Ricoh HotSpot Printer/MFP Whitepaper Version 4_r4
|
|
|
- Elwin Gibbs
- 10 years ago
- Views:
Transcription
1 Ricoh HotSpot Printer/MFP Whitepaper Version 4_r4
2 Table of Contents Introduction... 3 What is a HotSpot Printer?... 3 Understanding the HotSpot System Architecture... 4 Reliability of HotSpot Service... 4 Security Considerations... 5 Security Considerations... 5 HIPAA Compliance For Health Care Providers... 7 Bandwidth Considerations... 7 Print Job Polling... 7 Print Job Download... 8 Supported File Formats
3 Introduction The purpose of this whitepaper to address some of the most frequently posed security and system reliability questions. What is a HotSpot Printer? The Ricoh HotSpot printer allows people to print simply by sending an or submitting print requests from a webpage. This simple and intuitive interface allows use without the need for print drivers or any extra software. This eliminates IT overhead and time used in setup and configuration for mobile or temporary users. There are two methods for submitting print jobs: Users submit their print jobs by simply forwarding an to the printer s address. This can be done from any computer or handheld device that supports . The user will then receive an response with a release code for the body of the and a separate and release code for each attachment. Simply enter this release code at the printer keypad to begin printing the document or . Web Submission Documents may also be submitted through a web browser by visiting the printer s webpage. Users simply select the browse button to identify the document they would like to submit for printing and then provide an address before submitting the print request. They will receive a release code on the webpage as well as a copy of the code via . When the code is entered at the printer keypad the job will begin printing. 3
4 Understanding the HotSpot System Architecture To better understand the technology being leveraged for HotSpot printing it is important to know that when users or submit print requests through the website there is a service operating in the background to allow the printing function. This is completely seamless to the end user. The real workflow of printing to a HotSpot will look something like this: 2. The receiving server generates a compressed printable data file and transmits it securely to the destination printer, once again using 128-bit SSL encryption for complete file integrity and protection. 1. Documents and Web pages to be printed are sent from a wired or wireless laptop, cell phone, or handheld device to the PrintSpots server using 128-bit SSL encryption. Each job is automatically assigned a private 4 10 digit release code. 3. The compressed print job is automatically formatted for the target printer and sent. The file resides safely in the printer hard disk drive until the user arrives at the printer and enters the release code at the attached keypad. The file is decompressed, printed, and then automatically erased from memory for total security. It's that simple! Reliability of HotSpot Service The HotSpot printing system architecture ensures the security and reliability of HotSpot printing. The diagram on the next page provides a better overview of the service infrastructure. The system's design is intended to address problems if either of the 2 physical network operations centers is removed from service. The Internet reliability is managed using 3 physically distinct inbound Internet connections, which are provided by 2 separate ISPs. The goal is to minimize downtime caused by the loss of any single physical connection or the loss of an ISP. 4
5 Each of the physical locations also incorporate battery backup systems, which are further backed up by generators for long term outages where the battery backups are not sufficient. Security Considerations When considering security it is important to understand the steps involved when a print job is submitted to a hotspot printer: Before data can be submitted to the HotSpot printer, the printer must have access out to the Internet. The printer uses two forms of communications with the PrinterOn service. 1. HTTP Before the printer can be used it must first validate its license agreement with the PrinterOn Servers. This is done through HTTP communications. 2. HTTPS All print data and communications regarding print job transmission is encrypted with 128-bit SSL. 5
6 Using both HTTP and HTTPS requires that data be allowed to pass through any firewall on the customer network by using TCP ports 80 and 443. As most environments allow for secure Internet communications on client PCs the HotSpot printer does not require any special firewall configuration. If a proxy server is used the printer will need to be configured with a proxy user account. There are two forms of encryption available to be used for data transmission to the PrinterOn service. 1. If submitting print jobs through a HotSpot webpage all data will be encrypted with SSL. 2. When ing documents the PrinterOn mail servers will accept requests for TLS authentication.* Any print job submitted to the HotSpot printer will actually first go to the PrinterOn web server for print processing. Both physical locations are equipped with secure access to the server rooms. Only 4 employees and 1 executive have keys with access to these rooms. No remote access is possible to the servers requiring direct physical access to the servers to view any data they may process. *The TLS protocol is designed to allow communications privacy over the internet by allowing client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. Further information on this encryption is available through RFC The initial or web submission will pass through the PrinterOn firewall and the service Load Balancer will direct the job request to one of the two, mirrored physical locations. The print job will then arrive at the appropriate web or server farm depending on the print job submission method. Here the print job is stripped from the rest of the data communications used to submit the job and the text and each attachment are assigned in queue to the print service. Once the print service has received the jobs