280 likes | 376 Views
security policy enforcement encryption from client workstation network overlay ability to secure selected devices without reconfiguring entire fleet. continuous erasure of files that are no longer needed for storage devices that are still in service
E N D
security policy enforcement • encryption from client workstation • network overlay • ability to secure selected devices without reconfiguring entire fleet
continuous erasure of files that are no longer needed • for storage devices that are still in service • automatically performed anytime files are deleted
for storage devices that are going out of service • administrator-triggered, or regularly scheduled • all data erased including third-party applications
device passwords to prevent unauthorized configuration changes • disabling of unused protocols and services to prevent “back door” access
direct device communication • secure access through HTTPS
available on a variety of hp devices • native hp pin-based capabilities • enhanced capabilities provided through hp partner products • pull printing, multiple authentication mechanisms
Capella technologies solution • PIN access to digital sending
restricted device access • multiple authentication mechanisms • secure pull printing
secure pull printing • jobs stored on server for retrieval later • user authentication by PIN, smart card, swipe card, or proximity card
MFP access via PIN, smart card, swipe card or proximiy card • secure pull printing to device of choice • deployed internally or via external component
network security services • data integrity • host-to-host authentication • encryption of network communications • security for IP-based networks • prevention of unauthorized access to devices • no risk of device impersonation
secure transfer of information across networks • secure sending of data from hp devices to email, fax, and network folders
encryption of device communications • authentication of message sources • authentication / encryption protocol for device management communications • secure communication between Web Jetadmin and devices
security of web protocols • secure management of devices • security of web services
authentication framework for networks • network access denied to unauthorized devices • network attachment denied to unauthenticated devices • network access only by trusted devices • EAP protocol for message exchange
PIN-based authentication for access to printers and MFPs • HP DSS authentication for digitally sending documents from MFPs • complimented by third-party solutions for advanced authentication
authentication of MFP functions and supported applications • SecureJet SW (Swipe Card) • SecureJet Biometrics • support for variety of authentication mechanism • SecureJet FP (Pin Code) • SecureJet SC (Smart Card) • SecureJet PX (Proximity Card)
support for variety of authentication mechanism • Pin Code • Smart Card • Proximity Card • Swipe Card • Biometrics
user authentication by PIN or card • support for proximity cards from 11 manufacturers
secure the device • access control over device and software • control panel lockdown • configuration management • protect the network • configuration of authentication protocols • access controls, including color access control • monitor and manage • report generation
configuration instructions and procedures • configuration files • documentation • configuration methods • policy documents • assistance with security configuration • hp first with NIST-approved checklist
detailed usage tracking • native hp tracking and reporting capabilities • collection, storage, and display of ongoing usage • custom generation of exportable reports • tracking of how devices are being used • data collection at off-peak hours
monitoring and tracking of local and network printing • detailed information on usage • information summarized by user, device, and location
detailed metrics on device usage • tracking, monitoring, and measurement of network printing
electronic paper trail • job data collection includes • user ID • pages processed and number of copies • paper size and media type • copy, fax, and email function usage • duplexing information • color / monochrome pages
monitoring, tracking and control of printing and copying • data collection via accounting module • data from all networked printers and MFPs
tracking of all imaging and printing activities • summary, detailed and total reports • reporting by network user and device • control of which users can print to which device • control of how much users can print