are you concerned about printer security? you should be

45
Are you concerned about printer security? You should be. Presenter: Jonathan Ramirez - HP

Upload: others

Post on 15-Nov-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Are you concerned about printer security? You should be

Are you concerned about printer security? You should be.

Presenter: Jonathan Ramirez - HP

Presenter
Presentation Notes
[Add your name and the date, or remove placeholder]
Page 2: Are you concerned about printer security? You should be

Risks and costs of unprotected printing environmentsCybercrime, internal breaches, compliance infringement, and more can hurt your business

73% of CISOs expect a

major security breach within a year2

Financial loss

Fines, lost business, damaged reputation, and

class-action lawsuits

64% of IT managers state

their printers are likely infected with malware1

=

$7.7MAverage annual cost

of cyber crime 41 Ponemon Institute, “Insecurity of Network-Connected Printers,” October 2015. 2 Help Net Security, “Why enterprise security priorities don’t address the most serious threats,” July 2015. 3 26.2% of survey respondents experienced a significant IT security breach that required remediation, and more than 26.1% of these incidents involved print. IDC, “IT and Print Security Survey 2015” IDC #US40612015, September, 2015.4 Ponemon Institute, "2015 Global Cost of Cyber Crime Study," October 2015.

2

26%of all significant data breaches reported by IT managers involved

their printers3

Presenter
Presentation Notes
IT must continually protect confidential information, including employee identities and customer data, across multiple devices and environments. Digital data has huge benefits, but it is harder to secure. With expanding nodes and devices on the network—plus cloud and mobility—security risks and network vulnerabilities are a bigger problem than ever. Printers are not immune. Whether it’s a malicious cyberattack, an accidental internal breach, or regulatory and legal non-compliance, the cost of resolving a security breach can be huge. Costs can include fines or lawsuits, as well as lost business due to damaged reputation, diminished goodwill, customer turnover and acquisition costs. 32% of companies surveyed reported having experienced cybercrime in 2016.1 That is a 34% increase from the last survey in 2014. “Cybercrime has now jumped to second place as a category of economic crimes that businesses experience, behind the easier-to-detect category of asset misappropriation.” The impact is not just on those individual businesses; cyberattacks may cause significant and lasting damage to major world economies through physical or economic impacts. 64% of IT managers state their printers are likely infected with malware.2 73% of CISOs expect a major security breach within a year.3 (CISO= Chief Information Security Officer) 26.2% of survey respondents experienced a significant IT security breach that required remediation, and more than 26.1% of these incidents involved print.4 Fines, lost business, damaged reputations, and class-action lawsuits result in losses averaging $7.7 million per year.5 Notes 1 PWC Global Economic Crime Survey, 2016. 2 Ponemon Institute, “Insecurity of Network-Connected Printers,” October 2015. 3 Help Net Security, “Why enterprise security priorities don’t address the most serious threats,” July 2015. 4 26.2% of survey respondents experienced a significant IT security breach that required remediation, and more than 26.1% of these incidents involved print. IDC, “IT and Print Security Survey 2015” IDC #US40612015, September, 2015. 5 Ponemon Institute, "2015 Global Cost of Cyber Crime Study," October 2015.
Page 3: Are you concerned about printer security? You should be

Key security insights for shared printing environments

• Unsecured printers can open the entire network to a cybersecurity attack

• Users can change device settings, access data, or send scanned documents anywhere

• Too many confidential print jobs get left uncollected

• Security breaches or noncompliance can be costly, especially if customer data is compromised

• Mobile workers need to print wherever they are—without sacrificing security

• IT needs tools to manage security across the fleet more efficiently

3

Presenter
Presentation Notes
Printing and imaging has its own share of security concerns. Unsecured devices, data and documents can put your organization at risk for costly security breaches. And both users and IT need tools and processes to help them be more productive while ensuring the print environment is secure.
Page 4: Are you concerned about printer security? You should be

The risk is real

4

It’s easy for hackers to break into unsecured printers

“I probe around for a multifunction printer and see that it is configured with default passwords. Great, I am in…”

“We've compromised a number of companies usingprinters as our initial foothold. We move laterally from the printer, find Active Directory, query it with an account from the printer and bingo, we hit GOLD…”

— Peter Kim, industry-leading penetration tester, hacker, author

Presenter
Presentation Notes
Peter Kim, a respected penetration tester, says that it’s not difficult to break into a network via an unsecured printer: “I probe around for a multifunction printer and see that it is configured with default passwords. Great, I am in…” “We've compromised a number of companies using printers as our initial foothold. We move laterally from the printer, find Active Directory, query it with an account from the printer and bingo, we hit GOLD…” — Peter Kim “The Hacker Playbook 2: Practical Guide to Penetration Testing,” June 2015.
Page 5: Are you concerned about printer security? You should be

The risk is real

5

Presenter
Presentation Notes
From an article at NBC News: “DePaul University said it suspects their printers were hacked and are now taking steps to secure them from future breaches.” Hacker claims to have within minutes identified roughly 29,000 printers that were connected to the Internet and could be exploited through an open port, then automated a procedure that asked each vulnerable machine to print the hate flyer. The fliers were discovered at Princeton, Brown, Northeastern, UC Berkley, DePaul, UMass Amherst, Smith College, Mt. Holyoke, among others. http://www.antisemitismwatch.com/tag/the-washington-times/ http://nbcnews.to/1UR7W3t For Q&A: Well known measures that HP regularly promotes would have protected companies from this type of attack: HP security notice updates include instructions that would have prevented this vulnerability, specifically: Disable Port 9100 printing services and configure IPP/IPPS printing services (requires client configuration) Create an Access Control List to allow only specific network connections These updates also include links to HP’s guides to securing printers to the NIST checklist. To simplify the process, HP JetAdvantage Security Manager is our compliance software solution which automatically configures and maintains HP printer settings based upon the NIST checklist or a company’s own policy.
Page 6: Are you concerned about printer security? You should be

Today’s printers look a whole lot like PCs

6

Yet only 53% of IT managers realize printers are vulnerable to cybercrime1

© Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.© Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Firmware and software

Hardware

Network access

Email

Internet

1 Ponemon Institute, “Annual Global IT Security Benchmark Tracking Study,” March 2015.

Presenter
Presentation Notes
Security issues aren’t limited to your computers and networks. Today’s printers look a whole lot like PCs. They have many of the same hardware components as PCs, including disk drives, keyboards, and LCD control panels. This is true of firmware and software as well: printers have built-in operating systems, run executables, have DLLs, and run common protocols. Printers and MFPs are connected to the Internet and can be used to send emails. Today’s printer is a fully functioning client on the network. From the point of view of network security, printers require the same degree of protection as PCs. HP is leveraging the leading security technology in our HP PCs to make our printers even more secure. Our best-in-class features not only protect the device and the network from attack, but self-heal to keep the device running without IT intervention. Notes: 1 Ponemon Institute, “Annual Global IT Security Benchmark Tracking Study,” March 2015. “Best-in-class features” applies to HP Enterprise-class devices introduced beginning in 2015 and is based on HP review of 2016 published embedded security features of competitive in-class printers. Only HP offers a combination of security features for integrity checking down to the BIOS with self-healing capabilities. A FutureSmart service pack update may be required to activate security features. For a list of compatible products, visit: hp.com/go/PrintersThatProtect. For more information, visit: hp.com/go/printersecurityclaims.
Page 7: Are you concerned about printer security? You should be

Common imaging and printing vulnerability points

7

BIOS and firmwareCompromised firmware can open a device and network to attack

ManagementUndetected security gaps put data at risk

Control panelUsers can exploit device settings and functions

Mobile printingOn-the-go employees may expose data

Output trayAbandoned documents can fall into the wrong hands

Input traySpecial media can be tampered with or stolen

CaptureUnsecured MFPs can be used to send scans anywhere

Storage mediaPrinters store sensitiveinformation that can be at risk

NetworkJobs can be intercepted as they travel to/from a device

Ports and protocols Unsecured ports (USB or network) or protocols (FTP or Telnet) put device at risk

Presenter
Presentation Notes
[This slide has been designed to build] Although many IT departments rigorously apply security measures to individual computers and the business network, printing and imaging devices are often overlooked and left exposed. As printers become increasingly sophisticated, they offer greater opportunities for attackers to compromise the device, the data, or the entire network. Unsecured devices can be vulnerable in many ways: BIOS and firmware—Firmware that becomes compromised during startup or while running could open a device and the network to attack. Management—There are more than 250 possible security settings on an Enterprise MFP. Unless you actively manage your print environment day in and day out, you cannot be confident that all of your security risks are addressed. Something as simple as a reboot can cause your entire network to be at risk. This is why having the correct security tools is so critical, so you can both evaluate your environment and then take steps to secure it. Network—Printing and imaging jobs can be intercepted as they travel over the network to or from a device. And without proper firewalls and security certificates, printers can actually provide an entry to your network. A common problem is the “man-in-the-middle” attack, when information is rerouted to a data capture device (like a laptop, desktop, or sniffer) before it goes to the printer. For example, college students have rerouted print jobs being sent from their professor’s computer. If college students are doing this to cheat on tests, how at-risk is corporate data? Control panel—You cannot walk into a business and start using a PC without first authenticating and gaining authorization to the network. However, many MFPs are placed where anyone can access all the features like print, copy, or scan. Without proper access controls, users can exploit device settings and functions, and even disable the device. Ports and protocols—Unauthorized users can access the device or the network via unsecured ports (such as USB or network ports). Using certain protocols can put your device and data at risk—such as FTP or Telnet. Storage media—Imaging and printing devices store sensitive information on internal drives or hard disks, which can be accessed if not protected. Data should be encrypted when stored on the device. However, many legacy devices do not have encrypted storage installed or available to them. Hard disks and files should be erased regularly—but this step is often overlooked. And data should be completely eliminated before old products are recycled at end of life. Capture—MFPs can easily capture and route jobs to many destinations, potentially exposing sensitive data. Without access controls, someone could email from a company account without any way to track who it is from. Input tray—Special media for printing checks, prescriptions, and other sensitive documents can be tampered with or stolen from an unsecured tray. Output tray—The output tray is the most common place for sensitive documents—like financial statements, proprietary data, or customer information—to fall into the wrong hands. Here’s a real-life example: A nurse printed confidential medical records to the wrong printer on a different floor. The nurse then reprinted the records to the correct printer without collecting the original print job. Another nurse picked it up, then made copies and distributed the medical records to others. This privacy breach resulted in 27 nurses being suspended for one month. Mobile printing—Employees who print on the go may accidentally expose data, or leave printouts unsecured. HP has designed security features and solutions to address all of these vulnerabilities.
Page 8: Are you concerned about printer security? You should be

