1 / 28

security policy enforcement encryption from client workstation network overlay

security policy enforcement encryption from client workstation network overlay ability to secure selected devices without reconfiguring entire fleet. continuous erasure of files that are no longer needed for storage devices that are still in service

clem
Download Presentation

security policy enforcement encryption from client workstation network overlay

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. security policy enforcement • encryption from client workstation • network overlay • ability to secure selected devices without reconfiguring entire fleet

  2. continuous erasure of files that are no longer needed • for storage devices that are still in service • automatically performed anytime files are deleted

  3. for storage devices that are going out of service • administrator-triggered, or regularly scheduled • all data erased including third-party applications

  4. device passwords to prevent unauthorized configuration changes • disabling of unused protocols and services to prevent “back door” access

  5. direct device communication • secure access through HTTPS

  6. available on a variety of hp devices • native hp pin-based capabilities • enhanced capabilities provided through hp partner products • pull printing, multiple authentication mechanisms

  7. Capella technologies solution • PIN access to digital sending

  8. restricted device access • multiple authentication mechanisms • secure pull printing

  9. secure pull printing • jobs stored on server for retrieval later • user authentication by PIN, smart card, swipe card, or proximity card

  10. MFP access via PIN, smart card, swipe card or proximiy card • secure pull printing to device of choice • deployed internally or via external component

  11. network security services • data integrity • host-to-host authentication • encryption of network communications • security for IP-based networks • prevention of unauthorized access to devices • no risk of device impersonation

  12. secure transfer of information across networks • secure sending of data from hp devices to email, fax, and network folders

  13. encryption of device communications • authentication of message sources • authentication / encryption protocol for device management communications • secure communication between Web Jetadmin and devices

  14. security of web protocols • secure management of devices • security of web services

  15. authentication framework for networks • network access denied to unauthorized devices • network attachment denied to unauthenticated devices • network access only by trusted devices • EAP protocol for message exchange

  16. PIN-based authentication for access to printers and MFPs • HP DSS authentication for digitally sending documents from MFPs • complimented by third-party solutions for advanced authentication

  17. authentication of MFP functions and supported applications • SecureJet SW (Swipe Card) • SecureJet Biometrics • support for variety of authentication mechanism • SecureJet FP (Pin Code) • SecureJet SC (Smart Card) • SecureJet PX (Proximity Card)

  18. support for variety of authentication mechanism • Pin Code • Smart Card • Proximity Card • Swipe Card • Biometrics

  19. user authentication by PIN or card • support for proximity cards from 11 manufacturers

  20. secure the device • access control over device and software • control panel lockdown • configuration management • protect the network • configuration of authentication protocols • access controls, including color access control • monitor and manage • report generation

  21. configuration instructions and procedures • configuration files • documentation • configuration methods • policy documents • assistance with security configuration • hp first with NIST-approved checklist

  22. detailed usage tracking • native hp tracking and reporting capabilities • collection, storage, and display of ongoing usage • custom generation of exportable reports • tracking of how devices are being used • data collection at off-peak hours

  23. monitoring and tracking of local and network printing • detailed information on usage • information summarized by user, device, and location

  24. detailed metrics on device usage • tracking, monitoring, and measurement of network printing

  25. electronic paper trail • job data collection includes • user ID • pages processed and number of copies • paper size and media type • copy, fax, and email function usage • duplexing information • color / monochrome pages

  26. monitoring, tracking and control of printing and copying • data collection via accounting module • data from all networked printers and MFPs

  27. tracking of all imaging and printing activities • summary, detailed and total reports • reporting by network user and device • control of which users can print to which device • control of how much users can print

More Related