PrintIT Reseller - issue 117

01732 759725 44 VOX POP continued... We believe that independent, third-party validation is the best ways to assure customers that their manufacturer is being honest about the security features of the devices they are using highest levels of security and protecting their data to an internationally recognised standard. Phillip John: We have implemented and maintain a robust information security programme. Konica Minolta Business Solutions (UK) is Cyber Essentials and Cyber Essentials Plus certified, as well as maintaining ISO 27001 certification, along with Konica Minolta International. Arjan Paulussen: Lexmark has ISO 27001 certification for its worldwide managed print services and cloud services. We also design devices to meet ISO/IEC 15408 Common Criteria Certification, an international standard on security capabilities. Lexmark is committed to validating this design through both the IEEE 2600 family of standards and the US-based National Information Assurance Partnership's (NIAP's) Hard Copy Device Protection Profile (HCDPP). Lexmark follows the Federal Information Processing Standards (FIPS) 140 Publication Series issued by the National Institute of Standards and Technology (NIST), which outlines requirements and standards for cryptographic modules, including both hardware and software components. Adherence to this standard for hard disk encryption and IPsec networking helps us better secure any transmitted data. Lexmark is also certified to the Open Trusted Technology Provider Standard (O-TTPS) for laser printer controller cards and firmware stored on the card. This standard has been adopted as ISO 20243-1 and addresses threats related to maliciously tainted and counterfeit products. SOC2 Type II (cloud), and ISO 27001 (information) are additional standards Lexmark adheres too. We believe that independent, third-party validation is the best ways to assure customers that their manufacturer is being honest about the security features of the devices they are using. PrintIT Reseller: How have you adapted your security risk and assessment services offering to help customers keep on top of the print security challenge in a world where BYOD and home printer usage is the norm rather than the exception, and zero trust is fast becoming the de facto standard? Matt Hayman: In this new world where home working is the norm, printers and MFPs are connected into the home network but rarely, and perhaps never, get updated by the IT department. Therefore, it is very important to set up the device correctly during the initial installation. As part of Kyocera’s dealer certification program, engineers are trained on how to do this, including the firmware upgrade process. Also, in line with our philosophy, Kyocera makes things simple, providing the tools and support for users to update their device security. In line with the PSTI legislation, all Kyocera A4 printers/MFPs have a unique admin password (included in the box) and armed with this password users can access the Kyocera command centre – the internal webpage of their device. Here they can lock out dormant USB ports, close any unused protocols and apply IP filtering so that only their PC/ tablet/phone can have access to their print device. In this way BYOD can be enabled or disabled applying zero trust policies. Kyocera Cloud Print and Scan (KCPS) tackles print security challenges in the modern workplace by providing secure, cloud-based printing and scanning solutions. Amid the widespread use of BYOD and home printers, KCPS ensures secure print job release through user authentication methods. It prioritises document security and adheres to zero trust principles while seamlessly integrating with popular cloud storage services and operating without onpremise infrastructure. Additionally, Kyocera offers specialist business solutions and consultancy services, to help organisations understand how their infrastructure stands up against the vigorous security threats that modern businesses must be resilient to. This forms an important foundation for businesses looking to establish a more robust security strategy. Sarah Mackay: UTAX has tackled this challenge using solutions. There are so many solutions on the marketplace to improve workflows, it’s just a case of ensuring that you have the right solutions for your end-users, and that the solutions you use have strong security credibility. Solutions are a great way to standardise processes, allowing less room for error (which can frequently result in security breaches). UTAX offers various software solutions that allow print devices to be managed centrally, ensuring secure logins for all members which are recorded in an audit log. Our software solutions enable the ability to block users or groups from accessing specific devices or features if needed. UTAX also issues regular firmware updates to stay on top of evolving security threats. Julian Hodges: Our professional services team are experienced, working with our clients and partners on how best

RkJQdWJsaXNoZXIy NDUxNDM=