Securing Devices Controlling Access Protecting Documents Safeguarding All Valuable Data Keeping your business your business. Your business may be at risk. Toshiba can help. Security is a growing concern for companies of all sizes. With Toshiba SecureMFP,™ we employ innovative methods of protecting valuable data in order to help businesses of all sizes meet the increasing security challenges. Protect your data The 2009 Data Breach and your business Investigation Report found that 74% of security breaches The Association of Certified Fraud resulted from external sources Examiners found that companies and 20% were traced to in the United States lose more than insiders. Reports from a $600 billion a year due to fraud, and variety of resources have document fraud is a large part of this come to these same conclusions: data statistic. Now that MFPs (Multifunction theft is common, it happens regularly, Up toOver $600 billion Products) and laser printers are able and everyone is aware that it’s a lost each year to fraud to store data, they’ve become an serious problem. That’s why we deliver Up to1 in 5 security breaches integral part of business networks, and serious security solutions. In addition come from inside a critical point of vulnerability. They to protecting against security breaches Up toLeft unsecured, an MFP retain latent document images and and possible litigation, we assist in can pose one of the contact information, leaving sensitive keeping businesses compliant with greatest threats to your information and mission-critical data ever-increasing government regulations organization at risk. These threats to security can such as HIPAA, FERPA, Sarbanes- Up to50%-70% of all identity come from anyone, anywhere. Oxley, and eDiscovery, to name a few. theft occurs in the workplace That networked MFP in the corner of your office just might be the most significant entry point for hackers to hijack sensitive data from your business. Up SeSecures Print Output Protects Data Device security authenticated sources and ensures Creates Secure PDF the integrity of all communications. In order to protect the confidentiality ControlledControls Access and integrity of your data, we continually Access security develop comprehensive security Toshiba has measures for Toshiba devices. Many developed simple of our MFPs come standard with hard yet highly effective Control access drive encryption and data overwrite to your MFP methods of features. For other models, we offer with Network establishing access Advanced Encryption functionality Authentication. security without providing on-the-fly encryption and inconveniencing decryption of data written to the users. Network device’s hard disk drive. The Data Authentication Overwrite Kit ensures that all data allows administrators to control is erased after every fax, copy, scan, access at the device in the same and print job in order to prevent latent way it’s controlled from the desktop. storage of valuable data. Because Department Codes provide MFPs and network printers function valuable data tracking and usage as complex network devices, we information, giving authorized users have developed several solutions that full functionality at the device. Usage specifically address network security. Limitations enable administrators IPv6 ensures IP security with a larger to set limits for copy and print jobs, IP address range, protection from as well as track and control costs. scanning and attacks, and support for Strong Passwords utilizes a ten- authentication and confidentiality as part digit alphanumeric administrative of our optional IPsec. Secure Sockets password for added protection along Layer (SSL) employs encryption with a log-on attempt limitation. To technology to protect all data traveling streamline the user login process, to and from the MFP, while IP Filtering our SmartCard Authentication acts like a firewall to protect your requires the simple swipe of a card internal network from intruders. Also, while allowing limited user access SMB Signing adds a digital signature to specific features and functions. to verify that data is received from Security where it counts, because it counts everywhere. Toshiba takes the security of your documents very seriously. And we are ready to help protect your critical data with our suite of Digital Rights Management (DRM) Solutions from Fasoo. Fasoo is a world leader in Enterprise DRM with more than a decade of experience in the industry. Document security Reliable Protection: Constantly protects files, including Fasoo’s DRM applications will help shared files for legitimate uses. your company provide even greater • Data at Rest protection against unauthorized • Data in Transit access to sensitive financial, technical • Data in Use and personal information. You can Extended easily