Samsung Security Solutions



Similar documents
SeCUritY. Safeguarding information Within Documents and Devices. imagerunner ADVANCE Solutions. ADVANCE to Canon MFP security solutions.

SAMSUNG Multifunction Printer Security

SECURITY WITHOUT SACRIFICE

BUSINESS CORE PRINTING SOLUTIONS

MFP Security Overview

SECURITY. Konica Minolta s industry-leading security standards SECURITY

IMAGER security solutions. Protect Your Business with Sharp s Comprehensive Document Security Solutions

Digital Scanning Solutions. Versatile, affordable scanning solutions for every day business. Digital Printing Solutions

Sharpen your document and data security HP Security solutions for imaging and printing

SAMSUNG PRINTING SOLUTIONS Business Core Printing Solutions. FOR YOUR BUSINESS Easy-to-use serverless solutions that work as efficiently as you do

Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data

Print Security and Identity Authorization

Sharp s MFP Security Suite The best of the best in the Market

Canon imagerunner Hard Disk Drive Data Security Options. Data Encryption and Overwrite

Document Capture and Distribution

BUSINESS CORE PRINTING SOLUTIONS

Security White Paper. for KYOCERA MFPs and Printers

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Data

Security Solutions. Concerned about information security? You should be!

Samsung device management solutions Manage, monitor and diagnose multiple print devices easily and cost effectively

Common Criteria Certification for Samsung Multifunction Printers

White Paper. BD Assurity Linc Software Security. Overview

Samsung SmarThru Workflow 2 Digitize your print environment with secure, cost effective document workflow

HIPAA Security Compliance for Konica Minolta bizhub MFPs

Samsung Mobile Security

White Paper. Document Security and Compliance. April Enterprise Challenges and Opportunities. Comments or Questions?

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection

U.S. Army best practices for secure network printing, scanning, and faxing.

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0

Security White Paper for KYOCERA MFPs and Printers

Ricoh Security Solutions Comprehensive protection for your documents and information. ecure. proven. trusted

NERC CIP Requirements and Lexmark Device Security

White Paper. Support for the HIPAA Security Rule PowerScribe 360

Secure Installation and Operation of Your Xerox Multi-Function Device. Version 1.0 August 6, 2012

Standard Information Communications Technology. Multifunction Device. January 2013 Version 2.2. Department of Corporate and Information Services

PrintFleet Enterprise 2.2 Security Overview

Reform PDC Document Workflow Solution Streamline capture and distribution. intuitive. lexible. mobile

How To Use A Kosso Code Solution

Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI

Security Controls What Works. Southside Virginia Community College: Security Awareness

bizhub C3850/C3350 USER S GUIDE Applied Functions

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

BANKING SECURITY and COMPLIANCE

User s Guide [Security Operations]

Embedded Web Server Security

CHIS, Inc. Privacy General Guidelines

Samsung SyncThru Admin 6 Manage, monitor and diagnose printer fleets remotely

Features and Solutions November 2013

Unit 6 Research Project. Eddie S. Jackson. Kaplan University. IT540: Management of Information Security. Kenneth L. Flick, Ph.D.

VMware vcloud Air HIPAA Matrix

ACER ProShield. Table of Contents

Ensuring the security of your mobile business intelligence

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

Sharp Security Suite Technical Questions & Answers

SyncThru TM Web Admin Service Administrator Manual

Copyright Telerad Tech RADSpa. HIPAA Compliance

Setting Up Scan to SMB on TaskALFA series MFP s.

User s Guide. Security Operations Ver. 1.02

Securing MFPs in a CAC Environment: Today and Tomorrow Critical Considerations

UPSTREAMCONNECT SECURITY

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

In-Depth Look at Capabilities: Samsung KNOX and Android for Work

Hitachi Virtual Storage Platform Family: Security Overview. By Hitachi Data Systems

QLIKVIEW MOBILE SECURITY

PRIVACY, SECURITY AND THE VOLLY SERVICE

Xerox Mobile Print Cloud

Compliance in 5 Steps

IBX Business Network Platform Information Security Controls Document Classification [Public]

2 Enterprise. CounThru TM. Managed Print Solution. CounThru TM 2 Enterprise Managed Print Solution WHITE PAPER. Introduction. What is CounThru TM

Securing an IP SAN. Application Brief

Secure Use of the New NHS Network (N3): Good Practice Guidelines

KMnet Admin ENTERPRISE DEVICE MANAGEMENT SOFTWARE ADVANCED DEVICE MANAGEMENT SOFTWARE.

