Device Security
Securing your workplace information has never been more important. Business Information Security by Canon
Establishing and maintaining a security posture that adequately balances risk and business productivity is top of mind of many business leaders. Our mission is to offer our customers business information security solutions and services that can enable business growth, provide improvements in productivity and efficiency and protect information as it flows both inside and outside of an organization.
PROTOCOL SECURITY
- SNMP
- SSL
- Certificates
- Network & Web
- IEEE2600 Common Criteria Certification
HARDWARE SECURITY
- Trusted Platform Module (TPM)
- HDD Data Encryption
- HDD Data Erase
- HDD Data Erase Scheduler
- HDDD Initialize with Report
- HDD Pasword Lock
- Removable HDD
DATA SECURITY
- Secured Print/Encrypted Secured Print
- Encrypted PDF
- SSL/TLS Encryption
- IPSec Support
- Wireless LAN/IEEE 802.1
- Security Enhancements
- TLS Improvements
MANAGE ACCESS
- Device Based
- Universal Login Manager (ULM)
- uniFLOW Online Express
- Card Based
- Remote Operator Kit LUI Mask
- Firewall Management
CENTERALIZED MANAGEMENT
- Security Policy Management
- Security Enhancement
- Audit Logging
- Verify System at Startup - Secure Boot
- SIEM Integration with Syslog protocols RFC5424 & RFC5426
- Auto Certificate Update
Security Measures to Protect against Malware and Tampering
The Canon imageRUNNER ADVANCE security-by-design build includes measures that prevent tampering by prohibiting the installation or execution of programs without a digital signature applied by Canon. The following program-tampering detection functions are in place to counter unknown attacks.*
Verify System at Startup
Once enabled, the Verify System at Startup function runs a process during startup to verify that tampering of boot code, OS, firmware, and MEAP applications has not occurred. If tampering of one of these areas is detected, the system will not start. By using the hardware as the “Root of Trust,” enhanced security against software tampering is provided. Furthermore, standard cryptographic technologies (hash, digital signature) are used for verification.
McAfee Embedded Control
Once enabled, McAfee Embedded Control allows only known programs contained in the dynamic whitelist to be executed on the MFP. Other programs not listed in the whitelist are considered unauthorized and will not be permitted to execute. This helps prevent worms, viruses, spyware, and other malware from compromising the device. A log of all prevented executions is available in the Audit Log when Runtime Intrusion Detection is enabled.
Protocol Security - Hardening the Device Canon imageRUNNER ADVANCE
Throughput has always been paramount to an efficient document capture process and output workflow. In today’s environment, secure throughput architecture is even more critical. Administrators should ensure that MFP device protocols are configured to help minimize the risk of a breach at the device.
For more information or to request Device Hardening Services please contact us today or click here to have someone contact you.
Note: Canon imageRUNNER ADVANCE Third Generation devices meet the IEEEE2600 Common Criteria.
Hardware Security - Protecting Data at Rest
Today most MFP systems hard disk drive (HDD) protection features offer several options to keep data safe. An example of this would be a tamper proof Trusted Platform Module (TPM) and HDD Data Encryption to help ensure that your data is encrypted before storing it on the resident hard drive. Take advantage of the extended HDD options to protect data at rest on the device.
Data Security - Protecting Data in Transit
Just as important as protecting data at rest, is protecting it while in transit. These security features can help protect data while it travels from the user’s workstation or mobile device to a printer:
Controlling Access
Controlling access of MFD system users is the first line of defense. Most devices provide options that let administrators define user profiles and provide various levels of what features and functions an individual is authorized to use (i.e., printing and copying only; print, scanning, copying and faxing, etc.).
Centralized Management with Canon Security Solutions
For administrators a centralized management option helps to contain costs, assists with maintaining an ideal security posture, helps monitor devices and user behavior and can be used to provide an audit platform that may help comply with regulatory dependencies. Other control features include:
Looking For More Information?
Let us know what you are looking for, and we can help you with a free assessment.