Print in the Channel - Issue #17

CLOUD PRINT SECURITY

CONTINUED

a story about some sort of cyber breach,” says Graham. “This is why it is imperative for organisations to have the right procedures in place to minimise risk. When printing, it’s important that jobs are only released after the user verifies themselves, which can be done with an ID card, PIN code or username and password. Once the user has picked up their document the system should then provide insights into who printed the documents, where they did it from and when.” He adds that other important security protocols include: l Secure communication across WAN l Automatic logout l Protection of stored data l Encryption l Data backup l Support for third-party authentication and their corresponding identity servers l Adhere to internationally recognised information security controls and industry- specific compliance standards, such as ISO 27001, HIPAA, FedRAMP, SOC 1 and SOC 2. “KCPS offers several features that align with organisational security protocols, and by implementing KCPS, resellers can help businesses enhance document security, manage costs and streamline their printing and scanning processes.” Matt agrees that cybersecurity needs to be approached in a multi-faceted way, and cloud print security is no exception. “A combination of built-in security, controlling access, network

security, data protection and user education can build a robust security stature against potential threats,” he says. “Organisations often overlook MFPs as endpoints to secure. Security needs to be looked at holistically, and this is where the value of a reseller and technology partner shines. By objectively evaluating an organisation’s threat landscape, all end point devices such as MFPs are considered. “Sharp are already doing this with Bitdefender antimalware technology for MFPs, as well as offering services that allow us to proactively monitor a clients print environment, highlighting unauthorised access attempts and system changes. In addition to our Endpoint Security Solutions, which cover everything from monitoring, automated updates, cybersecurity risk assessments and endpoint history analysis. “Recently, new PSTI regulations came into place, creating security requirements for manufacturers of relevant connectable products. Sharp has ensured that that any products in the scope of the new regulation are fully compliant. This includes making available Statements of Compliance for each product, detailing the defined support period. In addition, we also have a central point available on our website for end-users to report potential product security vulnerabilities.” Future Commentators agree that adoption of cloud print will continue to grow in the future as businesses develop their operations and optimise hybrid working arrangements. “Customers will be approaching resellers to help them find the right solutions, and as a vendor we’ll be working to support them with the training and toolkits to help them proactively offer their expertise and assurances around the security benefits of cloud print,” says Andy. “We also understand that there are businesses not ready to fully transition to the cloud that will want to take a hybrid approach. Printix allows a hybrid and full cloud approach to suit the customer’s needs.” Graham adds that it is clear there is a growing need for cloud-based printing and scanning in this new era of agile and hybrid workplaces. “They can be cost-effective, flexible, secure, and easily accessible across the enterprise,” he says. “There needs to be print infrastructure that supports employees in handling document tasks from different locations as offices become increasingly decentralised.”

Andy Johnson SMB and solutions business development manager

brother.co.uk

There are businesses not ready to fully transition to the cloud who will want to take a hybrid approach

48

Powered by