Data Security The Best Data Security In The Industry.

Slides:



Advertisements
Similar presentations
Compliance storyboard: Classifying & controlling content at the input device.
Advertisements

Overview Business Risk Secure MFP Program Device Security Access Security Document Security End of Life Security.
Lexmark MFP Product Line
© 2009 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice HP IPG Solutions -Achieve more with.
Konica Minolta and XXXX Health. Patient medical record and billing information (PHI) can either be ‘secured’ or ‘unsecured.’ according to HIPAA guidelines.
Distributed Capture within a Microsoft Environment.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
TOSHIBA MFP – Much More Than a Copier Presented By: Al Sumner & Tony Osnovsky.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
(insert Presenters Name) (insert Title)
Canon Security Solutions For imageRUNNER Series imageCHIP Devices.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Risks, Controls and Security Measures
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Lexmark Print Management
SHAREPOINT CONNECTOR What’s new in SharePoint 2010 Market SharePoint is widely adopted by all types of companies. Kyocera offers a Simple but feature.
1 for Real Estate An easy, fast, and cost effective way to organize documents associated to listings & client correspondence Real Estate Real Estate offices.
The New Sharp Standard Security vs. the Data Security Kit.
New Data Regulation Law 201 CMR TJX Video.
OPSEC Awareness Briefing Multi-Function Printer (MFP) Security.
SALES REP NAME Healthcare Division MARKETPLACE CITY Konica Minolta and Healthcare HEALTHCARE FACILITY NAME.
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
L2000 Technical Training 7. I-Functions. Objective  After completion of this module you will be able to demonstrate an understanding of the I-Functions.
Overview: Identify the Internet protocols and standards Identify common vulnerabilities and countermeasures Identify specific IIS/WWW/FTP concerns Identify.
INTERNAL USE ONLY | © Nuance Communications, Inc. All rights reserved. DOCUMENT IMAGING SOLUTIONS 1.
Education Vertical Market
Cosmos Security Feature Overview Product Planning Group Samsung IT Solutions Business 12 July 2010.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential Document.
Internet Security for Small & Medium Business Week 6
MEAP Applications.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Bizhub benefits: education applications How Konica Minolta helps schools and universities graduate to managing student records electronically, testing.
Forms Management: Compliance, Security & Workflow Efficiencies.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Troubleshooting Windows Vista Security Chapter 4.
PowerPoint Lesson 10 Sharing and Delivering Presentations Microsoft Office 2010 Advanced Cable / Morrison 1.
Secure Your Documents. Protect Your Data. Lexmark Security for Solutions-Capable Printers and MFPs.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
John A. Coates, P.E., Administrator Wastewater Compliance Evaluation Section, Office of Wastewater Management Florida Department of Environmental Protection.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Printing solutions as easy as CLX-9250/9350ND Function Strengths & Benefits Solution & SVC Group IT Solutions Business Samsung Electronics Company, Ltd.
HIPAA Health Insurance Portability and Accountability Act of 1996.
Network Security & Accounting
BEST Guard – Information Logging. bEST Guard Records all actions executed on an MFP Produkt type: Server based application (software only) Development.
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
IAD 2263: System Analysis and Design Chapter 7: Designing System Databases, Interfaces and Security.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
I-SENSYS MF4690PL Product Information. SEND and Security for i-SENSYS MF4690PL 2 key and highly competitive technologies allowing us to sell this important.
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
MANAGING COPIERS AT WOODS HOLE OCEANOGRAPHIC INSTITUTION April 2015 Matt Agnese.
University of Texas Medical Branch Print Management Working Together to Work Wonders.
Staying Secure in an Insecure World NATE HOWE CHIEF INFORMATION SECURITY OFFICER Education – Partnership – Solutions.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Education Solution.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Controlling Computer-Based Information Systems, Part II
UNIT 19 Data Security 2.
복합기의 보안 기술 디지털 프린팅 사업부 삼성전자
Modular Object Scanning Technology (MOST)
Automated Bulk Signing Solution
Operating System Security
Business Document Platform
Presentation transcript:

Data Security The Best Data Security In The Industry

Data Security –On April 19, CBS News aired a story that highlighted the public’s fear that confidential and private data could be stolen from the hard drive of an MFP –During that broadcast, a senior executive at Sharp stated that their products’ hard drives could be automatically erased by purchasing a $500 security option –CBS said that the average American does not want to pay for such protection –At Konica Minolta, we’re glad to hear that! Major TV Network Causes Panic About Copiers

Data Security One Important Statement from the Story is False! During the broadcast, the following was heard: Konica Minolta refutes this statement as completely inaccurate for our bizhub MFP technology Konica Minolta MFPs do NOT store copies of print, scan, fax or copy jobs on the MFP’s hard drive “Nearly every digital copier built since 2002 contains a hard drive - like the one on your personal computer - storing an image of every document copied, scanned, or ed by the machine.”