Printing security requires an end-to-end approach

Data DocumentDevice

Fleet security monitoring and compliance

Security services

8

Presenter
Presentation Notes
HP can help provide leading end-to-end print security through our comprehensive portfolio of printer security features, solutions, and services. Protect the device Embedded features and add-on solutions can help you defend your printers and network, and reinforce simple but effective security habits. Layers of security to provide in-depth defenses Self-healing security features to automatically detect, stop, and recover from attacks Built-in encryption to help protect sensitive business information stored on hard drives Administrative access controls Upgradeable firmware for investment protection (HP FutureSmart) Protect the data Stored or in transit, your data requires constant protection. HP security features and solutions can help ensure safe arrivals and usage. Encryption of data in transit and at rest Advanced authentication and access control (HP Access Control) Usage tracking (HP Access Control Job Accounting) Secure mobile printing solutions (HP JetAdvantage Connect, HP Access Control) Unique identity certificates Protect the document Integrate HP’s smart hardware and software solutions with your larger IT security plan to protect the sensitive information in your printed documents. Secure pull printing solutions (HP Access Control, HP JetAdvantage Secure Print, HP JetAdvantage Private Print) Locking input trays Fraud and counterfeit deterrent solutions (HP and TROY document protection) Fleet security monitoring and compliance Security monitoring and management solutions can help you identify vulnerabilities and establish a unified, policy-based approach to protecting data, strengthening compliance, and reducing risk—all while saving significant time and resources. Fleet-wide firmware updates Automated monitoring and remediation of device settings (HP JetAdvantage Security Manager) Printer event data sent to incident detection (SIEM) tools Compliance audit reporting of print fleet security Print security services You don’t have to protect and secure on your own. A support team of consultants can help you assess your current print security vulnerabilities. We can help you build a comprehensive print security policy based on business needs and best practices, and create a plan to achieve improved security within your unique environment. Notes: HP Sure Start, whitelisting, run-time intrusion detection: For a list of compatible products, see hp.com/go/PrintersThatProtect. HP Access Control must be purchased separately. To learn more, please visit hp.com/go/hpac. HP JetAdvantage Connect works with leading mobile devices. A one-time plug-in must be installed for devices running Android™, Google Chrome™, and Microsoft® operating systems. For details and a list of supported operating systems, see hp.com/go/JetAdvantageConnect. HP JetAdvantage Secure Print: Pull printing works with any network-connected printer or MFP. On-device authentication is available for many HP LaserJet, PageWide, and OfficeJet Pro devices and selected non-HP devices. Some devices may require a firmware upgrade. Internet connection required for cloud storage and retrieval of print jobs. Print-job release from a mobile device requires a network connection and QR code. For more information and a list of supported printers and MFPs, see hp.com/go/JetAdvantageSecurePrint. HP JetAdvantage Private Print is available only in North America and select European countries. Card reader is available for separate purchase for selected HP printers and MFPs with touchscreens. Learn more at hp.com/go/JetAdvantagePrivatePrint. HP JetAdvantage Security Manager must be purchased separately. To learn more, please visit hp.com/go/securitymanager.
Page 9: Are you concerned about printer security? You should be

HP JetAdvantage Security Solutions

9

Video

Presenter
Presentation Notes
Show the HP JetAdvantage Security Solutions video if you wish (video is 2 minutes, 12 seconds long). NOTE: It is very important to click “Enable Content” if you get a security warning that says, “References to external media objects have been blocked” when you open this presentation. Otherwise, you will not be able to view the video. You have 2 options: If you have Internet access during your presentation, use the You Tube link to play the video directly from this slide. You can play this video in Slide Show mode, or you can play it in the editing mode by clicking on the video frame, selecting the Playback tab, and then clicking Play. (Link shown below as well.) https://youtu.be/OELyD9HiFgI  2. If you won’t have Internet access, download the video from the Asset Hub ahead of time using the link below, then play the video separately from the presentation: https://h22189.www2.hp.com/shared/folder/r5ilqw==/asset/{5875F1EC-2EE9-42F3-ABBC-87A04E99E551}
Page 10: Are you concerned about printer security? You should be

2015+201420122008+1995+

Two decades of security innovations

Universal Print Driver Secure Encrypted Print

Secure Encrypted Web Server

JetAdvantage Security Manager

Automated deployment of device certificates

JetAdvantage Private Print

Features to automatically detect and stop an attack

Published U.S. National Institute of TechnologySecurity Checklist

Secure storage erase (embedded)

Encrypted hard disks Capability to lock down ports

10

Presenter
Presentation Notes
Protection from cyberattacks today requires a strategy that fundamentally redefines the approach to printer security. And who better to define and execute that strategy than HP? We have been delivering PC and print security innovations long before it was the hot topic it is today. Historically, our innovations have focused on protecting your device and data with features like the ability to secure ports or set physical lock-outs (as far back as the mid-90s). Then we added encryption of data in transit (in our Universal Print Driver) and at rest on the device (through encrypted hard disks). And in 2015, we rolled out embedded features in both Pro and Enterprise devices that can detect and stop an attack—automatically. Enterprise devices can even recover from an attack and self-heal, with HP Sure Start—the industry’s only self-healing BIOS—and run-time intrusion detection. HP security innovations don’t stop at the device. Our innovative pull print solutions help secure the hardcopy print. HP JetAdvantage Security Manager is still the industry’s only policy-based print security compliance tool, to streamline fleet security management. HP takes security seriously not just for ourselves but for the entire industry—we actively drive collaboration on security standards, to drive protections beyond our own products, such as taking a Board Leadership position on the “Trusted Computing Group.” Notes: “Industry’s only self-healing BIOS” applies to HP Enterprise-class devices introduced beginning in 2015 and is based on HP review of 2016 published embedded security features of competitive in-class printers. Only HP offers a combination of security features for integrity checking down to the BIOS with self-healing capabilities. A FutureSmart service pack update may be required to activate security features. For a list of compatible products, visit: see hp.com/go/PrintersThatProtect. For more information, visit: hp.com/go/printersecurityclaims. Select HP LaserJet Pro, OfficeJet Pro, and PageWide Pro devices include embedded features that can detect and stop an attack. For more information, please visit hp.com/go/PrintersThatProtect. HP JetAdvantage Security Manager must be purchased separately. To learn more, please visit hp.com/go/securitymanager. Competitive claim based on HP internal research on competitor offerings (Device Security Comparison, January 2015) and Solutions Report on HP JetAdvantage Security Manager 2.1 from Buyers Laboratory LLC, February 2015.
Page 11: Are you concerned about printer security? You should be

Protect the device

11

Page 12: Are you concerned about printer security? You should be

Embedded features and add-on solutions can help you defend your printers and network

Protect the device

HP printers are designed to help reduce risk, improve compliance, and protect your network from end to end

• Built-in encryption protects data stored on the hard drive; secure erase to safely remove sensitive information

• Secure disposal of devices at end of life removes data

• Disabled ports and protocols help prevent unauthorized access

• Administrative access controls protect device settings

• HP business printers are certified as compliant with internationally recognized security standards

• Embedded security features automatically detect and stop an attack; Enterprise devices can automatically recover

• HP FutureSmart Firmware provides investment protection

12

Presenter
Presentation Notes
Protect the device Embedded features and add-on solutions can help you defend your printers and network, and reinforce simple but effective security habits. Layers of security provide in-depth defenses, with redundancy built in for resilient devices. HP devices come with built-in encryption to help protect sensitive business information stored on hard drives. Use built-in device capabilities to securely overwrite stored data, and safely remove sensitive information. At end of device life, HP Custom Recycling Services can ensure data is eliminated from hard drives before responsibly recycling old products. Disable physical ports (such as USB or network ports) and unused protocols (such as FTP or Telnet) to prevent unauthorized access or use. Starting in Spring 2015, HP disabled FTP and Telnet by default. Enable administrative access controls, so only IT staff or other authorized personnel are allowed to set up and configure printer settings. HP business printers are certified as compliant with internationally recognized security standards, such as Common Criteria Certification (CCC) and FIPS 140. Ensure device firmware updates are code signed to confirm authenticity and integrity of the code and maintain compliance. HP Business printers, from Pro through Enterprise, can automatically detect and stop an attack. Multi-level, built-in features help protect your printer against complex security threats from boot up to shut down. Plus, HP Enterprise devices can automatically recover the device to maximize uptime while minimizing IT interventions. HP FutureSmart Firmware is upgradeable, providing investment protection and a consistent user experience across your fleet. For example, breakthrough security features like whitelisting and run-time intrusion detection can be added to existing HP devices. Notes: Select HP LaserJet Pro, OfficeJet Pro, and PageWide Pro devices include embedded features that can detect and stop an attack. Enterprise printers have embedded features that can detect, stop, and recover from an attack. A FutureSmart service pack update may be required to activate security features. For more information, and for a list of compatible products, see hp.com/go/PrintersThatProtect.
Page 13: Are you concerned about printer security? You should be