from the or web servers the data is deleted from these servers using standard windows deletion. The print server will then process the print job and generate the release code for the and each attachment. For jobs submitted via the web service the release code will display on the webpage and will also be ed to the address that was provided. For jobs submitted by a return will be sent with the release code or codes. Now that the print data has been processed, and the release codes created, the data is transferred to a temporary data storage site for transmission to the HotSpot printer. Once again when the data move is confirmed all records of the print data on the print server are deleted from the windows file system. The data is encrypted at the new storage location and transmitted to the HotSpot printer. It will download directly to the hard drive installed on the printer and remain there, encrypted, for 72 hours. If the release code that was assigned to it by the HotSpot service is not entered into the device keypad within 72 hrs the print file is deleted from the printer hard disk. 6
7 HIPAA Compliance For Health Care Providers Ricoh HotSpot Printers can fulfill a critical role in any organization concerned about HIPAA compliance. Criteria outlined in the Security Considerations section demonstrates how providers can maintain confidentiality of patient personal information while data is printed. The basic mechanism which ensures only users with a release code can obtain hard copy from Ricoh HotSpot Printers by using a keypad to release print jobs complies with all aspects of compliance related to printing output including: Ensuring documents printed to a shared printer are promptly removed (output is not left unattended and open to compromise). Information being printed to equipment located in a public location must be strictly monitored. Bandwidth Considerations Ricoh HotSpot Printers were developed with the full understanding that this technology would be deployed in multiple environments, including those with low speed and high-speed Internet connections. In addition to state-of-the-art compression techniques, the Ricoh HotSpot Printers have been designed with a number of features relevant to lower bandwidth installations and have been successfully tested and deployed in high bandwidth connections (DSL or better) as well as limited bandwidth situations. Note that in the limited bandwidth case, we are still assuming that the service is essentially always connected. By way of example, we will assume a DSL caliber connection with a download speed of 1 Mbit/second and an upload speed of 384 Kbits/second. During operation of the Ricoh HotSpot Printer service, there are two types of conversations that consume bandwidth: print job polling and print job downloading. Print Job Polling Polling occurs on a regular basis, in which the embedded printer software asks a simple question: do you have a print job for me? The answer is almost always no, and the system goes back to sleep until the next poll. The polling query is usually less than 200 bytes. Most of that is HTTP overhead, plus a message of roughly 50 bytes that varies depending on the logical name of the printer. The response is a bit shorter, say 150 bytes. Some sample math: 1 poll request: 200 bytes = 2000 bits (some extra for framing, parity, etc) Maximum polling frequency: 1 poll/minute = 2000bits/minute DSL Bandwidth Capacity: 384,000 bits/second = 23,040,000 bits/minute Polling capacity use = 2000/ = % of bandwidth Overall, the polling mechanism that checks for print jobs consumes an insignificant portion of the available bandwidth. Furthermore, the administrator can change the polling interval or frequency. 7
8 Print Job Download If print job polling indicates that one or more print jobs are available, then the portion of the HotSpot service downloads the print job. Print jobs can vary in size immensely. And large print jobs can consume a large percentage of available bandwidth. Therefore, controlling the size of the print jobs is a key objective, and there are 4 key variables that are under our control. Print Job Compression All print data is compressed before presenting it for download. This minimizes the amount of print data that needs to be transferred. Print Job Page Limits The printer administrator can set upper boundaries on the number of pages that can be printed. As a general rule, this is more useful for controlling abuse, but can be of value for limiting data usage. Data Limits The administrator can specify the maximum allowable compressed print data size. This setting will reject any attempts to send print jobs that exceed the comfort level for the network. Printer Type Another key method for minimizing the print job size is to select a printer that uses efficient data types. All Ricoh HotSpot Printers support PCL and PostScript and are far more efficient than GDI, Quartz or other host-based printers. Recommendations to Limit Bandwidth Usage o o o o Choose a black and white Ricoh HotSpot Printer model Set the data size limit to 3 Mbytes. 3 Mbytes can contain a typical print job of up to 18 pages, which is more than 95% of all requests. The median 4 page print job will be about 660 Kbytes in size, consuming a significant portion of the available bandwidth for less than 7 seconds. As a general rule, assume, roughly, 30 seconds per page. Assuming 20 print jobs per day are sent with the upper limit of 3 Mbytes per job, the data will be transmitted in roughly 8 to 10 minutes. (3,000, bytes * 10 bits / 1,000,000 bit (a second) = 30 seconds Supported File Formats Ricoh HotSpot Printers support a wide range of file formats including the following popular file formats: Microsoft Word 2.0 > 2010 Microsoft Excel 2.0 > 2010 Microsoft PowerPoint 4.0 > 2010 Microsoft Visio 5 > 2007 OpenOffice.org Adobe PDF Web Pages (htm, html, mhtml) Text and TRFT files JPEG, TIFF, BMP, PNG, GIF 8
9 For more information regarding HotSpot Technology: Ricoh Americas Corporation, Five Dedrick Place, West Caldwell, NJ All rights reserved. Ricoh and the Ricoh Logo are registered trademarks of Ricoh Company; Ltd. Specifications are subject to change without notice.
