Minolta issues, and it is tightly controlled by Konica Minolta. In communication with the Licence Management Server, data is sent safely using SSL. Licence Management Server Activate Activation to Licence Management Server. Pagescope enterprise suite Whitepaper security 30
  • 31. POP before SMTP To secure access of the MFP with the intranet email server, it is possible to authenticate with an email account (POP3 – Post Office Protocol) before an email is sent via the email server. This avoids the possibility of unauthorised email traffic with the intranet email server, and with the domain/email suffix respectively. In addition to the above email security, APOP (Authentication for Post Office Protocol) can be set. APOP is an authentica- tion method with encrypted passwords which ensures increased safety in comparison to the usual unencrypted password exchange used by POP for the retrieval of email messages. SMTP authentication (SASL) SMTP (Simple Mail Transfer Protocol) authentication can be activated on bizhub MFPs. This authorises a device to send emails. For those customers who do not host their email services, the use of an ISP mail server is possible and supported by the machine. SMTP authentication is required by, for example, AOL and for the prevention of SPAM. S/MIME For email transmission, the MFPs support S/MIME (Secure/Multipurpose Internet Mail Extensions) encryption. S/MIME encryption is based on email certificates that can be registered on the MFP for all stored email addresses. The encryption of the email information by the “public key” (given via the certificate) prevents the sniffing and unauthorised decryption of email information at a high security level. For example, if an email is sent accidentally to a wrong destination, the email information can still only be opened by the intended recipient, who is the only one in possession of the “private key” necessary for decryption. Encrypted PDF bizhub OP-based products can encrypt scanned files in PDF format before sending them to a destination across the network. The user has the ability to encrypt a scanned file by selecting the encryption key on the bizhub’s control panel. The encryption option supports the PDF file type, and will require the decryption code to open the file from the recipient of the scan. This feature is very similar to the Adobe Acrobat encryption process where a password is utilised for encryption and opening a file, as well as to access the permissions area of the encryption process. Scan security This is an example of the MFP scan settings for PDF encryption (bizhub C654). scan security Whitepaper security 31
  • 32. PDF encryption via digital ID PDF data that is attached to an email or sent to an FTP or SMB folder can be encrypted by a digital ID. Digital ID encryption is based on the S/MIME encryption using a public key for encryption and private key for decryption. Compared to S/MIME, the digital ID will only secure the attachment, which also allows using this transmission process for other transmission types than email. In addition to digital ID stored on the MFP, certificates and/or public keys stored on the LDAP server can be used. PDF digital signature To prevent tampering with MFP-created PDF documents, it is possible to add a digital signature. The digital signature is based on the SSL certificate installed on, or used by, the MFP. The certificate information will be added to the PDF file without encryption. However, changes to the PDF after creation (e.g. changing text, adding or deleting items) will be recorded in the PDF security information which is available in the PDF reading applications. In addition to preventing documents from being tampered with, the PDF signature gives information about the source of the document, helping the program to recognise invalid document sources. This screenshot is an example of a PDF document that has been signed with a digital ID. The signature information shows that this document has been altered since its creation and is no longer valid/trustworthy. This is an example of the MFP digital signature settings for PDF files (bizhub C654). Recipient’s secret key Encryption Public key KMBT confidential Sender’s certificate KMBT confidential Encrypted email RecipientSender This illustration shows the encryption process via digital ID. scan security Whitepaper security 32
  • 33. User 3 User 0 User 5 Internal email Customer Head- quarters This illustration shows the access levels of different users. Manual destination blocking The selection of manual destination blocking will prevent the direct input of, for example, email addresses for transmission of scan files from the MFP. If it is set to “on”, the user only has the possibility to use destinations stored on the MFP, on the PageScope Enterprise Server or a local email database available via LDAP search. In addition to preventing the direct input of destinations, the user can be blocked from changing the FROM address for an email transmission. If the machine is set to authentication, the user’s email address stored in the authentication data or Active Directory will automatically be used. Address book access control The destinations (e.g. email, SMB, FTP) stored in the MFP or PageScope Enterprise Suite address book can be set with an access level. These levels control the access/visibility of destinations for the user, depending on their security level as given in the authentication data. Possible levels are 0–5. scan security Whitepaper security 33
  • 34. Service mode/administrator mode protection The service mode and the administrator mode are protected by passwords or by codes. The service mode is only accessible via a special code that is only known to Konica Minolta certified engineers. The administrator mode is protected by an eight-digit alphanumeric password. This password can only be changed by the service engineer or in the administration mode itself. This avoids any changes to passwords, destinations or other security- related functions being made by unauthorised users. Additional security functions This image shows the administrator login screen on the MFP panel (bizhub C654). Unauthorised access lock Like a cash terminal, the MFP can be set to reject a user if they attempt to authenticate with the wrong password. The MFP administrator has the choice of two modes to lock the machine: The unauthorised access lock can be extended to the system user box for confidential documents (secure print box). The same modes will be applied in the case of unauthorised access to this document storage location. Mode 1 The machine lock-out will be released after a certain time (1–60 minutes) Mode 2 In addition to mode 1, the number of wrong attempts can be specified (1–5) additional security functions Whitepaper security 34