The world’s most secure printing1

HP business printers, from Pro through Enterprise, can stop attacks before they start and notify your system of potential trouble:

• During startup, the integrity of the operating code is validated

• When loading firmware, only authentic, known-good HP firmware is loaded

• During run-time, HP devices detect and prevent unexpected changes to memory

Use HP JetAdvantage Security Manager to automatically validate security settings—across the fleet—to comply with configuration policies

HP Enterprise printers offer built-in security to automatically repair themselves from attack in real time

One. Validate BIOS/boot code

Prevents the execution of malicious code during

bootup by ensuring only HP-signed,

genuine code is loaded

Two. Validate firmware

Helps ensure only authentic, known-good

HP firmware is loaded into memory

Three. Protect run-time memory

Protects operations and stops attacks while device is running

Four. Complete check cycle

HP JetAdvantage Security Manager checks and fixes any affected security settings

13

Real-time threat detection, automated monitoring, and built-in software validation

1 Based on HP review of 2016 published security features of competitive in-class printers. Only HP offers a combination of security features that can monitor to detect and automatically stop an attack then self-validate software integrity in a reboot. For a list of printers, visit: hp.com/go/PrintersThatProtect. For more information: hp.com/go/printersecurityclaims.

Presenter
Presentation Notes
Defend your network with the world’s most secure printing. Only HP print security offers real-time detection, automated monitoring and built-in software validation to stop threats the moment they start. With HP, you’re more secure on every level, so the trouble that’s out there stays out. Print security features automatically detect and stop attacks HP business printers, from Pro through Enterprise, can automatically detect and stop an attack (and notify your system of potential trouble) during all phases of operation: During start up. The boot code (for Pro devices) or BIOS (for Enterprise devices) is a set of instructions used to load fundamental hardware components and initiate firmware. The integrity of the code is validated at every boot cycle—helping to safeguard your device from attack. When loading firmware. Only authentic, known-good HP firmware—digitally signed by HP—that has not been tampered with is loaded into memory. If an anomaly is detected, the device reboots to a secure, offline state and waits for valid firmware to be loaded. During run-time. HP embedded features help protect devices while they are operational and connected to the network—right when most attacks occur. HP devices detect and prevent unexpected changes to memory. HP Enterprise devices can self-heal In addition to being able to detect and stop threats, HP Enterprise printers include security features that can automatically repair themselves from attack, to maximize uptime while minimizing IT interventions. These features automatically trigger a reboot in the event of an attack or anomaly. HP Sure Start is the industry’s only self-healing BIOS. If the BIOS is compromised, HP Sure Start forces a reboot and reloads with an embedded “golden copy.” Run-time intrusion detection monitors memory and reboots in the event of an attack. Incident data can be sent to many security monitoring systems (SIEM) such as SIEMonster, ArcSight or Splunk. With the investment protection that upgradeable FutureSmart Firmware provides, you can add some of these embedded features to selected existing Enterprise printers. Configured for security—automatically Part of good device security is making sure that your device is configured properly. The default settings on HP business printers are designed to make them more secure from the start. And HP JetAdvantage Security Manager plays a key role in keeping them secure. After a reboot occurs—or any time a new device is added to the network—HP Security Manager automatically assesses and, if necessary, remediates device security settings to comply with pre‑established configuration policies. IT managers can schedule regular Security Manager assessment/remediations, or manually launch one at any time. Ensuring proper device configuration not only helps protect your network and data, it helps you meet compliance regulations and avoid costly fines. Notes: Most secure printing: Based on HP review of 2016 published security features of competitive in-class printers. Only HP offers a combination of security features that can monitor to detect and automatically stop an attack then self-validate software integrity in a reboot. For a list of printers, visit: hp.com/go/PrintersThatProtect. For more information: hp.com/go/printersecurityclaims.  Select HP LaserJet Pro, OfficeJet Pro, and PageWide Pro devices include embedded features that can detect and stop an attack. For more information, please visit hp.com/go/PrintersThatProtect. HP JetAdvantage Security Manager must be purchased separately. To learn more, please visit hp.com/go/securitymanager.
Page 14: Are you concerned about printer security? You should be

Industry-leading features to detect and recover from an attack

14

Video – HP LaserJet and PageWide Enterprise embedded security

Presenter
Presentation Notes
Show the Embedded Security Features video if you wish (video is 51 seconds long). NOTE: It is very important to click “Enable Content” if you get a security warning that says, “References to external media objects have been blocked” when you open this presentation. Otherwise, you will not be able to view the video. You have 2 options: If you have Internet access during your presentation, use the You Tube link to play the video directly from this slide. You can play this video in Slide Show mode, or you can play it in the editing mode by clicking on the video frame, selecting the Playback tab, and then clicking Play. (Link shown below as well.) https://www.youtube.com/watch?v=5kRGj_xYjqk If you won’t have Internet access, download the video from the Asset Hub ahead of time using the link below, then play the video separately from the presentation: https://h22189.www2.hp.com/shared/folder/r5ilqw==/asset/{539A818B-2D1B-4179-9137-E67B39528873} Note: These embedded security features apply to HP PageWide and LaserJet Enterprise devices only.
Page 15: Are you concerned about printer security? You should be

Upgradeable firmware allows HP printers to get younger with age

Investment protection with HP FutureSmart Firmware

HP FutureSmart Firmware is like the operating system for your HP fleet

• Get the latest security enhancements, mobile device connectivity, or workflow features

• Equip your existing HP devices with the same features as next-generation devices1—such as whitelisting and run-time intrusion detection

• Get consistent, intuitive user controls across devices

• Upgrade HP FutureSmart over time, with service packs or major new functionality releases

• Easily push FutureSmart updates across the fleet using HP Web Jetadmin

15

1 Some features enabled by future HP FutureSmart upgrades may not be available on older devices if, for example, physical product characteristics limit the functionality of the new feature.

Presenter
Presentation Notes
HP FutureSmart upgradeable firmware is a unique and powerful operating system that enables your HP enterprise printers, MFPs, and network scanners to be more useful and productive, today and well into the future. Get the latest security enhancements, mobile device connectivity, or workflow features Equip your existing HP devices with the same features as next-generation devices1 Get consistent, intuitive user controls across devices Upgrade HP FutureSmart over time, similar to a PC’s operating system, with service packs or major new functionality releases Easily push FutureSmart updates across the fleet using HP Web Jetadmin A great example of the investment protection FutureSmart can provide is whitelisting and run-time intrusion detection. Most older HP Enterprise printers can add these features through a FutureSmart update. So you can get this breakthrough security technology on printers you already own. (For a list of printers, visit: hp.com/go/PrintersThatProtect.)  Notes: Some features enabled by future HP FutureSmart upgrades may not be available on older devices if, for example, physical product characteristics limit the functionality of the new feature. HP JetAdvantage Security Manager must be purchased separately. To learn more, please visit hp.com/go/securitymanager. HP Web Jetadmin is available for download at no additional charge at hp.com/go/webjetadmin.
Page 16: Are you concerned about printer security? You should be

Protect the data

16

Page 17: Are you concerned about printer security? You should be

Keep sensitive information secure in transit and at rest

Protect the data

Secure your confidential information to avoid costly breaches and fines

• 802.1x or IPsec network standards protect data

• Print job encryption and secure capture and route solutions protect data in transit

• Built-in encryption protects data at rest on printer hard disk; add the HP TPM accessory to strengthen protection

• Firewall settings and digital certificates protect the network

• Authentication solutions and role-based controls prevent unauthorized access to devices, functions, and data