Xerox D95/D110/D125 Copier/Printer

HIPAA DATA SECURITY & PRIVACY COMPLIANCE

CA Performance Center

Hosted Testing and Grading

Embedded Web Server Security

File Management Utility User Guide

PrinterOn Print Management Overview

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

The Impact of HIPAA and HITECH

Xerox WorkCentre 5325/5330/5335 Security Function Supplementary Guide

technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been

Unless otherwise stated, our SaaS Products and our Downloadable Products are treated the same for the purposes of this document.

Document Imaging Solutions. The secure exchange of protected health information.

Workflow Solutions Data Collection, Data Review and Data Management

NETWRIX EVENT LOG MANAGER

Transcription:

Print with confidence Samsung Security Solutions For Every Business A4 to A3 Mono to Colour MFPs to Printers

Samsung Security Features You may not realise it, but every business can benefit from security. Think of it this way: Would you be comfortable allowing your competitors full access to your information? Is there sensitive financial information or private customer information that should be protected? Vulnerabilities that you may never have considered exist everywhere. For example, confidential information could be accidentally or even intentionally copied from stored documents, taken from the output tray, or faxed without authorisation. Any information stored on a local PC can be printed without authorisation. Information such as stored documents, email documents or print data can be intercepted from across a WAN, the internet/intranet, or VPN. A user from outside can even obtain or intercept confidential company or sensitive customer information through a fax line or corporate LAN without permission. Worse yet, without security features, certain types of companies could be operating under regulatory noncompliance, leading to regulatory penalties or legal cases from affected customers and clients. Samsung security solutions. Security with simplicity. If you work with sensitive information, from healthcare to finance to government, the need for security is compulsory. As one of the world s foremost technology leaders, Samsung can offer your company solutions that make security simple. We understand the intricacies and sensitivities of system security, and create machines that are easy to incorporate into your existing processes. We also remember you have a job to do and a business to run, so we make our machines easy to use, as well. Samsung provides businesses across the country with advanced features that are simple to use, and that are designed to save time and money. At Samsung, we invest billions every year to continually provide you with the very latest in technology and reliability. No matter what kind of delicate information you re working with, whether you re a small physician group or a major government contractor, your business can rest secure in the knowledge that Samsung is working for you. System Administrator Regulatory Compliance Unauthorised Some of the most common vulnerabilities associated with an unsecure MFP include: Legal cases Unauthorised use Identity theft Stolen information Loss of access Loss of data Rest secure in the knowledge that Samsung is looking out for you. We include security features at no additional cost (not the case with our competitors). Our leading-edge security features are based on industry standard requirements set forth by several regulatory and privacy organisations. These security features meet the needs of vertical market customers such as the government, education, healthcare and financial services. Ask yourself these questions: Does your printing device feature an access code to lock out unauthorised users? Can your network administrator remotely enable/disable your devices ports to control usage? Can digital images on your device s hard disk drive be overwritten or encrypted? Does your printing device track usage by group or user? Do you need to authenticate your users? Do you have a secure method to erase all data at the end of the lease? The importance of the information that is flowing through private and public devices has resulted in the need for broad regulations to protect this information. Samsung is continuously working with our industry partners to create compatible printing devices that meet the regulatory requirements of today s information infrastructure. The security features presented to you are able to meet or exceed the current regulatory requirements our customers demand. Some of the important regular and industry standards that affect the security requirements for Printers/MFPs: HIPPA SOX GLBA FERPA FISMA HSPD-12 Common Criteria IEEE 2600-2008, IEEE 2600.1-2009, IEEE 2600.2-2009 2 3