control access to Microsoft Dynamic Permission Controls: Features of Office Documents, PDFs, engineering Controls file access privileges of Fasoo DRM drawings, images and other common users, groups and/or environments. file formats. These threats come Revokes documents after • Who & Where (user, group, delivery with a dynamic from both inside and outside of your device and network address) permission control. organization, and this technology helps • How (view, edit, print, copy/paste, Prevents unauthorized use you to better address these risks. of screen capture tools, screen capture and decrypt) remote desktop software • When (expiration date, validity and virtual machines. Fasoo DRM enables you to: period and how many times) Supports native applica- • Prevent unintended information tions and file formats that disclosure or exposure are transparent to users. Audit Trail: • Ensure a secure information Tracks activities of users, files sharing environment changes in configuration. • Better manage workflows and • Who (user and group) simplify secure collaboration • What (document name and path) • How (view, edit, print and decrypt) Fasoo DRM is the best core security • Where (IP address) infrastructure for organizations • When (time log) struggling to reduce data loss and improve work efficiency. Every day, billions of pages of confidential information – medical records, legal documents and financial data – are produced and distributed using office copiers, printers and MFPs. Label End of Security Vulnerability Report Document Security Life Access Security Security VulnerabilityDevice Security Report Device Security Access Security Document Security End of Label Life EOL Level EOL Document Level Document Access Level Access Device Level Device Program Implemented Program Fasoo.com Print to hold via 08 Code 08 via hold to Print Private Print via 08 Code 08 via Print Private Hardcopy Security Hardcopy Private Print Private Print to Hold to Print SecurePDF Rigndale Followme Rigndale CopyAudit Touch CopyAudit SmartCard RBAC Network Authentication Network Department Codes Department IPSec Data Overwrite Data Advanced Encryption Advanced eBridge Technology eBridge Serial Number Model HP Color LaserJet 26o5dtn CNGC72706W HP Color LaserJet 2820 CNHC75H017 Model Serial Number eBridge Technology Advanced Encryption Data Overwrite IPSec Department Codes Network Authentication RBAC SmartCard CopyAudit Touch Rigndale Followme SecurePDF Print to Hold Private Print Security Hardcopy Private Print via 08 Code Print to hold via 08 Code Fasoo.com Implemented Program Device Level Access Level Document Level EOL Level HP Color LaserJet 4645 JPCBD00282 HP Color LaserJet 26o5dtn CNGC72706W HP Color LaserJetHP Color 4700 LaserJet JP4LB29243 2820 CNHC75H017 HP Color LaserJetHP Color 4700 LaserJet JPTLB706597937YLM 4645 JPCBD00282 LEXMARK T650 HP Color LaserJet 4700 JP4LB29243 TOSHIBA e-STUDIO523THP Color LaserJet CZC828596 4700 JPTLB70659 TOSHIBA e-STUDIO600LEXMARK T650 CQJ723147 7937YLM Our experts TOSHIBA e-STUDIO451c CFJ511748 Encompass Security TOSHIBA e-STUDIO523T CZC828596 TOSHIBA TOSHIBAe-STUDIO452 e-STUDIO600 CIC614486 CQJ723147 will map out TOSHIBATOSHIBA e-STUDIO3510c e-STUDIO451c CVI611760 CFJ511748 Assessment TOSHIBA e-STUDIO3530c CZF810922 your devices TOSHIBA e-STUDIO452 CIC614486 TOSHIBA e-STUDIO3510c CVI611760 TOSHIBA e-STUDIO3530c CZF810922 Toshiba utilizes innovative security and provide No Security Basic Security Enhanced Security Optimal Security technologies and expert personnel a detailed No Security Basic Security Enhanced Security Optimal Security Security who are trained and certified as Vulnerability part of our Encompass Security Report. Vulnerability Assessment Program. Our Professional Services Consultants will: • Assess device, fleet, and enterprise document security • Assess all points of vulnerability including brands and devices that may not be manufactured by Toshiba • Provide a tailored security plan • Help implement the plan efficiently and effectively Our Encompass Security Assessment includes four areas of focus: • Device Security • Access Security • Document Security • End of Life/Disposal Security Secure your data, before it leaves the building. Toshiba has an extensive End of Life Security Policy to ensure all of your critical data is removed from the copier hard drive before it leaves your organization. Toshiba devices, as well as many other brands, can be scrubbed to remove any and all information that may still be stored on the hard disk drive. MFP End of Life Security Policies At the end of your lease, you can choose which level of security suits the needs of your organization. Basic Security Enhanced In addition to BASIC includes removing ENHANCED Security
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages8 Page
-
File Size-