• Data tracking/reporting solutions

• Mobile printing solutions

17

Presenter
Presentation Notes
Protect the data Stored or in transit, your data requires constant protection. HP security features and solutions can help ensure safe arrivals and usage. Protect your network and data by using a variety of encryption options to secure communication to and from the device, making files nearly impossible to read if intercepted: Utilize 802.1x or IPsec network standards to protect data traveling over the network between the device and management tools such as HP Web Jetadmin or the Embedded Web Server. HP Universal Print Driver Secure Encrypted Print provides true symmetric AES256 print job encryption and decryption from the client to the page based on a user-defined password using FIPS 140 validated cryptographic libraries from Microsoft®. You can also encrypt print job data using Internet Print Protocol over TLS (IPPS). When scanning, HP JetAdvantage Workflow Solutions can help protect sensitive information while increasing efficiency. For example, HP Capture and Route integrates seamlessly with HP Access Control for enhanced security, with the convenience of single authentication and the ability to monitor content for information governance. HP devices come with built-in encryption to help protect sensitive business information stored on printer hard drives. The optional HP Trusted Platform Module (TPM) accessory can be added to the device to strengthen protection of encrypted credentials and data by automatically sealing device encryption keys to the TPM. It provides secure device identity by generating and protecting certificate private keys. Properly configured firewall settings can help prevent malware and viruses from entering your network by limiting printer access to computing devices in network. Unique device identity certificates can help protect your network. They are used to prove identity and encrypt data, enabling secure communication between trustworthy entities. HP JetAdvantage Security Manager provides efficient fleet management of unique identity certificates. Require authentication at the device to protect sensitive data: Require users to sign in using native authentication, including PIN, LDAP, or Kerberos authentication. You can integrate these with Active Directory. Advanced authentication can include passwords, proximity cards, or smart cards for additional security and control. HP Access Control Secure Authentication offers advanced controls and options, including touch-to-authenticate with NFC-enabled mobile devices. HP offers additional authentication solutions such as HP SmartCard Solutions for US Government or biometric solutions. HP Access Control Rights Management provides role-based access controls, allowing you to give different capabilities to different users, or even entire departments, depending on their needs. For example, you can limit who can fax, scan to email, or scan to fax. HP Access Control Job Accounting can track all printing activities—including from mobile—and help ensure compliance to corporate security standards. Mobile printing Help employees stay productive with effortless HP mobile printing from their smartphones, tablets, and notebooks—while maintaining security policies and managing printer access. With HP’s wireless direct printing or NFC touch-to-print, employees can print from their mobile devices without connecting to your network, using a secure peer-to-peer connection. HP offers fleet-wide, server-based mobile printing solutions that provide secure pull printing, as well as advanced management and reporting capabilities: HP JetAdvantage Connect offers intuitive, reliable mobile printing designed for business. Help save time and money by seamlessly leveraging existing IT network tools and policies to manage mobile printing. Users can securely print from a variety of smartphones and tablets—where and when they need to—with similar ease of printing as from a PC. HP Access Control includes capabilities to manage mobile printing. It leverages existing email infrastructure, allowing mobile users to email a print job to their print queue, and then pull it from any solution-enabled printer or MFP. Protect network print devices with secure authentication features, including Mobile Release. Notes: HP Access Control must be purchased separately. To learn more, please visit hp.com/go/hpac. For more information about HP JetAdvantage Workflow Solutions, please visit hp.com/go/documentmanagement. HP JetAdvantage Connect works with leading mobile devices. A one-time plug-in must be installed for devices running Android™, Google Chrome™, and Microsoft® operating systems. For details and a list of supported operating systems, see hp.com/go/JetAdvantageConnect.
Page 18: Are you concerned about printer security? You should be

Restore control and reinforce security

HP Access Control Secure Authentication

• Limit device access to help keep data secure

• Control access to device functions to reduce waste and risk

• Encrypt documents to protect confidential information

• Facilitate access to devices for mobile workers, wherever they are

18

Windows login, alpha-numeric and PIN codes

HP AC Proximity Card Readers

Mobile devices:• NFC touch-to-

authenticate• Mobile Release

Users must authenticate prior to accessing device functions

Presenter
Presentation Notes
HP Access Control Secure Authentication Protect your network print devices with robust authentication features that integrate with your existing network credentials (i.e., LDAP, Active Directory). Increase data and document security by requiring user authentication prior to printing, copying, emailing, or scanning at the device. How it works: Embedded authentication locks the device Proximity badges, PIN, or PIC (alphanumeric) codes authenticate the user and unlock the device MFPs feature built-in authentication with LDAP, Kerberos, or Active Directory Proximity badge readers can be attached externally or placed in the Hardware Integration Pocket (HIP) of supported devices If proximity badges are used, self-enrollment simplifies authentication, deployment, and management Users can authenticate using their mobile device with Mobile Release or NFC touch-to-authenticate. Walk up to the device and print with a touch of your NFC‑enabled smartphone or tablet. Get the security and convenience of pull printing without the cost of a proximity card system. (Touch-to-authenticate capability is standard on select devices or added with the purchase of the optional HP Jetdirect 3000w NFC/wireless accessory. Mobile device must support near-field communications (NFC)-enabled printing. For more information, see hp.com/go/mobileprinting.) Notes: HP Access Control must be purchased separately. To learn more, please visit hp.com/go/hpac.
Page 19: Are you concerned about printer security? You should be

HP Access Control Intelligent Rights ManagementControl feature level access

Rules applied to print server

Establish user access guidelines and monitor MFP activity

MFP control panel reflects only specific user’s capabilities

• Administrator assigns access codes and level of access to all users using the AD

• Users authenticate and are only shown the applications they are eligible for on the control panel, thus limiting unrestricted access to all features

Presenter
Presentation Notes
How Intelligent Right Management (IRM) works Administrator assigns access codes to all users Existing Active Directory can be used to simplify enrollment Administrator assigns level of access to each user Access levels can vary, for example, some users may have access to all the device functions while others are limited to printing Users enter alpha-numeric code to access device Code is entered using the keypad on the front panel of the MFP Solution pre-populates “sent by” screen on all outgoing fax and email Notes: HP Access Control must be purchased separately. To learn more, please visit hp.com/go/hpac.
Page 20: Are you concerned about printer security? You should be

Collect and analyze data to enable effective fleet management

HP Access Control Job Accounting

• Capture printing volumes to understand, reduce, and share printing costs

• Enable bill-back to users, departments

• Set printing quotas to control costs and reduce waste

• Use accurate data as the basis for meaningful plans/projections

20

Create and send reports

Accurately gather data

Track detailed usage and analyze the results

Presenter
Presentation Notes
HP Access Control Job Accounting makes it easy to accurately track and gather data, analyze the results, and then create and send reports. Apply mined data to allocate print costs, motivate employees to print smarter, and provide IT with the necessary information to improve fleet-wide forecasts. How it works: HP Access Control Job Accounting helps you gain control of your printing environment and costs. Monitor, allocate, and manage resources by tracking usage by device (HP or non-HP), user, project, department, and cost center. Collect data and analyze the results to identify saving opportunities. Create and send reports communicating the value and impact of printing and help contain costs by establishing print quotas. Streamline imaging and printing practices by ensuring the right device is in the right place and used for the right job. Notes: HP Access Control must be purchased separately. To learn more, please visit hp.com/go/hpac.
Page 21: Are you concerned about printer security? You should be

Simple and secure mobile printing to company networked printers

HP JetAdvantage Connect

• Leverage existing IT tools to manage printing from mobile devices

• Give end users easy, intuitive printing from mobile devices, with minimal to no setup

• Enable integration with HP Access Control Secure Pull Printing

• Maintain network security by providing multiple ways to help users securely cross the firewall with their mobile device

• Mobile users use same process to authenticate before printing as from their PC

21

Trackingpolicies

Connectivity

Discovery

Pull print

Presenter
Presentation Notes
HP JetAdvantage Connect is designed to meet increasing demand for a simpler way for IT to manage mobile printing, with an easy and more intuitive way for end users to print. Native print: Empower users to print from leading mobile devices with quick and easy printing to network printers without print drivers or apps. Native printing lets users print directly from core business applications, using the built-in print capabilities of the mobile operating system. Users can print from a mobile device as easily as they do from a PC—so printing is fast and seamless. Easier for IT: Implement and manage mobile printing using existing tools. HP JetAdvantage Connect helps you save time and money—no need to duplicate print-management, policy-setting, or job-accounting tools. Reduce network traffic for mobile printing. HP JetAdvantage Connect enables rendering of print jobs on mobile devices rather than print servers, minimizing the number of servers—and the bandwidth—needed to process those jobs. Secure print: Works with HP Access Control to help make printing from mobile devices easier and more secure. Enable native printing to a secure queue. Enabling users to release mobile print jobs at the device helps keep sensitive documents secure. How does HP JetAdvantage Connect work? Print from native app, for simple in-OS printing for end users Converged connectivity to cross the firewall in a secure, integrated way Link to existing discovery service, with easy integration to desktop print management tools Get print instructions from policy service, with easy integration to desktop print policy tools Track mobile printing, with easy integration to desktop tracking and billing tools Notes: HP JetAdvantage Connect works with leading mobile devices. A one-time plug-in must be installed for devices running Android™, Google Chrome™, and Microsoft® operating systems. For details and a list of supported operating systems, see hp.com/go/JetAdvantageConnect.
Page 22: Are you concerned about printer security? You should be

Protect the document

22

Page 23: Are you concerned about printer security? You should be

Protect sensitive information and media, reduce unclaimed print jobs, and improve efficiency

Protect the document

HP solutions help boost productivity and keep abandoned documents from falling into the wrong hands

• HP pull print solutions help you reduce unclaimed print jobs, protect confidential documents, and improve efficiency

• Locking input trays prevent theft of sensitive paper such as prescription or check stock

• HP counterfeit deterrent solutions can help prevent copying or modification

23

Presenter
Presentation Notes
Document security Integrate HP’s smart hardware and software solutions with your larger IT security plan to protect the sensitive information in your printed documents. Pull printing stores print jobs on a protected server, in the cloud, or on your PC. Users authenticate at their chosen print location to pull and print their jobs. These security measures also eliminate unclaimed prints, which can reduce cost and waste. You can either make pull printing optional when users need to print sensitive documents, or require pull printing for all print jobs for additional control. HP has a range of pull print solutions to match your budget and business requirements: HP Access Control Secure Pull Printing—This robust server-based solution offers multiple forms of authentication including badge release, as well as enterprise level security and management features, job accounting, and scalability. HP JetAdvantage Secure Print—With this affordable cloud-based solution, designed for SMB, jobs can be stored in the cloud or on the user’s desktop. It’s easy to set up and use, allows users to release jobs from a mobile device, and supports multivendor devices. HP JetAdvantage Private Print—This cloud-based solution gives you the advantages of pull print, without the complexity, at no additional cost. It is simple to set up and does not require a server, installation, or maintenance. Equip your printers and MFPs with locking input trays to prevent theft of special paper used for printing checks, prescriptions, or other sensitive documents. Counterfeit deterrent solutions, such as HP and TROY document protection, include using security toner that stains the paper if subjected to chemical tampering, adding variable data watermarks to printed pages, and incorporating machine-readable codes that track and audit individual documents. Multifunction printers can embed anti-fraud features—including custom signatures, company logos, and security fonts—in sensitive printed documents such as prescriptions, birth certificates, or transcripts. Notes: HP Access Control must be purchased separately. To learn more, please visit hp.com/go/hpac. HP JetAdvantage Secure Print: Pull printing works with any network-connected printer or MFP. On-device authentication is available for many HP LaserJet, PageWide, and OfficeJet Pro devices and selected non-HP devices. Some devices may require a firmware upgrade. Internet connection required for cloud storage and retrieval of print jobs. Print-job release from a mobile device requires a network connection and QR code. For more information and a list of supported printers and MFPs, see hp.com/go/JetAdvantageSecurePrint. HP JetAdvantage Private Print is available only in North America and select European countries. Card reader is available for separate purchase for selected HP printers and MFPs with touchscreens. Learn more at hp.com/go/JetAdvantagePrivatePrint.
Page 24: Are you concerned about printer security? You should be