Access Control Secure Printing Allows a user to set a PIN or to use their access card (requires optional solutions) in order to retrieve a print job from the device. The job remains on the hard disk drive (HDD) until the user retrieves the job or until data is removed from the HDD. MAC and IP Filtering Limits access to select MAC/IP addresses. LDAP (Lightweight Directory Access Protocol) An application protocol for querying and modifying directory services running over TCP/IP. User Authentication Authenticates users against the customer s corporate directory via LDAP, LDAP over SSL, or Kerberos. Network Security Admin Authentication The MFP requires the system administrator to enter authentication before permitting access to the system management items. System administrators include SyncThru Web Service administrators and the local system administrators. The authentication process for the SyncThru Web Service administrator uses an account and a password on the user interface, while the authentication process for the local MFP system administrator uses a PIN number on the MFP user interface. Secure Communications All communications to and from most Samsung MFP s can utilise Secure Socket Layer (SSL) for secure transmission over the network, and most Samsung devices also support SMB, IPv6, 802.1x, IPSec, and SNMP3. Some MFPs also support Trusted Platform Module (TPM). HTTPS Allows web traffic to be encrypted, so that remote management via the printers and MFP s web pages can be performed securely. Scanning Security Network Authentication (Secure Scanning) The Samsung business MFPs prevent unauthorised use of the installed network options (Network Scanning, Scan-to- Email, and Scan-to-Server). The network options available are determined by the system administrator. To access a network service, the user is required to use their access card or provide a user name and password, which is then validated by the designated authentication server. User Authentication can protect the MFP from unauthenticated user access. Unauthenticated users can see the basic status of the MFP, but cannot configure MFP settings. User Authentication needs to authenticate users who want to change MFP settings or use functions like Copy, Fax, Scan and Printing. User Authentication can be configured by Local Authentication or LDAP Authentication. Card Reader Support (Requires third party card solution) Ensures that only badged employees can access the networkthrough its devices. Address Book Lookup via LDAP over SSL Ensures all information is exchanged via LDAP, including the user s credentials, name, email address and fax. Data Security HDD Erase Eliminates residual data by overwriting the entire disk (automatic or on-demand). HDD Encryption Allows all residual data on the hard drive of devices to be encrypted. Numbers are encrypted to preserve the confidentiality and privacy of the data. All HDD data can be erased on demand at the end of the lease. Fax Security Secure Fax Reception Samsung fax devices comply with ITU (International Telecommunications Union) standards. If any of the data received by the fax device does not meet these standards, the transmission is rejected. Samsung s Secure Receiving mode feature can prevent received faxes from being accessed by unauthorised people. You can turn on Secure Receiving mode to restrict printing of received faxes when the machine is unattended. In Secure Receiving mode, all incoming faxes go into memory. A four-digit PIN is established at the set-up of this feature and must be entered in order to retrieve the stored faxes. Common Criteria Government/Military Requirements: Common Criteria Certification Common Criteria Certification provides independent, objective validation of the reliability, quality and trustworthiness of IT products. It is a standard that customers can rely on to help them make informed decisions about their IT purchases. Common Criteria sets specific information assurance goals including strict levels of integrity, confidentiality and availability for systems and data, accountability at the individual level, and assurance that all goals are met. Common Criteria Certification is a requirement of hardware and software devices used by the government on national security systems. In 1994, Common Criteria were created for IT security evaluation standards worldwide. ISO 15408 resulted when these Common Criteria became international standards in 1999. System Audit Logs The Secure Management system provides logs, backup and email notification, to give users an overall view of their secure documents even after they have been printed and stored. 4 5

