Download Print this page

Canon Paper Shredder User Manual page 4

Canon paper shredder user manual
Hide thumbs

Advertisement

Section 1 — Introduction
1.1 — Security Market Overview
In today's digital world, risks to networks and devices come in more forms and from more directions than
ever before. From identity theft and intellectual property loss to infection by viruses and Trojan horses, IT
administrators today find themselves playing an additional role of security officer to adequately protect
information and assets from threats from the outside as well as within.
Nearly every day destructive threats emerge and undiscovered vulnerabilities are exposed, proving that you
can never be too secure. IT administrators need a holistic security strategy that can be applied at every level
of the organization — from servers, desktops and devices such as MFPs, to the networks that connect them
all.
As if the risks to computers, networks and devices weren't difficult enough to address, increased
governmental regulations add an additional layer of strict compliance standards that must be met.
Legislation such as Sarbanes-Oxley Act (SOX), Gramm-Leach-Bliley Act (GLB), Health Insurance
Portability and Accountability Act (HIPAA), Family Education Rights Privacy Act (FERPA) and
Homeland Security Presidential Directive (HSPD)-12 all require that IT administrators ensure the security,
privacy, accuracy and reliability of information receives the utmost attention.
1.2 — Imaging & Printing Security Overview
Today's multifunction devices share many similarities with general purpose PCs. They contain many of the
same components like CPUs, memory and hard disks; and some even use mainstream operating systems
like Windows or Linux. Like any other device on the network, sensitive information may be passed through
these units and stored in the device's hard disk and memory. Yet at many companies multifunction devices
are not given the same attention concerning information security.
The Canon imageRUNNER ADVANCE Security White Paper has been designed to provide detailed
information on how imageRUNNER ADVANCE systems can address a wide variety of security concerns.
Canon imageRUNNER ADVANCE systems offer many standard security capabilities, as well as a number
of advanced security options that may be added for a higher level of confidentiality, integrity and
availability of your mission critical information.
1.3 — Key Security Concentration Areas
Canon recognizes the vital need to help prevent data loss, protect against unwanted device use, and mitigate
the risk of information being compromised. As a result, all imageRUNNER ADVANCE systems include
many standard security features to help safeguard information.
Canon imageRUNNER ADVANCE security capabilities fall into five key areas:
Device Security
Information Security
Network Security
Security Monitoring / Management Tools
Logging & Auditing
Canon dedicates a significant amount of time and resources to continually improve the security capabilities
of its imageRUNNER devices. Numerous robust capabilities are available for administrators to restrict
access to the device's features and functions at a granular level, while maintaining high availability and
productivity.
White Paper: Canon imageRUNNER ADVANCE Security
4

Advertisement

loading