Restrict access to devices, protect documents, and reduce risk

HP Access Control Secure Pull Printing

• Allow users to print to enabled networked devices for greater productivity

• Facilitate access to devices for mobile workers, wherever they are

• Help reduce cost and waste by eliminating unclaimed prints

• Store print jobs on a protected server or on your PC

• Support a wide variety of authentication methods, including mobile release

24

Users send confidential documents to be printed

Documents stored on secure server hard drive

Users authenticate at selected device to release the document

Secure Pull Printing with print server(can also be deployed without a print server)

Presenter
Presentation Notes
Restore control, reinforce security, and reduce costs using HP Access Control Secure Pull Printing. Pull printing stores print jobs on a protected server or on your PC. Users identify themselves with a PIN or other verification method at their chosen print location to pull and print their jobs. These security measures also eliminate unclaimed prints, which can reduce cost and waste. How Secure Pull Printing works With print server: User sends encrypted print job to a generic queue on the server Job is held on the server User selects the delivery device from among the enabled printers and MFPs on the network Without a print server: User sends encrypted print job Print data is stored on the client hard drive until the job is released User selects the delivery device from among the enabled printers and MFPs on the network Embedded authentication locks the device: Proximity badges, PIN, or PIC (alphanumeric) codes authenticate the user and unlock the device MFPs feature built-in authentication with LDAP, Kerberos, or Active Directory Proximity badge readers can be attached externally or placed in the Hardware Integration Pocket (HIP) of supported devices If proximity badges are used, self-enrollment simplifies authentication, deployment, and management Or authenticate using your mobile device with Mobile Release or NFC touch-to-authenticate. Walk up to the device and print with a touch of your NFC‑enabled smartphone or tablet. Get the security and convenience of pull printing without the cost of a proximity card system. (Touch-to-authenticate capability is standard on select devices or added with the purchase of the optional HP Jetdirect 3000w NFC/wireless accessory. Mobile device must support near-field communications (NFC)-enabled printing. For more information, see hp.com/go/mobileprinting.) Notes: HP Access Control must be purchased separately. To learn more, please visit hp.com/go/hpac.
Page 25: Are you concerned about printer security? You should be

A major financial services customer needed to better secure their print environment, simplify the end user experience and reduce the infrastructure required for printing.

HP Access Control solutions at work: use case

Servers7

10,000+print queues?

Before HP Access Control

Security concerns• Unclaimed documents

• Documents not encrypted

• Wasted output/wasted click charge

1 print queue

Improved security• Eliminated unclaimed jobs

• Documents encrypted in transit and at rest

• Click charge/cost savings

After HP Access Control

2Servers

25

Presenter
Presentation Notes
[This slide has been designed to build] Here is an example of how HP Access Control solutions can help strengthen security, while saving resources and time. Before HP Access Control, the organization had more than 10,000 print queues and 7 servers: Daily effort to maintain server based queues Complex mapping/location requirements for IT Potential for additional queue proliferation Driver version conflicts Challenging for users, especially mobile workers Unclaimed documents put sensitive information at risk—and resulted in wasted paper and costs After deploying HP Access Control Secure Authentication, Secure Pull Printing, Rights Management, and Job Accounting, the organization had just one print queue and 2 servers: Ease of queue management Release at any enabled device, no mapping required 1 global queue 1 global driver with global settings Simplified user experience with 1 repeatable print experience, roaming enabled for all sites High availability of servers Scalable infrastructure to meet changing business demands By eliminating unclaimed print jobs and adding document encryption, sensitive data is protected while costs go down Notes: HP Access Control must be purchased separately. To learn more, please visit hp.com/go/hpac.
Page 26: Are you concerned about printer security? You should be

A convenient, cost-effective, more secure way to print

HP JetAdvantage Secure Print

• Increase security and control by releasing documents only to authorized users

• Store print jobs on user desktop or in secure cloud

• Print documents from any enabled device, including non-HP devices

• Simplify device discovery and enable app on mobile devices

• Cut costs, reduce waste and increase productivity

• Eliminate dedicated on-site servers, storage, and software

26

User authenticates (QR code, AD/LDAP, proximity badge) and releases the job

User sends print job to print queue (client and/or cloud) via pull print driver

HP JetAdvantageSecure Print

Presenter
Presentation Notes
HP JetAdvantage Secure Print is a pull printing solution that increases security and control of your print environment by releasing documents only to authorized users. The solution is deployed from the cloud but IT has the option to determine if print jobs are held in cloud-queue (by default they are held on client’s computer). The solution also helps cut costs by reducing waste and increasing productivity—without the need for dedicated onsite servers, storage, and software. It’s easy to set up and use, and supports multivendor devices. Maintain print job confidentiality User authentication at the device helps get the right documents in the right hands. Protect print jobs in the queue and in transit—with 256-bit Advanced Encryption Standard (AES) technology. Reduce time and complexity associated with logins and lengthy passwords by using the HP Proximity Card Reader. (HP Proximity Card Reader (CZ208a) is available for separate purchase for select HP devices with HIP or host-USB port and touchscreen.) Unreleased print jobs that don’t get printed will be deleted automatically, which is another security benefit.   Take advantage of cost and paper savings Save money with an intuitive virtual print queue for HP printers and MFPs—this avoids additional onsite server, software, and storage investments. Users authenticate and release only the jobs they need while at the device. That saves time and curbs paper waste from abandoned or misplaced print jobs. Keep other users from accidentally printing onto expensive specialty media loaded for a specific job, such as checks or labels.   Keep business moving With HP JetAdvantage Secure Print, users can print and retrieve documents from the nearest printer or MFP—even non-HP devices. Users can release print jobs by simply scanning a QR on the printer or MFP with their iOS or Android mobile device. NOTE: HP JetAdvantage On Demand is the platform where IT administers this application and others. Gain control with an intuitive interface Manage Secure Print capabilities and user access from one centralized dashboard. Take charge of printing activities across the organization. When used in conjunction with HP JetAdvantage Insights, IT can monitor usage, collect data, and analyze the results to help encourage more responsible printer use, including duplex printing, color printer access, and more. Quick and intuitive installation and configuration, including automatic updates, gets you up and running faster. How HP JetAdvantage Secure Print works: User sends encrypted print job to a generic queue on the server Job is held on the server (or it can be held at the user PC) User selects the delivery device from among the enabled printers and MFPs on the network Embedded authentication locks the device Proximity badges, PIN, or PIC (alphanumeric) codes authenticate the user and unlock the device MFPs feature built-in authentication with LDAP, Kerberos, or Active Directory Proximity badge readers can be attached externally or placed in the Hardware Integration Pocket (HIP) of supported devices If proximity badges are used, self-enrollment simplifies authentication, deployment, and management Or authenticate using your mobile device with Mobile Release or NFC touch-to-authenticate. Walk up to the device and print with a touch of your NFC‑enabled smartphone or tablet. Get the security and convenience of pull printing without the cost of a proximity card system. (Touch-to-authenticate capability is standard on select devices or added with the purchase of the optional HP Jetdirect 3000w NFC/wireless accessory. Mobile device must support near-field communications (NFC)-enabled printing. For more information, see hp.com/go/mobileprinting.) Notes HP JetAdvantage Secure Print works with any network-connected printer or MFP. On-device authentication is available for many HP LaserJet, PageWide, and OfficeJet Pro devices. Some devices may require a firmware upgrade. Internet connection required for cloud storage and retrieval of print jobs. Print-job release from a mobile device requires a network connection and QR code. For more information, see hp.com/go/JetAdvantageSecurePrint. HP JetAdvantage Insights is a web-based application that requires Internet access. Supported browsers include recent versions of Microsoft® Internet Explorer®, Google ChromeTM, Mozilla® Firefox®, and Safari®. Learn more about HP JetAdvantage Insights at hp.com/go/JetAdvantageInsights.
Page 27: Are you concerned about printer security? You should be

HP JetAdvantage Private Print1

• Increase security and control by releasing documents only to authorized users

• Give users the flexibility to pick up documents from any enabled device

• Cut costs, reduce waste and increase productivity

• Comes bundled with HP LaserJet and OfficeJet devices2

• No need for additional on-site servers, storage, and software1

27

1 HP JetAdvantage Private Print is available only in North America and select European countries. Card reader is available for separate purchase for selected HP printers and MFPs with touchscreens. Learn more at hp.com/go/JetAdvantagePrivatePrint.2 Supported on devices with touchscreens.