HotSpot Enterprise Mobile Printing Solution. Security Whitepaper
HotSpot Enterprise Mobile Printing Solution Security Whitepaper August, 2012 2012, Ricoh Americas Corporation. All rights reserved. Ricoh and the Ricoh logo are registered trademarks of Ricoh Company,
Enterprise Printing Solutions. Secure, on-premise mobile printing platform. enterprise education public printing locations print simply anywhere
Enterprise Printing Solutions Secure, on-premise mobile printing platform enterprise education public printing locations print simply anywhere PrinterOn Enterprise provides a secure mobile printing platform
How to Print Using the PrinterOn Hosted Service & FAQs
How to Print Using the PrinterOn Hosted Service & FAQs Version 1.0 February 2013 1. How to Print with PrinterOn... 3 1.1. Email Printing... 3 1.2. Web Portal Printing... 3 1.3. Mobile Apps... 3 1.4. PrintWhere
Interwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.
Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.
Technical White Paper BlackBerry Enterprise Server
Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table
enicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
Xerox Mobile Print Cloud
September 2012 702P00860 Xerox Mobile Print Cloud Information Assurance Disclosure 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United
DeltaV System Health Monitoring Networking and Security
DeltaV Distributed Control System White Paper DeltaV System Health Monitoring Networking and Security Introduction Emerson Process Management s DeltaV System Health Monitoring service enables you to proactively
Remote Access and Control of the. Programmer/Controller. Version 1.0 9/07/05
Remote Access and Control of the Programmer/Controller Version 1.0 9/07/05 Remote Access and Control... 3 Introduction... 3 Installing Remote Access Viewer... 4 System Requirements... 4 Activate Java console...
PrinterOn Print Management Overview
PrinterOn Print Management Overview Table of Contents 1. PrinterOn and Print Management Overview... 4 1.1. Combined PrinterOn and Print Management Capabilities... 5 1.1.1. Comprehensive Workflow Tracking
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Reform PDC Document Workflow Solution Streamline capture and distribution. intuitive. lexible. mobile
Reform PDC Document Workflow Solution Streamline capture and distribution intuitive lexible mobile Reform PDC Innovation and convenience to maximize efficiency. Your organization is unique so is its document
MOBILE PRINTING: Secure Printing From Your Handheld Devices
DOCUTREND WEBINAR SERIES: MOBILE PRINTING: Secure Printing From Your Handheld Devices ---------------------------------------------------------------------------------------------------- For Telephone
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Centricity 360 Case Exchange
GE Healthcare Centricity 360 Case Exchange Helping distributed teams collaborate on patient cases, through a professional social network Introduction Centricity 360 with Case Exchange helps hospital administrators
Improving the Customer Support Experience with NetApp Remote Support Agent
NETAPP WHITE PAPER Improving the Customer Support Experience with NetApp Remote Support Agent Ka Wai Leung, NetApp April 2008 WP-7038-0408 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 NETAPP SUPPORT REMOTE
PrinterOn Print Delivery Station Admin Guide
PrinterOn Print Delivery Station Admin Guide Version 2.6 Doc Rev 2.6EH Table of Contents 1. Print Delivery Station (PDS) Overview...4 1.1. Print Delivery Hub...4 1.2. Print Delivery Station...4 1.2.1.
