Print IT Reseller - Issue 39 - page 44

01732 759725
VOX POP
44
devices have evolved over the last few
years, is presenting new vulnerabilities
that leave some organisations exposed to
serious risks.
“We work with our customers to
educate them and to help them address
the risks, but sadly this isn’t common
practice.”
Mark Smyth:
“The principles to focus
on and quite often neglected are, data,
documents and the device itself. In almost
every client case, we embark on a testing
and proof of concept with the client and
this enables us to understand their security
policies and how we can potentially help
and assist where some may have a weaker
process and policy.”
Steve Small:
“You will often find printers
that have been added to a network by
unauthorised or untrained staff as they are
not considered to be a threat to the overall
security of a network. We work closely with
our clients to audit their print structure and
continue to recommend and refine print
solutions. We ensure that their capabilities
continue to grow alongside their evolving
needs and that they are informed enough
to consider printer technology in their
overall IT policy.
“We also work very closely with
our technology partners to ensure that
our knowledge is up-to-date with the
market place while having one eye on
future developments. We will shortly be
introducing a new data security initiative
via one of our partners to highlight the
risks and provide a trusted and secure
solution.”
Clive Hamilton:
Yes I think that some
businesses are, most have anti-virus for
all of their hardware from client devices
and network level, taking into account
an external threat, but are they aware
of the threat within? How many printed
pages are left on copiers around their
organisation to be seen or shared by
those that shouldn’t have access to such
information? Do they understand how
setting controls on device, application
and by user not only secures their data
but tracks and prevents unlawful sharing,
which could lead to regulatory fines as well
as damage to a business’s reputation?
“These are the questions we are
discussing with our clients, how we can
help protect them end to end, secure
their data throughout the print lifecycle
whether this is scanning in a document
to a secure repository for collaboration, or
emailing it for eventual printing, all of this
can be tracked with a managed print and
document workflow solution, which we
specialise in.”
Adam Gibbons:
“It is difficult to know
for sure, but I hope the message is starting
to sink in; if a peripheral is attached to
the network it needs to be protected
from external risks. Here, Xeretec’s long
history of working with clients in sectors
where data confidentiality is vital – from
financial services, legal and healthcare –
pay dividends, as we’re able to apply this
security knowledge and experience to
ensure that print security is an integral part
of a company’s overall security policy, and
isn’t just a post-attack bolt on. We also
work with clients to review their device
security on a regular basis to ensure it’s
fit for purpose. Meanwhile, from a device
perspective and to protect against attacks,
Xerox and McAfee teamed up to design a
security system to help companies protect
against threats to this confidential data.
“At the same time, measures need
to be implemented to ensure that
data doesn’t leak out accidentally (or
intentionally) from within. To that end,
we offer a range of Intelligent Print
Management solutions which make print
more transparent and accountable. In
the case of SafeCom Smart Printing for
instance – among its many other features
– it offers access control by adding
authentication at the printer to protect
devices from unauthorised use of print,
scan and fax functionalities. It also adds
confidential printing because its authorised
user only pull print ensures that prints
are always delivered only into the right
hands, negating the risk that confidential
documents could go astray.”
Toni Gibiino:
“Any IT manager worth his
pay has a reasonable knowledge of printer
security but its importance in relation to
other IT security issues is simply lower
down in the pecking order of priorities. In
RDT’s case our approach is to make it a
discussion point at the onset, during our
discovery meetings or to tackle in account
management quarterly reviews. There is
a plethora of solutions on the market to
tackle the business environment needs,
each one with its own particular nuances
(no pun intended). Our sales people receive
regular training to be able to identify and
suggest the “right” solutions, specific to
the client’s/prospect’s business situation.
We very much see it as our responsibly to
educate the client and help protect their
business when it comes to printer security.”
How many
printed
pages are left
on copiers
around their
organisation
to be seen
or shared by
those that
shouldn’t?
Anthony Stears,
‘The Telephone
Assassin’
...continued
Grant Howard,
Head of Document
Solutions Delivery,
Annodata
Mark Smyth,
Operations Director,
Vision
“In my view,
businesses are
simply unaware
of the risks.”
1...,34,35,36,37,38,39,40,41,42,43 45,46,47,48,49,50,51,52
Powered by FlippingBook