Print when you want

Pick up where you want

Print jobs encrypted in transit and at rest

A practical, cost-effective, cloud-based pull printing solution for SMB

Presenter
Presentation Notes
HP JetAdvantage Private Print is a cloud-based solution that increases security and control of your print environment by releasing documents only to authorized users. The solution also helps cut costs by reducing waste and increasing productivity—without the need for additional on-site servers, storage, and software.1 Maintain print job confidentiality User authentication at the device helps get the right documents in the right hands. Protect print jobs in the queue and in transit—with 256-bit Advanced Encryption Standard (AES) technology. Reduce time and complexity associated with logins and lengthy passwords by using the HP Proximity Card Reader. (HP Proximity Card Reader (CZ208a) is available for separate purchase for select HP devices with HIP or host-USB port and touchscreen.) Unreleased print jobs that don’t get printed will be deleted automatically, which is another security benefit.   Take advantage of cost and paper savings Save money with an intuitive virtual print queue for HP printers and MFPs—this avoids additional on-site server, software, and storage investments. Users authenticate and release only the jobs they need while at the device. That saves time and curbs paper waste from abandoned or misplaced print jobs. Keep other users from accidentally printing onto expensive specialty media loaded for a specific job, such as checks or labels.   Keep business moving With HP JetAdvantage Private Print, users can print and retrieve documents from the nearest HP printer or MFP.2 Users can view and delete jobs, virtually anywhere, using their PC, iOS or Android mobile device, or supported HP printer or MFP. NOTE: HP JetAdvantage On Demand has been designed to support future print apps in addition to JetAdvantage Private Print.   Gain control with an intuitive interface Manage private-printing capabilities and user access from one centralized dashboard. Take charge of private-printing activities across the organization: Monitor usage, collect data, and analyze the results to help encourage more responsible printer use, including duplex printing, color printer access, and more. Quick and intuitive installation and configuration, including automatic updates, gets you up and running faster. How HP JetAdvantage Private Print works: Users send print jobs from computers anywhere in the organization: Mac or PC, desktop or laptop, or even mobile device (iOS or Android app required). Print jobs are secured in transit and at rest with 256-bit AES encryption. The cloud-based print queue keeps data and information safe. Users can view or delete these jobs via mobile or desktop device, or at the HP printer or MFP. Users print wherever they want, to any supported device—even outside the firewall. The job is printed only after the user is authenticated at the device touchscreen (via PIN or password)—or simplify the authentication process with the HP Proximity Card Reader (enterprise only devices). Notes 1 HP JetAdvantage Private Print is available only in North America and select European countries. Card reader is available for separate purchase for selected HP printers and MFPs with touchscreens. Learn more at hp.com/go/JetAdvantagePrivatePrint. 2 Supported on devices with touchscreens.
Page 28: Are you concerned about printer security? You should be

HP JetAdvantage Private Print

28

Video

Presenter
Presentation Notes
Show the HP JetAdvantage Private Print video if you wish (video is 30 seconds long). NOTE: It is very important to click “Enable Content” if you get a security warning that says, “References to external media objects have been blocked” when you open this presentation. Otherwise, you will not be able to view the video. You have 2 options: If you have Internet access during your presentation, use the You Tube link to play the video directly from this slide. You can play this video in Slide Show mode, or you can play it in the editing mode by clicking on the video frame, selecting the Playback tab, and then clicking Play. (Link shown below as well.) http://youtu.be/J2jCRGxd9P4 2. If you won’t have Internet access, download the video from the Asset Hub ahead of time using the link below, then play the video separately from the presentation: https://h22189.www2.hp.com/shared/folder/r5ilqw==/asset/{47FCCC1E-C312-4763-B3EA-8B95CE951EE2}
Page 29: Are you concerned about printer security? You should be

Comparing HP pull print solutions

29

HP provides a variety of pull print solutions to meet different customer needs

Features HP Access Control Secure Pull Printing HP JetAdvantage Secure Print HP JetAdvantage Private Print

Where are print jobs held?

• On premise server• Serverless printing

• User’s client (on premise)• Cloud queue

• Cloud queue

Devices supported

• HP printers and MFPs• Select non-HP (Canon, Xerox)

• HP printers and MFPs• Non-HP printers and MFPs

• Select HP printers and MFPs

Authentication • Compatible with badge reader• Compatible with LDAP/AD• Touch-to-authenticate (NFC)• Dual-factor authentication

• Compatible with badge reader• Compatible with LDAP/AD

• Compatible with badge reader

Mobile experience

• Submit and release via mobile app • Release jobs via mobile app (QR code)

• Submit jobs via mobile app

Reports and analytics

• Track detailed usage of devices and supplies

• Allocate print costs to departments

• Basic usage and unclaimed prints• Integration with HP JetAdvantage

Insights for advanced print analytics

• Not available

Cost • Upfront perpetual software license plus annual maintenance and support

• Annual subscription with bundled maintenance and support

• Bundled with select HP printers and MFPs at no additional cost

Presenter
Presentation Notes
Benefits of pull printing: Increase security and control by releasing documents only to authorized users Help reduce costs by eliminating unclaimed prints Help reduce waste caused by accidentally printing on specialty media HP provides a variety of pull print solutions to meet different customer needs: HP Access Control Secure Pull Printing—Protect confidential information, enhance device security, and increase efficiency. This robust server-based solution offers multiple forms of authentication including badge release, as well as enterprise level security and management features. HP JetAdvantage Secure Print—With this affordable solution designed for SMB, jobs can be stored in the cloud or on the user’s desktop. It’s easy to set up and use, allows users to release jobs from a mobile device, and supports multi-vendor devices. HP JetAdvantage Private Print—With HP’s cloud-based solution you get the advantages of pull print, without the complexity, at no additional cost. It is simple to set up and does not require a server, installation, or maintenance. Notes: HP Access Control must be purchased separately. To learn more, please visit hp.com/go/hpac. HP JetAdvantage Secure Print: Pull printing works with any network-connected printer or MFP. On-device authentication is available for many HP LaserJet, PageWide, and OfficeJet Pro devices and selected non-HP devices. Some devices may require a firmware upgrade. Internet connection required for cloud storage and retrieval of print jobs. Print-job release from a mobile device requires a network connection and QR code. For more information and a list of supported printers and MFPs, see hp.com/go/JetAdvantageSecurePrint. HP JetAdvantage Private Print is available only in North America and select European countries. Card reader is available for separate purchase for selected HP printers and MFPs with touchscreens. Learn more at hp.com/go/JetAdvantagePrivatePrint. HP JetAdvantage Insights is a web-based application that requires Internet access. Supported browsers include recent versions of Microsoft® Internet Explorer®, Google ChromeTM, Mozilla® Firefox®, and Safari®. Learn more about HP JetAdvantage Insights at hp.com/go/JetAdvantageInsights.
Page 30: Are you concerned about printer security? You should be

Fleet security monitoring and compliance

30

Page 31: Are you concerned about printer security? You should be

Automate device, data, and document protections

Fleet security monitoring and compliance

Help protect your network, achieve compliance, and reduce the time and effort to maintain protections

• Fleet management tools can push firmware updates to devices across the fleet

• HP JetAdvantage Security Manager makes it easy to manage security and compliance across the fleet—including auto-configuration of new print devices1

• Printer security event logs track incidents

• Send printer event data to incident detection (SIEM) tools

• Get compliance audit reporting of print fleet security

31

1 HP JetAdvantage Security Manager must be purchased separately. To learn more, please visit hp.com/go/securitymanager.

Presenter
Presentation Notes
Fleet security monitoring and compliance With so many security settings to track, IT can easily feel overwhelmed. Security monitoring and management solutions can help you identify vulnerabilities and establish a unified, policy-based approach to protecting data, strengthening compliance, and reducing risk—all while saving significant time and resources. Use HP Web Jetadmin to push firmware updates across the fleet, ensuring devices are up to date with the latest device protection and security features. HP JetAdvantage Security Manager is the industry’s only policy-based print security compliance tool. Reduce cost and resources to maintain fleet security by using automated monitoring and remediation. HP Instant-on Security automatically configures new devices added to the network—or devices that have been rebooted due to HP Sure Start or run-time intrusion detection. HP Security Manager also provides efficient fleet management of unique identify certificates. HP devices generate printer event syslog messages so IT can regularly review printer security event logs and correct problems if necessary. Send printer event data to incident detection (SIEM) tools such as SIEMonster, ArcSight, or Splunk for real-time monitoring and documentation of HP FutureSmart devices. IT security can easily view printer endpoints as part of the broader IT ecosystem to detect and resolve printer security alerts. Prove compliance and avoid costly fines with audit reporting of print fleet security. HP JetAdvantage Security Manager can provide proof-of-compliance reports to help you demonstrate application of security polices to printers and securing of customer data. Notes: The industry’s only policy-based print security compliance tool: Based on HP internal research on competitor offerings (Device Security Comparison, January 2015) and Solutions Report on HP JetAdvantage Security Manager 2.1 from Buyers Laboratory LLC, February 2015. HP JetAdvantage Security Manager must be purchased separately. To learn more, please visit hp.com/go/securitymanager. HP Web Jetadmin is available for download at no additional charge at hp.com/go/webjetadmin.
Page 32: Are you concerned about printer security? You should be

Endpoint security compliance requirements

32

Example

External audit Regulation

Compliance

Agencies must develop, implement and maintain tools and procedures covering the detection of potential cyber security incidents, incorporating:

• counter-measures against malicious code

• intrusion detection strategies

• audit analysis

• system integrity checking

• vulnerability assessments

Presenter
Presentation Notes
Regulatory and legal noncompliance are resulting in heavy costs for global organizations. Fines, lost business, damaged reputations, and class-action lawsuits result in losses averaging $7.7 million per year.1 Many best practice sources, including industry standards, outline common requirements to the securing of networks and endpoint devices. Here are some examples of key controls: Agencies must develop, implement and maintain tools and procedures covering the detection of potential cybersecurity incidents, incorporating: Counter-measures against malicious code (such as anti-virus software or BIOS level protections) Intrusion detection strategies (the best solutions will be real-time and self-healing) Audit analysis (central monitoring with a SIEM tool of the network and all end points) System integrity checking (frequent software checks to ensure core systems are operating on uncompromised code) Vulnerability assessments (such as checking device configurations against a set security profile) The compliance requirements to these standards are growing every day, including legislative actions like the EU initiative and new Canada regulations that require companies to track and report breaches. (Similar regulations are already in effect in the U.S.) Regulators are driving the requirements… audit firms are highlighting the vulnerabilities… and you need a partner to help achieve compliance. HP device features, software solutions, and services can help your company meet compliance requirements and protect your business information from cybersecurity threats. Notes: 1 Ponemon Institute, "2015 Global Cost of Cyber Crime Study," October 2015.
Page 33: Are you concerned about printer security? You should be

The industry’s only policy-based print security compliance tool1

HP JetAdvantage Security Manager

• Increase security across your fleet

• Strengthen compliance to corporate security policies

• Reduce risk of costly security breaches

• Streamline security management by automating many processes

• Get efficient fleet management of device certificates

• Secure new devices immediately with Instant-on Security

33

Secure your fleet of HP devices with the solution Buyers Laboratory, LLC calls “trailblazing”

1 Based on HP internal research on competitor offerings (Device Security Comparison, January 2015) and Solutions Report on HP JetAdvantage Security Manager 2.1 from Buyers Laboratory LLC, February 2015. HP JetAdvantage Security Manager must be purchased separately. To learn more, please visit hp.com/go/securitymanager.

Presenter
Presentation Notes
HP JetAdvantage Security Manager is the industry’s only policy-based print security compliance tool. It provides automated security monitoring of device security settings. It helps you increase security, strengthen compliance, and reduce risk across your printing and imaging fleet. It saves IT time by automating many processes. HP Security Manager offers a simple, intuitive process to establish secure settings across your fleet of printers, and automatically secures new devices as soon as they are added to your network. With over 250 settings on an Enterprise MFP, this process can save IT thousands of hours. HP Security Manager also provides efficient fleet management of unique identity certificates. The “Instant-On” feature of HP JetAdvantage Security Manager also checks and, if necessary, resets the device settings during a reboot—adding to the auto-recovery from an attack discovered by run-time intrusion detection or HP Sure Start. HP Security Manager delivers the most comprehensive print security in the market. When deployed with our Enterprise printers, our print security embedded technologies and software solutions materially “harden” our printers against known attacks. We can confidently say that we offer the most secure printers you can buy today. And, everything works together seamlessly to not only protect the network, but also make it easy for IT to administer. Buyers Laboratory (BLI) called HP JetAdvantage Security Manager “trailblazing” and gave it 5 Stars. Notes: The industry’s only policy-based print security compliance tool: Based on HP internal research on competitor offerings (Device Security Comparison, January 2015) and Solutions Report on HP JetAdvantage Security Manager 2.1 from Buyers Laboratory LLC, February 2015. HP JetAdvantage Security Manager must be purchased separately. To learn more, please visit hp.com/go/securitymanager. “Most secure printers” claim applies to HP Enterprise-class devices introduced beginning in 2015 and is based on HP review of 2016 published embedded security features of competitive in-class printers. Only HP offers a combination of security features for integrity checking down to the BIOS with self-healing capabilities. A FutureSmart service pack update may be required to activate security features. For a list of compatible products, visit: hp.com/go/PrintersThatProtect. For more information, visit: hp.com/go/printersecurityclaims. BLI 5-Star award: Solutions Report on HP JetAdvantage Security Manager 2.1 from Buyers Laboratory LLC, February 2015.
Page 34: Are you concerned about printer security? You should be

HP JetAdvantage Security Manager

34

A simple, intuitive, and efficient process for securing your fleet

HP Security Manager makes it easy to monitor and protect your entire fleet

HP JetAdvantage Security Manager

Create/review policy

Add devices

Assess devices

Remediate devices

Review results

Renew certificates

Presenter
Presentation Notes
HP JetAdvantage Security Manager makes it easy to monitor and protect your entire fleet. Easily create a print security policy by leveraging the HP Security Manager Base Policy template. Use HP Instant-on Security to secure new HP devices as soon as they are added to your network. The software automatically configures settings to comply with your corporate security policy. Configure HP Security Manager to automatically assess devices on a regular schedule, or launch an assessment at any time. The solution automatically remediates any settings that are out of compliance so all devices are compliant with your security policy. Another benefit is automatic fleet management of device certificates. The administrative overhead to install unique identity certificates across your fleet of HP devices is now less than manually installing on a single device. Actively maintain and verify compliance with your defined security policies by using HP Security Manager automated monitoring and risk-based reporting. Notes: HP JetAdvantage Security Manager must be purchased separately. To learn more, please visit hp.com/go/securitymanager.
Page 35: Are you concerned about printer security? You should be

35

Types of policy settings250+ security settings available in HP enterprise MFPs

Device control

Credentials

Network Services Device

discovery

Printing

Authentication

Authentication services

Email

Command load and execute

Direct connect ports

Fax speed dial lock

I/O timeout

802.1x Authentication

LDAP Server Authentication

File erase mode

File system access protocols

Control panel lock

FTP Firmware Update

Novell remote configuration Telnet

Remote Firmware

upgrade

PJL password

Device PIN presence

File system password Fax PIN

SNMPv1/v2 SNMPv3

Admin (EWS) password

Bootloader password presence

Public username

Secondary email authentication

Credential type

Allow return email address

change

Restrict Addresses

User authentication

Walk-up authentication

Job storage authentication

Send to e-mail authentication

Job creation authentication

Send to folder authentication

Copy authentication Send to fax authentication

Service Location Protocol (SLP) Web Services

Discovery (WS-Discovery)Bonjour

Link-Local Multicast Name Resolution Protocol

Maximum attachment size

TCP/IP Printing (P9100)

File Transfer Protocol

Internet Printing Protocol

Novell (IPX/SPX)

Presenter
Presentation Notes
HP Enterprise MFPs have over 250 security settings. Ensuring that each setting is in compliance, on every device in the fleet, can consume thousands of hours. Errors or missed settings can expose the organization to risk. This may look like an overwhelming number of settings to manage. That's why HP offers Security Manager—to simplify and automate these settings. Notes: HP JetAdvantage Security Manager must be purchased separately. To learn more, please visit hp.com/go/securitymanager.
Page 36: Are you concerned about printer security? You should be

HP JetAdvantage Security Manager at work: use caseA major banking customer needed to secure 30,000 devices. After a complete risk assessment, HP Security Manager brought the customer’s entire fleet into compliance while helping to save time and money.

Before HP Security Manager

of the fleet complied with security policy

25%Less than

servers with continuous network traffic

12 WJAto report status and address compliance issues

4 hours

After HP Security Manager

of the fleet complies with security policy

97%More than

saved every day by built-in reports and minimal compliance issues

HOURSserver per 10.5K devices

single

to complete assessment/ remediation

3 hours

36

Presenter
Presentation Notes
[This slide has been designed to build] Here is an example of how HP JetAdvantage Security Manager can help strengthen compliance and reduce risk, while saving resources and time. Notes: HP JetAdvantage Security Manager must be purchased separately. To learn more, please visit hp.com/go/securitymanager.
Page 37: Are you concerned about printer security? You should be

Integrated security and workflow solutionsHP solutions can help secure and optimize your printing investment across the organization

37

HP Access Control Secure Authentication

HP Access Control Secure Pull Printing

HP Access Control Job Accounting

HP Access Control Intelligent Rights Management

HP JetAdvantage Connect

HP Access Control Intelligent Print Management

Presenter
Presentation Notes
HP security and workflow solutions are designed to seamlessly integrate into your printing and imaging environment to improve productivity, minimize risk, and optimize your investment. Together, HP Access Control and JetAdvantage Connect solutions: Help make printing more secure with multiple authentication options and encryption. You pick up your print job, not someone else. Reduce cost by eliminating orphaned print jobs and reducing printing by up to 30%. Reduce complexity by limiting print servers, cutting down on network traffic, and eliminating multiple drivers. The HP Access Control Enterprise print spooler supports over 10x devices compared to Windows print spooler. Are Enterprise-ready, with support for mobile workers and delegate job retrieval. A broad range of HP and select non-HP devices are supported. Make good business sense and fit your enterprise’s unique print culture. Enable control of printing security, cost and management by changing printing behavior. Give IT administrators and users the tools they need to make the most of print in the enterprise. Maximize the return on HP printing technology. HP Access Control Secure Pull Printing—Empower mobile users and increase overall print efficiencies. Allow users to dynamically print to the network and “pull” jobs to any solution-enabled HP device. Pull printing virtually eliminates unclaimed documents, increases the efficiency of mobile workers, and reduces IT administrative burdens. HP Access Control Job Accounting—Audit and track print and copy use across the enterprise. Track the use of devices and supplies across the enterprise. Use that information to allocate print costs appropriately, inspire users to print more responsibly, and provide IT with the necessary data to forecast future print fleet utilization. HP Access Control Intelligent Rights Management Easily assign access codes and device functionality to users to create a smarter, more efficient, more secure environment. Each device control panel reflects only the user's assigned capabilities. Record MFP usage details and route the data directly to your secure server. Then, access the data to determine the needs and policies of your organization based on actual results. HP Access Control Intelligent Print Management—Intelligently manage print output. Create custom printing policies that enforce your enterprise’s cost-cutting goals, compliance needs and green initiatives. Assign duplex (two-sided) printing as the default to save paper, restrict color printing to only those users who need it, balance device use with automatic job routing, and educate users or enforce policies with opt-in/opt-out for any policy. HP Access Control Secure Authentication—Quickly authenticate users at the device. Protect your network print devices with robust authentication features that integrate with your existing network credentials (i.e., LDAP, Active Directory). Increase document security by requiring user authentication prior to printing, copying, emailing, or scanning at the device. HP JetAdvantage Connect—Intuitive, reliable mobile printing designed for business. Help save time and money by seamlessly leveraging existing IT network tools and policies to manage mobile printing. Users can securely print from a variety of smartphones and tablets—where and when they need to—with similar ease of printing as from a PC. Notes: HP Access Control must be purchased separately. To learn more, please visit hp.com/go/hpac. HP JetAdvantage Connect must be purchased separately. To learn more, please visit hp.com/go/JetAdvantageConnect.
Page 38: Are you concerned about printer security? You should be