Vertical Market Regulations Notes Banking BASEL II Basel II is the second of the Basel Accords, which are recommendations on banking laws and regulations issued by the Basel Committee on Banking Supervision. The purpose of Basel II, which was initially published in June 2004, is to create an international standard that banking regulators can use when creating regulations about how much capital banks need to put aside to guard against the types of financial and operational risks banks face. Banking/Financial SEC 17a-4 This Act requires the creation and maintenance of records of securities transactions for the purpose of review and audit in order to better protect investors and the local economy. Banking/Financial GLBA Gramm-Leach-Bliley Act contains a Safeguards Rule which requires financial institutions to have in place a comprehensive security program to ensure the security and confidentiality of customer information. Education FERPA Family Educational Rights and Privacy Act regulations provide that educational agencies and institutions that receive funding under a program administered by the Department of Education must provide students with access to their education records, an opportunity to seek to have the records amended, and some control over the disclosure of information from the records. General SOX The Sarbanes-Oxley act was enacted to protect shareholders from accounting errors and fraudulent practices. It defines which records are to be stored and for how long. Healthcare Government HIPAA Common Criteria Title II of the Health Insurance Portability and Accountability Act (HIPAA), known as the Administrative Simplification (AS) provisions, requires the establishment of national standards for electronic health care transactions and national identifiers for providers, health insurance plans and employers. It helps people keep their information private. Common Criteria is a international compliance which allows users the ability to have a high level of certified security through functional and assurance requirements. Common Criteria sets specific information assurance goals which included a strict levels of integrity, confidentiality and availability for systems and data, accountability at the individual level, and assurance that all goals are met for end users. Government IEEE 2600-2008 This standard defines security requirements from all aspects of security including authentication, authorisation, privacy and information security which are required to meet standards for manufacturers and users when selecting a device or range of printers or MFPs A4 Mono Printer A4 Mono MFP A4 Colour Printer A4 Colour MFP A3 Mono MFP A3 Colour MFP Solutions Compatibility Matrix Category Device Management Solutions & Utilities ML-3710ND ML-3750ND ML-4510ND ML-5015ND ML-5510ND ML-6510ND SCX-4833FD SCX-5737FW SCX-5835NX SCX-6545NX SCX-6555NX Third Party Application Support XOA XOA XOA XOA XOA XOA XOA XOA XOA XOA CounThru TM 2. Pro/Enterprise 2 (20) 2 (20) 3 3 3 3 2 (20) 3 3 3 3 2 (20) 3 2 (20) 2 (20) 3 3 3 3 3 3 3 3 3 SyncThru TM Admin 6 2 (20) 2 (20) 3 3 3 3 2 (20) 3 3 3 3 2 (20) 3 2 (20) 2 (20) 3 3 3 3 3 3 3 3 3 SyncThru TM Web Service 2 2 2 2 2 2 2 2 3 3 3 2 1 2 2 2 2 2 2 2 2 2 2 2 SmarThru TM Workflow 3 1 1 1 1 1 1 1 1 1 1 1 1 CLP-680ND CLP-775ND CLX-6260ND CLX-6260FR SCX-8123NA SCX-8128NA SCX-8230NA SCX-8240NA CLX-9201NA CLX-9251NA CLX-9301NA CLX-9252NA CLX-9352NA Document Workflow Document Box Barcode SmarThru TM Office Output Management SecuThru TM Lite CAC Solution Packaged (FIPs 201-1) 11.4 1 11.4 1 11.4 1 11.4 1 11.4 1 11.4 1 11.4 1 11.4 1 11.4 1 11.4 Standard Accounting Confidential Printing(Secure Printing) Data Erasing and Encryption Print Job Encryption Security PDF Encryption Protocol & Port management IP/Mac address filtering IPV6 MAC address filtering Common Criteria (Security) Certification Cerner Certification (Healthcare) Citrix certification SAP Compatibility 6 7

To learn more about Samsung Print, please visit: 2012 Samsung Electronics Ltd. Samsung is a registered mark of Samsung Electronics Corp., Ltd. Specification and design are subject to change without notice. Nonmetric weights and measurements are approximate. All data is correct at time of creation, Samsung are not liable for errors or omissions. All brand, product, service names and logos are trademarks and/or registered trademarks of their respective manufacturers and companies are hereby recognised and acknowledged. Copyright 1995-2012 SAMSUNG. All rights reserved. Samsung Electronics Co., Ltd. Samsung House 1000 Hillswood Drive Chertsey, Surrey KT16 0PS 2012-11