NERC CIP Requirements and Lexmark Device Security
Overview The information in this document explains how Lexmark multifunction printers (MFPs) and network printers can assist with compliance to the NERC s Critical Infrastructure Protection (CIP) requirements.
User Guide - Table of Contents
User Guide - Table of Contents Receiving Faxes Fax-to-Email Web Access to Faxes File Format Options Receiving Faxes on Wireless Devices Receiving Faxes Securely Integration and API Methods Archive Service
Using email over FleetBroadband
Using email over FleetBroadband Version 01 20 October 2007 inmarsat.com/fleetbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
redcoal EmailSMS for MS Outlook and Lotus Notes
redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: [email protected] Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal
Mobile. Pull. Solution. Print. and. Get true printing flexibility and document security with EveryonePrint
Get true printing flexibility and document security with EveryonePrint SimpleSecure Mobile Print and Pull Solution EveryonePrint is the perfect fit for any business of any size, where users need secure
Xerox Mobile Print Solution
Software Version 3.0 Version 1.0 702P03147 Xerox Mobile Print Solution Information Assurance Disclosure 1 Introduction... 6 1.1 Purpose... 6 1.1 Target Audience... 6 1.2 Disclaimer... 6 2 System Workflows...
Xerox FreeFlow Core Cloud Customer Expectations Document. Version 1.0
Xerox FreeFlow Core Cloud Customer Expectations Document Version 1.0 September 2015 2015 Xerox Corporation. All rights reserved. XEROX and XEROX and Design, FreeFlow, and VIPP are trademarks of the Xerox
easy ntelligent convenient GlobalScan NX Server 5/ Server 32/Server 750 Capture & Distribution Solution Energize Critical Workflows
GlobalScan NX Server 5/ Server 32/Server 750 Capture & Distribution Solution Energize Critical Workflows easy convenient Server 5/Server 32/Server 750 ntelligent Ricoh GlobalScan NX Server 5/Server 32/Server
GlobalScan NX. Server 32/Server 750. Intelligent scanning for smarter workflow
SOLUTION Intelligent scanning for smarter workflow GlobalScan NX Server 32/Server 750 Designed to simplify daily document tasks, these easy-to-use software solutions provide a fast, streamlined approach
Simplify essential workflows with dynamic scanning capabilities. GlobalScan NX Server 32/Server 750 Capture & Distribution Solution
GlobalScan NX Server 32/Server 750 Capture & Distribution Solution SCAN > SHARE > MANAGE > DELIVER > ACCELERATE > Simplify essential workflows with dynamic scanning capabilities. > Manage scanned documents
December 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure
December 2015 702P00860 Xerox App Studio 3.0 Information Assurance Disclosure 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation
Copyright Telerad Tech 2009. RADSpa. HIPAA Compliance
RADSpa HIPAA Compliance 1. Introduction 3 1.1. Scope and Field of Application 3 1.2. HIPAA 3 2. Security Architecture 4 2.1 Authentication 4 2.2 Authorization 4 2.3 Confidentiality 4 2.3.1 Secure Communication
How To Use Irecruit Software
irecruit is a hosted SaaS (Software as a Service), cloud-based recruiting software designed to provide any size of business a cost effective, affordable and way to manage the recruiting process online.
ARCHITECTURAL OVERVIEW E-mail Availability Service (EAS) with ActiveMailbox
ARCHITECTURAL OVERVIEW E-mail Availability Service () with ActiveMailbox E-mail Availability Service () with ActiveMailbox For Microsoft Exchange -Centric Environments The Market Need for Through direct
Customer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background
Xerox Multifunction Devices Customer Tips dc07cc0432 October 19, 2007 This document applies to these Xerox products: X WC 7328/7335/7345 for the user Xerox Network Scanning TWAIN Configuration for the
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
PrinterOn Enterprise Administration Support Guide
PrinterOn Enterprise Administration Support Guide Version 2.5 Doc Rev: 1.1 Table of Contents 1. Overview...4 2. Hardware and Operating System Requirements...5 2.1. Hardware Requirements...5 2.2. Software
Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.