Data Security –Konica Minolta’s products are more secure than competitive MFPs. –Konica Minolta’s products are ISO certified as a SYSTEM, whereas most other vendors certify only their security options. For example, several competitors only certify their Hard Drive Security Kit. –ISO is International Standards Organization –Before applying for ISO certification, Konica Minolta works with 3 rd party security consultant to have the system strictly evaluated and to be checked for any vulnerability or weakness that it may have. –The latest bizhub models include 18 security based functions in the Security Target of Evaluation or TOEs –More than double the nearest competitor at EAL3. Bizhub MFP Security - An R&D Design Focus

Unauthorized Access Service Technician Administrator User Confidential/Secure Output Stored data Network Threats Total System Certification Data Security

Administrator Function SNMP Administrator Function Service Mode Function User Function User Box Function Secure Print Function Overwrite deletion Function for all area Encryption Key Generation Function HDD validation Function CF validation Function Authentication Failure Counter Reset Function Trust Channel Function S/MIME Encryption Processing Function External server authentication operation support Function Encryption kit operation support Function HDD lock operation support Function CF lock operation support Function Common Access Card/PIV Functions 18 Targets of Evaluation

Data Security All bizhub products are ISO EAL3 certified out of the Box!! What Do Competitors Offer? Xerox – 8 (EAL 3) -12 (EAL2) items in TOE Canon – 1 item in the TOE – Requires Optional Security Chip (cost of $325 for erase kit & $550 for encryption kit) Ricoh – 1 item in the TOE - Requires Optional Security Kit Sharp - 5 items in the TOE – Requires Optional Security Kit (cost of $399 to $550) HP - 4 items in the TOE Lexmark - 5 items in the TOE

Data Security Ability to authenticate using the optional HID Proximity Card Reader AU-201H Ability to authenticate using the optional Biometric Authentication readers Authentication devices will synchronize with Active Directory Advanced security (Biometric data stored on separate server)

Data Security Standard Security Features (that other vendors charge for) Secure Watermark (color only) Image File Automatic Hard Drive Overwrite Hard Drive Sanitize Hard Drive Lock Password Protection Network User Authentication IP Filtering Encrypted PDF Scanning Encrypted PDF Printing (new color models) S/MIME – encryption and digital signature

Complete Audit Functions  Konica Minolta bizhub systems contain electronic job logs that record all print, copy, scan and fax jobs sent to or from the MFP  For example, the bizhub MFP Audit Log records all print jobs sent by named users. The Audit Log records when the job was printed, how many copies, the time it was printed etc.  Supported information in the Job Log Include:  User ID  Time & Date of event  Job Number  Job ID  Job Name  Scan Destination  Number of Pages Data Security For HIPAA & Sarbanes Oxley Compliance

We Provide Not Just a Record, But Also the Image  Built-in audit trail security feature in bizhub devices called the Image Log Transfer function.  Transfer the image using the Scan-to-FTP or WebDAV process to a registered server at the same time that the device is reading an image in copy mode, reading an image in scan mode, processing a print or image input for fax reception.  Job Log Manager Utility enables a company to keep long-term records of completed jobs. It provides an audit log that not only covers a long period of time, but one that can be reviewed and easily searched.  This utility also allows the logs of multiple MFPs to be centrally managed. Data Security

Security Summary

Data Security

NetworkPHI Data Physical OutputOutside Lines & Faxes Fax Security Diagnostics Service Authentication Network Protocol Security SSL Data Encryption Address Import Virus Protection Secure Print Woven Pattern Print HDD Security User Authentication Audit Log Ports Box Security Memory Erase PDF Encryption Konica Minolta MFP 18 Security Based Functions Covering ALL AREAS. Protecting every aspect of your Patient’s information. Data Security

Sample “Tie Downs” “Wouldn’t you agree that Konica Minolta’s focus on security provides your business with the protection you require?” “How soon can we begin to implement the data security features from Konica Minolta?” “Due to the size of the risk, your business can’t afford to use anything but Konica Minolta. Agreed?” “Since we will help bring your company into compliance, is there a better partner than Konica Minolta?”