Xerox devices powered by ConnectKey Technology, such as Xerox VersaLinks and AltaLinks, provide a comprehensive set of capabilities to keep your printers and data safe. Through partnerships with companies like McAfee, Xerox printers and MFPs offer benchmark office printer security protection through a multi-layered approach with an innovative whitelisting defense against viruses. There are four key aspects:
1. Intrusion Prevention
Every network access point is a potential entryway for malicious attacks, deployment of malware and misuse of unauthorized access to the device. User authentication and access controls serve as gatekeepers, controlling physical and network access to devices and their features, and safeguarding their associated data, whether transmitted or resident on the device.
2. Device Detection
MFPs, printers and other devices are often the targets of cyberattacks. The first line of defense is whitelisting technology, such as that from McAfee, which constantly monitors devices and automatically prevents unauthorized changes to their system firmware. The second line of defense is provided by verification tests, which provide alerts when harmful changes are made to system firmware. These can either run at startup or when activated by authorized users.
A further safeguard can be provided by maintaining profiles of approved devices in a system like the Cisco Identity Service Engine, which prevents nonapproved printers from connecting to the network. It automatically detects approved devices on the network for security policy implementation and compliance.
3. Document and Data Protection
Documents and data are the prize the cyberattacker seeks, and enterprises should protect against both intentional and unintentional transmission of critical data to unauthorized parties. Printed documents can be protected from unauthorized access by using a simple pin code entered at the device or a card scanning system to authorize printing only when the right user is at the device. A convenient solution is to use employee ID badges. This also helps in tracking the flow of documents to and from the printing device.
Many printing devices protect stored information by encrypting it. Many also delete processed or stored data that is no longer required, and the best use advanced data clearing and sanitization algorithms, such as those approved by the National Institute of Standards and Technology (NIST) and U.S. Department of Defense. Devices can be set up to automatically delete files after they’ve printed. Scans also can be safeguarded using encryption and password-protected files.
4. External Partnerships
Why struggle to meet security challenges alone, when experts are available to help you with advice, certifications to ensure effectiveness, and services that can meet your security needs? In reality, addressing an issue as large and dynamic as cybersecurity alone is a fool’s errand.
Many SMBs put the data security of their printer fleet in the hands of a knowledgeable Managed Print Services (MPS) provider. Look for one with a range of services and tools that can be adapted and expanded as business needs change — that measures performance against international standards with certifications like FIPS 140-2 and the Common Criteria to ensure its devices can be trusted in even the most secure environments. As cybercriminals deploy new tactics, these standards adjust. The NIAP — the National Information Assurance Partnership — overhauled its Common Criteria Certification standard not long ago, and it was important to get in front of it early. That is another important reason to work with partners. Cybercriminals make their living by getting a half step ahead of the security police. You need all the help you can get to stay a half step ahead of them.