Ricoh Aficio Common Security Features Guide SECURITY SOLUTIONS Color Multifunction Devices Black & White Multifunction Devices Color Printers Black & White Printers Super G3 Facsimiles Maintaining data security in networked environments for ultimate customer peace of mind Version 11...
T A B L E O F C O N T E N T S Introduction.....................................1 Information is an Asset ..............................1 Risk Levels..................................4 Ricoh Aficio Security Solutions Compatibility Chart ......................4 Ricoh Security Solutions Review..............................6 Network Protection................................6 Web Image Monitor..............................6 SmartDeviceMonitor..............................6 Network Protocol ON/OFF ............................7...
Ricoh Aficio Common Security Features Guide I N T R O D U C T I O N Information is an Asset Did you know that 90% of all corporate espionage is conducted by someone within the organization, a trusted employee in or near a position of power with seemingly impeccable credentials? Motives range from monetary gain to emotional revenge but the result is the same: information a company deems classified or personal is used against it in an effort to disrupt business.
Page 5
Perhaps you’ve read the John Grisham novel The Firm, or have seen the movie by the same title. In it, the trusted attorney turns against his employers. He circumvents the modest document security features by having an assistant copy legal files after hours by means of stolen magnetic swipe cards that are used to track and bill clients for chargeback purposes.
Page 6
As you can see the need to protect data is not just for personal or even business interests, it's the law. As you'll learn, the entire family of Ricoh office solutions is equipped with a mix of features and capabilities that assist in compliance with...
Risk Levels Every company is different and their exposure to all types of security threats will vary based on the nature of their business and the sensitivity of the information that is processed. Further, the location and configuration of a specific device will also impact the appropriate level of security. Non-networked devices, for example, may only require local (internal) user authentication whereas networked peripherals will demand more robust login (external) controls.
Page 8
How can your customers be sure? What if the device is to be relocated elsewhere in the company, or returned at end-of-lease? To address these and other concerns, Ricoh equips its products with an array of standard and optional features to limit device access, track usage, and protect confidential information stored in memory.
Web Image Monitor and SmartDeviceMonitor, the two installation and monitoring utilities that ship standard with every Ricoh Aficio device. Much of the functionality of these utilities is covered in the Ricoh Aficio Common Features Guide: Solution Selection Guide. However, their security-related features are reviewed here.
Tool. This activates a menu for review of the peripherals authorized for use by User Code and User Name. All Ricoh-supported peripherals on the network are listed, and a simple click on the device accesses a menu that restricts or enables access to the device for individual users. In this way adminis- trators can block Marketing users from accessing the Human Resources MFP hard drive, for example.
No one without a valid user name/password can access the machine. ■ User Code Authentication: Utilizes Ricoh’s standard User Code system to authenticate the user. The opera- tor simply enters their User Code, which is compared to the registered data in the device’s address book.
Directive requires that all federal employees and contractors enhance security efficiently by reducing identity fraud through increased protection of personal privacy. The only customers for Ricoh’s CAC Authentication Solution is the U.S. Department of Defense (DoD) [US Army, Navy Air Force, Marines, Coast Guard and affiliated agencies].
User Account Registration (User Account Enhance Unit) Most Ricoh devices allow customers to register up to 30 user accounts to track and limit user access. Installing the optional User Account Enhance Unit increases capacity to a maximum of 500 accounts to monitor device usage and restrict larger populations’...
Without protection, intelligible information can easily be stolen, or modified/falsified and re-inserted back into the network. Ricoh Aficio devices are equipped with the following encryption capabilities to reduce these risks.
That’s where Ricoh’s Encrypted PDF Transmission function adds value, scrambling and encrypting the data that would otherwise be a very transparent document during transmission.
Ricoh Aficio Common Security Features Guide Driver Encryption Key Ricoh devices offer this feature that scrambles user authentication passwords when using the PCL or RPCS drivers so others cannot access the system fraudulently using a stolen user’s password. PDF Password Encryption This function corrects a vulnerability in Encrypted PDF Transmission in that the window for entering the user password displays the password in clear text.
Ricoh currently offers several types of DOSS systems for use with different devices and hard disk drive sizes, ranging from Type A, B, C, D, F, H & I and achieved ISO 15408 Common Criteria Certification, a recognized worldwide standard that defines security requirements and establishes procedures for evaluating the security of IT systems and software.
4 – 8 digits directly at the control panel to prevent other users from viewing, printing, or sending the file. In Ricoh MFPs equipped with Preview capabilities (pictured at right) documents assigned a password display a key icon instead of an image of the first page of the document to preserve confidentiality.
RPCS driver can be embedded with a special message that instructs the scanners of other Ricoh devices not to copy, scan, or send the page. Instead, page content is either grayed out, or overprinted with one of 10 possible obscuring patterns and/or a customized text message to deter illegal copying.
MFP with fax capability. The answer is NO. A Ricoh standalone fax, network fax or MFP with fax uses only a Class 1 modem that only controls fax transmission/reception. Regardless if fax is part of a network fax or an MFP connected to a network, the modem is physically separated from the main processor or any other network port.
IP-fax When the NIC FAX Unit is installed Ricoh facsimile systems support secure T.38 real-time IP-fax over a corporate Intranet. This not only bypasses costly phone lines, but also operates behind the firewall for secure point-to-point transmissions.
The machine will disconnect if the last four or eight digits of the dialed number do not match the CSI on the receiving machine. Fax Security Compatibility Table The following chart outlines the current Ricoh facsimile product line and those fax security features that are available with each product. Commercial Facsimile Security Features Super G3 Facsimile ■...
Ricoh Aficio Common Security Features Guide Ricoh Security Solutions ompatibility harts Network Data Document Protection Device Access Encryption Protection Color Multifunction...
Page 25
Network Data Document Protection Device Access Encryption Protection Black & White Multifunction...
Page 26
Ricoh Aficio Common Security Features Guide Network Data Document Protection Device Access Encryption Protection Black & White Multifunction (continued)
Page 27
Network Data Document Protection Device Access Encryption Protection Color Printers Black & White Printers...
Need help?
Do you have a question about the Aficio SP C231N and is the answer not in the manual?
Questions and answers