Important Please read this User s Manual carefully to familiarize yourself with safe and effective usage. About This Manual This manual describes how to install and configure RadiNET Pro Gateway and RadiCS
Optus EmailSMS for MS Outlook and Lotus Notes
Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights
Chapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
SSL VPN Technical Primer
4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: [email protected] www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses
Verizon Remote Access User Guide
Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks
Understanding IP Faxing (Fax over IP)
Understanding IP Faxing (Fax over IP) A detailed technical overview of how VoIP technology and IP Faxing (Fax over IP) are changing the way organizations utilize existing network infrastructures for voice
ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0
ReadyNAS Replicate Software Reference Manual 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10727-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced,
CentreWare Internet Services Setup and User Guide. Version 2.0
CentreWare Internet Services Setup and User Guide Version 2.0 Xerox Corporation Copyright 1999 by Xerox Corporation. All rights reserved. XEROX, The Document Company, the digital X logo, CentreWare, and
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Server-Based PDF Creation: Basics
White Paper Server-Based PDF Creation: Basics Copyright 2002-2009 soft Xpansion GmbH & Co. KG White Paper Server-Based PDF Creation: Basics 1 Table of Contents PDF Format... 2 Description... 2 Advantages
SyncThru TM Web Admin Service Administrator Manual
SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included
LAB FORWARD. WITH PROService REMOTE SERVICE APPLICATION. Frequently Asked Questions
LAB FORWARD WITH PROService REMOTE SERVICE APPLICATION Frequently Asked Questions MORE WAYS TO INCREASE UPTIME AND IMPROVE PRODUCTIVITY. GENERAL INFORMATION Q: What is PROService? A: PROService is Beckman
Hitachi Content Platform (HCP)
Copyright 2014 A*STAR Version 1.0 Hitachi Content Platform (HCP) HCP and HCP Anywhere Features Evaluation THIS DOCUMENT AND THE INFORMATION CONTAINED HEREIN IS PROVIDED ON AN "AS IS" BASIS WITHOUT ANY
Manual to Access SAP Training Systems Technical Description for Customer On-Site Training
Manual to Access SAP Training Systems Technical Description for Customer On-Site Training 2.0 draft version available as of Jan. 5th 2015. The final version will be available in January 2015 after valuable
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
CTERA Agent for Mac OS-X
User Guide CTERA Agent for Mac OS-X June 2014 Version 4.1 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
QUARTZ FA-LIMS. Laboratory Information Management System for Failure Analysis THE ONLY LIMS SYSTEM DESIGNED SPECIFICALLY FOR FAILURE ANALYSIS
QUARTZ FA-LIMS Laboratory Information Management System for Failure Analysis THE ONLY LIMS SYSTEM DESIGNED SPECIFICALLY FOR FAILURE ANALYSIS FROM JOB REQUEST TO FINAL REPORT, THE COMPLETE, CUSTOMIZED ANALYTICAL
Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3
Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
WhatsUpGold. v14.2. Getting Started with WhatsUp Gold MSP Edition
WhatsUpGold v14.2 Getting Started with WhatsUp Gold MSP Edition Getting Started with MSP Edition In This Guide About WhatsUp Gold MSP Edition... 1 User interfaces... 2 About the MSP Edition reporting capabilities...
Re-associating.ica file extension on Vista/Windows 7 machines
Troubleshooting This page provides answers to common problems you may have encountered when using TENGRAPH Online. Re-associating.ica file extension on Vista/Windows 7 machines There is a known issue that
PrinterOn Enterprise Installation Guide
PrinterOn Enterprise Installation Guide Version 2.5 Doc Rev: 1.1 1. Introduction...4 2. Before you begin...5 2.1. System requirements...5 2.2. Recommended Applications...5 2.3. Email Print Support...5
eprint SOFTWARE User Guide
eprint SOFTWARE User Guide HP eprint software User Guide Copyright and License 2012 Copyright Hewlett-Packard Development Company, L.P. Reproduction, adaptation, or translation without prior written permission
Server 32/Server 750. GlobalScan NX Server 5/ SOLUTION. Intelligent scanning for smarter workflow
SOLUTION Intelligent scanning for smarter workflow GlobalScan NX Server 5/ Server 32/Server 750 Designed to simplify daily document tasks, these easy-to-use software solutions provide a fast, streamlined
Synology QuickConnect
Synology QuickConnect Based on DSM 5.2 Synology Inc. Table of Contents Chapter 1: Introduction What is QuickConnect?... 3 Chapter 2: How QuickConnect Works Overview... 4 QuickConnect Connectivity Test...