Managed Print Services

38

Presenter
Presentation Notes
[For Channel presentations, replace slides 40-47 with slide 70]
Page 39: Are you concerned about printer security? You should be

Managed Print Services

39

Get the help you need

Collaborate with print security experts to improve your device, data, and document security

• Understand and assess current security vulnerabilities of your print environment

• Get help creating a plan to improve security

• Outsource management of your printer fleet

• Get easy access to data for regulatory compliance reporting

• Stay on top of evolving security threats

Presenter
Presentation Notes
You don’t have to protect and secure on your own. A support team of consultants can show you how to improve the security of your data, devices, and documents. Collaborate with print security experts to assess your current print security vulnerabilities. We can help you build a comprehensive print security plan based on business needs and best practices. You can even outsource the management of your printer fleet and have it kept up-to-date with the latest security measures. Plus, get easy access to data for regulatory compliance reporting. Customer benefits [examples don’t need to be expressed – for your background] Understand and address security vulnerabilities of the printer fleet, data, and document practices. Have your clients take the Secure Print Analysis survey at hp.com/go/SPA. This self-evaluation of their current actions will educate your customer on the breadth of print security actions that they SHOULD be doing. (And therefore, why they should be working with print fleet management experts – like you.) You can also use the HP Quick Assess tool to identify vulnerabilities in your client’s print environment. This is a 1-hour telephone consultation that assesses and then shows the status of the top 13 security settings on up to 20 HP printers in the customer’s fleet. The full blown software, HP JetAdvantage Security Manager, comes with a baseline security policy based on NIST standards. Outsource the management of the printer fleet and have it kept up-to-date with the latest security measures – for example, FutureSmart Firmware updates to integrate new security features like run-time intrusion detection (above and beyond the typical security patch firmware updates). Only HP Enterprise printers with FutureSmart can be upgraded – thus why HP recommends the printer fleet be upgraded to HP FutureSmart-based devices. Get easy access to print data for regulatory compliance reporting – i.e. HP JetAdvantage Security Manager automated reports for meeting compliance requirements such as: Vulnerabilities must be regularly scanned and identified for a remediation activity as per CSA-CCM, FFIEC, HIPAA, HPi MPS, ISO27001:2005, ISO27001:2013, ISO27002:2005, NIST 800-53: Security. Stay on top of evolving security threats and changing compliance requirements – help clients proactively update their security plan to address evolving security threats.
Page 40: Are you concerned about printer security? You should be

Customer benefits

• Reduce cost

• Minimize device downtime

• Mitigate security risks

• Streamline workflows

Service SolutionsHardware

Multi-year cost per page contract

Supplies

+ + +

Managed Print Services

Managed Print Services

© Copyright 2016 HP Development Company, L.P. The information contained herein is subject to change without notice.40

Presenter
Presentation Notes
As business printing moves from transactional to contractual buying, one of the growing opportunities for HP and our partners is Managed Print Services (MPS). HP is the most recommended MPS provider and is rated #1 in customer satisfaction. (Source: ORC international, 15 April 2015. Conducted 980 interviews in AMS, EMEA, APJ across 10 dimensions of satisfaction) HP Managed Print Services combines our innovative hardware, software, and services to help customers harness the power of information within the printing environment. Our services are flexible and scalable to meet each company’s specific needs – today and tomorrow -- no matter what size or industry. Managed Print Services gives customers access our very latest technologies, and boosts their productivity through security, mobile printing, and intelligent workflows. Customers love it because it reduces costs while minimizing downtimes. Partners love it because it creates a predictable, annuity style revenue stream. They deepen their relationship as the single supplier and can grow their business as customer needs change.
Page 41: Are you concerned about printer security? You should be

The most recommended MPS provider in the United States

0.0%

10.0%

20.0%

30.0%

40.0%

50.0%

60.0%

70.0%

80.0%

90.0%

HP Lexmark Ricoh Xerox

Net Promoter Score (NPS)1

85.7

65.7

51.4

65.7

is the undisputed leader in MPS customer satisfaction in the United States.2

MPS customers rate HP #1 in

• MPS satisfaction for Account Team and Delivery Management1

• MPS value1

• MPS expertise, ease-of-use and support request resolution1

1Data source ORC international, 15 April 2015. Conducted 980 interviews in AMS, EMEA, APJ.2Data source ORC international, 15 April 2015. Conducted 980 interviews in AMS, EMEA, APJ across 10 dimensions of satisfaction.

Presenter
Presentation Notes
HP had a very strong performance in AMS with over 80% of customers rating 9 or 10 for Overall Satisfaction and no Dissatisfied customers. HP leads all its competitors by at least 10%. Background Superlatives were developed based on the OCR International NPS research project completed 15 April 2015. To drive MPS message consistency the claims are based on the WW results (roll up of all regions). Please utilize claims as is. Claims approved by HP WW legal counsel. Countries should follow standard process for legal approvals.   Overarching claim:  �HP is the most recommended MPS provider.1   Customer satisfaction claims: Customers rated HP #1 in MPS for customer satisfaction.2 Customers rated HP #1 in MPS satisfaction for Account Team and Delivery Management.1 Customers rated HP #1 in MPS value.1 Customers rated HP #1 in MPS expertise, ease-of-use and support request resolution.1   Footnotes: 1Data source ORC international, 15 April 2015. Conducted 980 interviews in AMS, EMEA, APJ. 2Data source ORC international, 15 April 2015. Conducted 980 interviews in AMS, EMEA, APJ across 10 dimensions of satisfaction.
Page 42: Are you concerned about printer security? You should be

Take action now

42

Page 43: Are you concerned about printer security? You should be

Getting started

Assess your environment

• Take the Secure Print Analysis survey at hp.com/go/SPA

• Identify vulnerabilities in your print environment by running HP Quick Assess

Define and implement print security policy

• Deploy HP JetAdvantage Security Manager for automated monitoring and remediation

Consult with the experts

• Schedule a strategy consultation to help customize your security strategy and roadmap

Contact your sales representative for more information about HP products and solutions

hp.com/go/printsecurity

Take action now to improve the security of your imaging and printing environment

43

Presenter
Presentation Notes
The Secure Print Analysis (SPA) is an online self-assessment tool (hp.com/go/SPA). The survey allows the IT manager to determine if they are following best practices in print security. The SPA is available as an interactive PDF for channel partners demand-generation use, to directly capture marketing generated opportunities. HP Quick Assess gives a snapshot of the security of your imaging and printing environment (HP devices only). It’s a 1-hour telephone consultation that uses HP JetAdvantage Security Manager to assess and then show the status of the top 13 security settings on up to 20 HP printers in your fleet. Notes: HP JetAdvantage Security Manager must be purchased separately. To learn more, please visit hp.com/go/securitymanager.
Page 44: Are you concerned about printer security? You should be

HP Quick Assess (with JetAdvantage Security Manager)Demonstration that assesses the top 13 security settings on up to 20 HP printers

Unused protocols left unsecure could become an entry point onto the network

Unconfirmed passwords/certificates could lead to unauthorized access to the device

Assessment risk (policy items)

44

Presenter
Presentation Notes
HP JetAdvantage Security Manager Quick Assess gives a snapshot of the security of your imaging and printing environment (HP devices only). It’s a 1-hour telephone consultation that assesses and then shows the status of the top 13 security settings on up to 20 HP printers in your fleet. In this example, 33% of printing policies are putting the environment at high risk, while nearly 17% are at medium risk. The demo shows details about policies that should be fixed. Purchase the solution to take full advantage of HP JetAdvantage Security Manager’s policy-based print security compliance. HP Security Manager comes with a baseline security policy based on NIST standards. It offers a simple, intuitive process to establish secure settings across your fleet of printers, and automatically secures new devices as soon as they are added to your network. HP JetAdvantage Security Manager is the industry’s only policy-based print security compliance tool. Notes: The industry’s only policy-based print security compliance tool: Based on HP internal research on competitor offerings (Device Security Comparison, January 2015) and Solutions Report on HP JetAdvantage Security Manager 2.1 from Buyers Laboratory LLC, February 2015. HP JetAdvantage Security Manager must be purchased separately. To learn more, please visit hp.com/go/securitymanager.
Page 45: Are you concerned about printer security? You should be

Thank you

Lori Gabaldon

[email protected]

951.500.2943 – Mobile

360.212.4537 - SKYPE

45

C04912106, December 2016, Rev. 4

Presenter
Presentation Notes
[Update slide with your contact info]