Fabricante : Canon
Arquivo Tamanho: 641.82 kb
Arquivo Nome : wtpaper_copier_iRADV_Security.pdf
|
Facilidade de uso
It provides details on imageRUNNER ADVANCE security technology for networked and stand-alone environments, as well as an overview of Canon’s device architecture, framework and product technologies as related to document and information security. This White Paper is primarily intended for the administrative personnel of a customer charged with responsibility for the configuration and maintenance of imageRUNNER ADVANCE systems. The information in this document may be used to more clearly understand the many imageRUNNER ADVANCE security-related configuration capabilities offered by Canon. The imageRUNNER ADVANCE system offers a number of standard and optional capabilities that, when used by a customer, can help facilitate effective management and security of data processed and stored by the system. Ultimately, it is the customer’s responsibility to select the method(s) most appropriate for securing their information. Canon does not warrant that use of the information contained within this document will prevent malicious attacks, or prevent misuse of your imageRUNNER ADVANCE systems. Products shown with optional accessories/equipment. The features reviewed in this white paper include both standard and optional solutions for imageRUNNER ADVANCE systems. Specifications and availability subject to change without notice. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . 3 2. Device Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . 5 3. Information Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 4. Network Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 5. Security Monitoring & Management. . . . . . . . . . . . . . . . . . . . . 27 6. Logging& Auditing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 7. Canon Solutions & Regulatory Requirements. . . . . . . . . . . . . 30 8. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 9. Addendum. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . 34 White Paper: Canon imageRUNNER ADVANCE Security Section 1 — Introduction “If you look at these machines as just copiers or printers, you first wonder if you really need security. Then you realize conventional office equipment now incorporates significant technology advances and capabilities that make all documents an integrated part of a corporate network that also involves the Intranet and Internet. Government agencies, corporations and non-profits are increasingly transitioning from traditional stand-alone machines to devices that integrate these functions and link them to corporate networks, raising a whole new era of information management and security issues. Our development of features within Canon imageRUNNER ADVANCE systems are designed to help prevent data loss, help protect against unwanted device infiltration and help keep information from being compromised.” —Dennis Amorosano, Sr. Director Solutions Marketing & Business Support, Canon U.S.A., Inc. As the marketplace has evolved, the technology associated with office equipment continues to develop at an ever-increasing pace. Over the last several years alone, traditional office equipment has leapfrogged in technology, expanding its functional capabilities, while at the same time becoming an integral part of the corporate network and the Internet. As a result, a new level of security awareness has become imperative. Canon’s attention to emerging market trends and details surrounding customer security requirements has driven the development of features within imageRUNNER ADVANCE systems, which has been designed to help thwart data loss and the potential threats posed by hackers. White Paper: Canon imageRUNNER ADVANCE Security Section 1 — Introduction 1.1 — Security Market Overview In today’s digital world, risks to networks and devices come in more forms and from more directions than ever before. From identity theft and intellectual property loss to infection by viruses and Trojan horses, IT administrators today find themselves playing an additional role of security officer to adequately protect information and assets from threats from the outside as well as within. Nearly every day destructive threats emerge and undiscovered vulnerabilities are exposed, proving that you can never be too secure. IT administrators need a holistic security strategy that can be applied at every level of the organization — from servers, desktops and devices such as MFPs, to the networks that connect them all. As if the risks to computers, networks and devices weren’t difficult enough to address, increased governmental regulations add an additional layer of strict compliance standards that must be met. Legislation such as Sarbanes-Oxley Act (SOX), Gramm-Leach-Bliley Act (GLB), Health Insurance Portability and Accountability ...