Test Case 3 Active Directory Integration
April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of
Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20
Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup
Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
Xerox Mobile Print Cloud
Xerox Mobile Print Cloud Information Assurance Disclosure Software Version 3.0 May 2015 702P03595 2013-2015 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity
Improving File Sharing Security: A Standards Based Approach A Xythos Software White Paper January 2, 2003 Abstract Increasing threats to enterprise networks coupled with an ever-growing dependence upon
PrinterOn Mobile App for ios and Android
PrinterOn Mobile App for ios and Android User Guide Version 3.4 Contents Chapter 1: Getting started... 4 Features of the PrinterOn Mobile App... 4 Support for PrinterOn Secure Release Anywhere printer
SharePoint Performance Optimization
White Paper AX Series SharePoint Performance Optimization September 2011 WP_SharePoint_091511.1 TABLE OF CONTENTS 1 Introduction... 2 2 Executive Overview... 2 3 SSL Offload... 4 4 Connection Reuse...
Service Overview CloudCare Online Backup
Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
KIP Cloud Apps User Guide
KIP Cloud Apps User Guide - 1 - Contents System Requirements... 3 Setup of Cloud (Driverless) Printing... 4 Printer Configuration... 5 Cloud Printing... 8 General Tab... 11 Color Tab... 12 Misc Tab...
Whitepaper Document Solutions
Whitepaper Document Solutions ScannerVision 3 Contents Contents... 2 Introduction... 3 ScannerVision introduction... 4 Concept... 4 Components... 4 Deploying ScannerVision... 5 Supported Operating Systems...
AT&T Global Network Client Client Features Guide. Version 9.6
Version 9.6 AT&T Global Network Client Client Features Guide 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual
Installation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Overview... 3 Installing Bridgit Software... 4 Installing Bridgit Software Services... 4 Creating a Server Cluster... 4 Using
Spreed Keeps Online Meetings Secure. Online meeting controls and security mechanism. www.spreed.com
Spreed Keeps Online Meetings Secure Online meeting controls and security mechanism www.spreed.com Spreed Online Meeting is protected by the most advanced security features. Rest assured that your meetings
Interwoven WorkSite Framework* User s Guide
GlobalScan Ver. 1.5 Interwoven WorkSite Framework* User s Guide Contents About GlobalScan... 4 About Interwoven... 4 MFD Operation... 5 Step 1: Place Document... 5 Step 2: Login... 5 Step 3: Select Database,
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Konica Minolta s Optimised Print Services (OPS)
Konica Minolta s Optimised Print Services (OPS) Document Collection Agent (DCA) Detailed Installation Guide V1.6 Page 1 of 43 Table of Contents Notes... 4 Requirements... 5 Network requirements... 5 System
Mobile Admin Security
Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing
Project Title: Judicial Branch Enterprise Document Management System RFP Number: FIN122210CK Appendix D Technical Features List
FEAT891 Medium Recoverable using backup The solution shall be recoverable from backup storage media storage media. FEAT893 Desired Medium Support Load Sharing High Availability The solution should utilize
System Requirements - filesmart
System Requirements - filesmart The following are minimum and recommended system requirements for filesmart. Whilst the program will operate on the minimums listed, we strongly suggest you meet or exceed
VIA CONNECT PRO Deployment Guide
VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
Docufide Client Installation Guide for Windows
Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is
How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm
ULTEO OPEN VIRTUAL DESKTOP V4.0.2 ARCHITECTURE OVERVIEW Contents 1 Introduction 2 2 Servers Roles 3 2.1 Session Manager................................. 3 2.2 Application Server................................
October 2013 702P00860. Xerox App Studio. Information Assurance Disclosure. Version 2.0
October 2013 702P00860 Xerox App Studio Information Assurance Disclosure Version 2.0 2013 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
White Paper. Securing and Integrating File Transfers Over the Internet
White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure
White Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
Xerox PrintSafe Software
Software Version 1.0 Version 1.0 702P03957 Xerox PrintSafe Software Information Assurance Disclosure Xerox PrintSafe Software Copyright 2015 Xerox Corporation. All rights reserved. Xerox, Xerox and Design,
MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.
How to Configure edgebox as a Web Server
intelligence at the edge of the network www.critical-links.com edgebox V4.5 Introduction: The Web Server panel allows the simple creation of multiple web sites using the Apache web server. Each website
Preparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