  • 35. This is an example of the MFP watermark settings (bizhub C654). Distribution number printing To index a certain number of printouts, it is possible to print a distribution number on every handout (first page or all pages). This allows the easy identification of illegal copies made of this limited issue of documents. Watermark/Overlay All copies, prints and scans created on the MFP can be marked with a watermark or overlay image. This enables easy and highly visible classification of the document security level. The stamping of the different document types can be set as default by the administrator or individually as required by the user. Copy protection via watermark This function adds an invisible pattern to the original printed document. When the original document is copied, the message pattern (e.g. “Copy”) comes up, and clearly distinguishes the copied document from the original one. In addition to the message, the MFP serial number, as well as the date and time the copy was made, can be set for the pattern. The combination of the information in the pat- tern and the audit log helps to trace the person who made the illegal copy. The Security Whitepaper explains the security func- tions of the bizhub series. I. Basic security policies 1. Equipment with the latest security technology 2. Certification from independent company Original document with pattern copied document with message pattern The Security Whitepaper explains the security func- tions of bizhub series. I. Basic security policies 1. Equipment with the latest security technology 2. Certification from independent company This illustration shows the copy protection functionality. These are examples of the MFP copy security settings (bizhub C654). additional security functions Whitepaper security 35
  • 36. Printing in Copy Guard/Password Copy mode Output with invisible security pattern copy again Copying in Copy Guard/Password Copy mode A B C D E F G H I J K L M N O P Q R S T UVW X Y Z A B C D E F G H I J K L M N O P Q R S T UVW X Y Z original Copy Guard function/Password Copy function Many of the Konica Minolta devices could be equipped with a security kit which offers the Copy Guard and Password Copy functions. These functions allow administrators to embed a security pattern on the output. If a user tries to make a secondary copy of the output, the device will display a message that says “Copying Prohibited” and will prohibit copying. The password copy function allows administrators to set a password so the document can only be copied if the user enters the correct password. Fax rerouting Usually, incoming fax documents are immediately printed by a fax or MFP device. This enables anyone to view the fax document in the output tray. To prevent all unauthorised access to arriving fax documents, it is possible to reroute incoming faxes to a secure location. This could be any destination stored in the MFP address book (email, SMB, FTP or user box). The user box is particularly suited as a destination for confidential fax receipt, and can digitally receive incoming faxes with an F-Code. Besides the fact that digital fax receipt can speed up the fax reception process in general, it completely prevents unauthorised access to fax information, confidential or not. A B C D E F G H I J K L M N O P Q R S T U VW X Y Z Copy Guard pattern detected Password pattern detected Copying prohibited Protection can be cancelled by entering a password A B C D E F G H I J K L M N O P Q R S T UV W X Y Z additional security functions Whitepaper security 36
  • 37. x = standard o = option / = not available * for print only ** in evaluation *** with reservations Features Print systems bizhub C25 bizhub C35 bizhub C224 C284 C364 C454 C554 bizhub C654 C754 Konica Minolta 240f bizhub 20 bizhub 36 42 bizhub 215 bizhub 223 283 363 423 bizhub 552 652 bizhub 501 601 751 bizhub C35P bizhub C353P bizhub 20P bizhub 40P Access control/Access security Copy/print accounting / x x x x / x x x x x / x / o Function restriction (copy/print/scan/fax/box/colour) x*** x x x x x x / x x x o x / / Secure printing (lock job) x x x x x x x x x x x o x / o User box password protection / / x x x / / / x x x / x / / User authentication (ID+password) o x x x x x x x x x x o x / o Finger vein scanner / / o o / / / / o o o / o / / IC card reader / o o o / / o / o o o / o / / Event log / / x x / / / / x x x / x / / Data security/Document security Data encryption (hard disk) / x*** x x / / x*** / x x o / o / / Hard disk data overwrite / x x x x / x / x x x / x / / Hard disk password protection / / x x x / / / x x x / x / / Data auto-deletion / / x x / / / / x x x / x / / Network security IP filtering x x x x x x x / x x x x x x x Port and protocol access control x x x x x / x x*** x x x x x / x SSL/TLS encryption (https) x x x x x x x x x x x x x x x IP sec support x x x x / / x / x x x x x / x S/MIME / x x x / / x / x x x / / / / IEEE 802.1x support x x x x / / x / x x x x / / x Scanning security User authentication / x x x / x x / x x x / / / / POP before SMTP x x x x x x x x x x x / / / / SMTP authentication (SASL) x x x x x / x / x x x / / / / Manual destination blocking / x x x / / x / x x x / / / / Others Service mode protection x x x x / x x / x x x x x x x Admin mode protection x x x x x*** x x x x x x x x x x Data capturing / / x x / / / / x x x / x / / Unauthorised access lock / x x x / / x / x x x x x / / Copy protection via watermark / x x x / / x / x x x / x / / Encrypted PDF / x x x x / x / x x x / / / / PDF signature / / o o / / / / o o o / / / / PDF encryption via digital ID / / o o / / / / o o o / / / / Copy Guard/Password Copy / / o o / / / / o o / / / / / ISO 15408 certification ISO 15408 EAL3 certified / x x** x** / / x** / x x** x / x / / Multifunctional b/w systemsMultifunctional colour systems SECURITY FEATURES AVAILABILITY security features Availability Whitepaper security 37
  • 40. Konica Minolta Business Solutions Europe GmbH Europaallee 17 30855 Langenhagen Germany Tel.: +49 (0) 511 74 04-0 Fax: +49 (0) 511 74 10 50 www.konicaminolta.eu Your Konica Minolta Business Solutions Partner: