Practical considerations for imaging and printing security
Page 1
...Common Criteria Certification 4 HP's imaging and printing security framework 4 Secure the Imaging and Printing Device 5 MFP walk-up authentication ...5 Network printing authentication ...5 Physical document access control 5 HP Secure Erase ...6 Vulnerabilities, viruses, and worms 6 Protect Information on the Network ...6 Network connectivity with HP Jetdirect devices 6 HP Digital Sending Software (DSS 7 Fax/LAN bridging ...7 Effectively Monitor and Manage...7 HP Web Jetadmin for fleet management 7 Device and service control ...7 Firmware updates ...7 Logging device activity ...8 Common...
...Common Criteria Certification 4 HP's imaging and printing security framework 4 Secure the Imaging and Printing Device 5 MFP walk-up authentication ...5 Network printing authentication ...5 Physical document access control 5 HP Secure Erase ...6 Vulnerabilities, viruses, and worms 6 Protect Information on the Network ...6 Network connectivity with HP Jetdirect devices 6 HP Digital Sending Software (DSS 7 Fax/LAN bridging ...7 Effectively Monitor and Manage...7 HP Web Jetadmin for fleet management 7 Device and service control ...7 Firmware updates ...7 Logging device activity ...8 Common...
Practical considerations for imaging and printing security
Page 2
Jetmobile SecureJet-PS Secure Print Product 10 Jetmobile Technologies SecureJet Authenticator Products 11 SafeCom ...11 Appendix B-HP Secure Erase...12 For more information ...13
Jetmobile SecureJet-PS Secure Print Product 10 Jetmobile Technologies SecureJet Authenticator Products 11 SafeCom ...11 Appendix B-HP Secure Erase...12 For more information ...13
Practical considerations for imaging and printing security
Page 3
.... The varying levels of access, wireless networks are improperly secured, and unaware users introduce viruses or worms to what Common Criteria is and is not, and the role Common Criteria Certification plays in explaining hardcopy-specific needs. Overview The IT security climate has changed. Security measures have capabilities beyond printing and scanning. A product may advertise certification of what a product does...
.... The varying levels of access, wireless networks are improperly secured, and unaware users introduce viruses or worms to what Common Criteria is and is not, and the role Common Criteria Certification plays in explaining hardcopy-specific needs. Overview The IT security climate has changed. Security measures have capabilities beyond printing and scanning. A product may advertise certification of what a product does...
Practical considerations for imaging and printing security
Page 4
... that facilitate security configuration of the physical device, including access controls for public review at http://checklists.nist.gov/repository/, and is defining a security standard for hardcopy devices, as well as 802.1x and secure management, scanning, and printing protocols. Security checklists The National Institute of the checklist program are certified. Conclusion: look beyond Common Criteria Certification Ultimately, individuals...
... that facilitate security configuration of the physical device, including access controls for public review at http://checklists.nist.gov/repository/, and is defining a security standard for hardcopy devices, as well as 802.1x and secure management, scanning, and printing protocols. Security checklists The National Institute of the checklist program are certified. Conclusion: look beyond Common Criteria Certification Ultimately, individuals...
Practical considerations for imaging and printing security
Page 5
... authentication mechanisms, including Windows® Domain accounts, proximity cards, and Smartcards. HP printers and MFPs provide native support for unauthorized access. Auditing systems may also be tracked with existing enterprise access controls reduces complexity and minimizes administration requirements. HP Autostore) based on page 10. 5 Device usage may also use of individual users and groups, including access rights to network printers. The breadth and depth of documents printed. In addition to directly...
... authentication mechanisms, including Windows® Domain accounts, proximity cards, and Smartcards. HP printers and MFPs provide native support for unauthorized access. Auditing systems may also be tracked with existing enterprise access controls reduces complexity and minimizes administration requirements. HP Autostore) based on page 10. 5 Device usage may also use of individual users and groups, including access rights to network printers. The breadth and depth of documents printed. In addition to directly...
Practical considerations for imaging and printing security
Page 6
.... Access controls restrict installation of Chailets to authorized administrators, however, as it is used by hostile network environments. • Chai HP's Chai provides a means to extend an imaging and printing device's functionality. Vulnerabilities, viruses, and worms Vulnerability assessments are confidential and prevent unauthorized modification by the HP Jetdirect family of products, including internal cards, external boxes, and embedded networking. SNMPv3 provides strong authentication and encryption of management communications...
.... Access controls restrict installation of Chailets to authorized administrators, however, as it is used by hostile network environments. • Chai HP's Chai provides a means to extend an imaging and printing device's functionality. Vulnerabilities, viruses, and worms Vulnerability assessments are confidential and prevent unauthorized modification by the HP Jetdirect family of products, including internal cards, external boxes, and embedded networking. SNMPv3 provides strong authentication and encryption of management communications...
Practical considerations for imaging and printing security
Page 7
... administrators to third-party applications, such as unsecured management interfaces or printing protocols that supports the SNMP Printer MIB and allow individual control over the network. 7 It is currently in a location accessible to monitor the availability of the device. The DSS Server may be configured to maintaining a secure network. Fax/LAN bridging The analog fax port of an HP imaging and printing device is critical to enforce internal security policies. Device...
... administrators to third-party applications, such as unsecured management interfaces or printing protocols that supports the SNMP Printer MIB and allow individual control over the network. 7 It is currently in a location accessible to monitor the availability of the device. The DSS Server may be configured to maintaining a secure network. Fax/LAN bridging The analog fax port of an HP imaging and printing device is critical to enforce internal security policies. Device...
Practical considerations for imaging and printing security
Page 8
...; Systems (PDF) and Microsoft (Metro) have both IT administrators and users to validate the trustworthiness of controls will move from PC-based applications that will ensure devices operate with over individual access to documents, limits on attached PC-devices to the standard when available. As content protection evolves, the enforcement of a device prior to the devices themselves. Common Criteria Certification HP is a standards...
...; Systems (PDF) and Microsoft (Metro) have both IT administrators and users to validate the trustworthiness of controls will move from PC-based applications that will ensure devices operate with over individual access to documents, limits on attached PC-devices to the standard when available. As content protection evolves, the enforcement of a device prior to the devices themselves. Common Criteria Certification HP is a standards...
Practical considerations for imaging and printing security
Page 9
... authentication mechanisms, including passwords, proximity cards, and Smartcards. HP provides automated firmware update notification services, and HP Web Jetadmin aids in the most demanding environments and the tools to scrutinize certification and assess the capabilities of who is using the environment, and how they are enabled. Conclusion HP imaging and printing has evolved with strong encryption, while SNMPv3 and HTTPS secures management functions. 9 Implement access controls HP printers and MFPs...
... authentication mechanisms, including passwords, proximity cards, and Smartcards. HP provides automated firmware update notification services, and HP Web Jetadmin aids in the most demanding environments and the tools to scrutinize certification and assess the capabilities of who is using the environment, and how they are enabled. Conclusion HP imaging and printing has evolved with strong encryption, while SNMPv3 and HTTPS secures management functions. 9 Implement access controls HP printers and MFPs...
Practical considerations for imaging and printing security
Page 10
... The printer administrator may be used . The MFP then transmits these credentials to the DSS server, and the DSS server authenticates the user to MFP functions. Capella Technologies VeriUser Authentication Capella Technologies offers authenticated user access to access the network folder. DSS allows integration of authentication functions with Microsoft Windows (using NTLM or Kerberos) and Novell Netware (using either a hardware module or software update, that can be integrated with current PCL print drivers.
... The printer administrator may be used . The MFP then transmits these credentials to the DSS server, and the DSS server authenticates the user to MFP functions. Capella Technologies VeriUser Authentication Capella Technologies offers authenticated user access to access the network folder. DSS allows integration of authentication functions with Microsoft Windows (using NTLM or Kerberos) and Novell Netware (using either a hardware module or software update, that can be integrated with current PCL print drivers.
Practical considerations for imaging and printing security
Page 11
..., and 9065 devices, and HP Color LaserJet 4600, 5500, and 9500 devices. SafeCom SafeCom provides a suite of authentication products including user pin (SecureJet FP), Smart Card (SecureJet SC), Proximity Card (SecureJet PX), or Swipe Card (SecureJet SW). These authentication products can be used to printing and scanning functionality. SafeCom is an external hardware component, allowing compatibility with Jetmobile, SafeCom supports a variety of printers and MFPs. 11 Jetmobile Technologies...
..., and 9065 devices, and HP Color LaserJet 4600, 5500, and 9500 devices. SafeCom SafeCom provides a suite of authentication products including user pin (SecureJet FP), Smart Card (SecureJet SC), Proximity Card (SecureJet PX), or Swipe Card (SecureJet SW). These authentication products can be used to printing and scanning functionality. SafeCom is an external hardware component, allowing compatibility with Jetmobile, SafeCom supports a variety of printers and MFPs. 11 Jetmobile Technologies...
Practical considerations for imaging and printing security
Page 12
... files are deleted, or erase the entire disk when triggered by an administrator or a regularly scheduled event configured by HP Web Jetadmin. Secure Erase can be recovered with undelete tools. Data erased using the DoD 5220-22m algorithm is available on the drive and can occur continuously as removed, however the data remains on the following devices: • HP LaserJet 2400, 4250, 4350 printers...
... files are deleted, or erase the entire disk when triggered by an administrator or a regularly scheduled event configured by HP Web Jetadmin. Secure Erase can be recovered with undelete tools. Data erased using the DoD 5220-22m algorithm is available on the drive and can occur continuously as removed, however the data remains on the following devices: • HP LaserJet 2400, 4250, 4350 printers...
Practical considerations for imaging and printing security
Page 13
...; 2003 Hewlett-Packard Development Company, L.P. XXXX-XXXXEN, 09/2005 Linux is subject to change without notice. Microsoft and Windows are set forth in the express warranty statements accompanying such products and services. For more information • Please see the "HP Secure Erase for Imaging and Printing" whitepaper (www.hp.com/sbso/security/secure_disk_erase.pdf) for complete details of algorithms implemented and devices supported...
...; 2003 Hewlett-Packard Development Company, L.P. XXXX-XXXXEN, 09/2005 Linux is subject to change without notice. Microsoft and Windows are set forth in the express warranty statements accompanying such products and services. For more information • Please see the "HP Secure Erase for Imaging and Printing" whitepaper (www.hp.com/sbso/security/secure_disk_erase.pdf) for complete details of algorithms implemented and devices supported...