SECURE PRINT NETWORKS
l Availability: Reliable access to information assets.
them exposed for cybercriminals to exploit l Using personal devices for work can introduce security risks, especially if they are not part of the office IT policy. Solutions But there are a range of solutions available to businesses with hybrid working arrangements. “Using a VPN encrypts internet traffic, protecting sensitive data from hackers and cyber threats,” says Deyon. “Use remote/cloud management tools to manage printer’s firmware update to patch security vulnerabilities. Businesses should also use strong passwords for printer access and ensure the Wi-Fi network is secure. Enhance print and network printer security by using MFA or other strong authentication methods. “Businesses should also configure firewalls by disabling unnecessary ports to limit printer access from external sources.” He adds that hybrid working should be included in company IT policies, as well as being part of a managed print service arrangement. Trevor adds that Kyocera offer tailored security solutions based on a range of security features and industry expertise. Key security features include Digitally-Signed Firmware, Secure Boot and Run Time Integrity Check. “As a matter of course, Kyocera monitor global security trends and legal requirements, ensuring compliance with regulations like GDPR, ISO/IEC 27001 and others,” he says. He notes that Kyocera designs and develops its MFPs and printers with awareness of three key security attributes: l Confidentiality: Authorised access to information assets l Integrity: Ensuring data remains unaltered
“Kyocera earned the BLI Security Validation Testing seal from Keypoint Intelligence after our devices passed a rigorous penetration testing protocol involving automated and manual cyberattacks on the device firmware and underlying operating system. K-level was validated as exceeding industry standards and verified to be free from any high-risk vulnerabilities from outside attacks. K-level enables all our customers to benefit from our highest level of security and provides optimal data protection at the point of print or scan.” Agility With cyberthreats continuing to evolve, it is important that solutions are agile. “Malicious hackers and those intent on penetrating unauthorised networks do not stand still,” says Trevor. “Constant evolutions of malware, ransomware etc. require manufacturers to ensure they design security features and security software that also evolves to meet these challenges. “It is also vital that security patches and updates are assigned to users’ devices as soon as they become available. Kyocera’s Fleet Services software enable devices that are connected to this service to have security updates applied remotely as soon as they are available.” Deyon adds that moving to cloud-based device management like Toshiba’s e-BRIDGE Cloud Connect will ensure that devices are monitored in real-time, firmware is updated to fix newly discovered vulnerabilities. “Using cloud print solutions like Toshiba’s e-FOLLOW. cloud and e-BRIDGE Global Print can ensure encrypted print security,” he says. What to highlight When talking to customers about securing print networks, there are several aspects that resellers should highlight. “Where possible, customers should choose a vendor with a good security reputation, a vendor that actively monitors global security trends and legal requirements, ensuring compliance with regulations like GDPR, ISO/ IEC 27001 and others,” says Trevor.
Deyon Antoine, product marketing manager
toshibatec.co.uk
“
Constant evolutions
of malware, ransomware etc. require
manufacturers to ensure they design security features and security software that also evolves to meet these challenges.
”
CONTINUED
printinthechannel.co.uk
35
Powered by FlippingBook