Security Business Requirements; Public Sector (Government / Education / Healthcare) Security Requirements; Government - Samsung MFP SECURITY White Paper

Table of Contents

Advertisement

WHITE PAPER
Regulatory Compliance
Data Security
Compliance
Protection
from Damage
to IT Infra.
Secure
Communication
Emerging
Technologies
Gartner, Security Purchasing Behaviors, Worldwide, 2008
Gartner, Global SMB Security Purchasing Behaviors, 2008
3.

Security Business Requirements

Businesses today are constantly creating new ways to use information. IT professionals have the demanding task of
protecting that information from new ways of abuse. The most successful strategy for protecting this information is by
implementing best practices for user authorization and to use devices that provide a high level of security.
Samsung MFP devices employ high levels of security to meet or exceed today's business security requirements. We are
also working with our business customers to continuously improve our MFP security features.
3.1
Public Sector (Government / Education / Healthcare)
Security Requirements
Public sector entities have very specialized security needs. The military must be able to protect sensitive information from
foreign interests. Schools need to be able to protect the integrity of their student's grades. Healthcare systems must
protect the privacy of their patients.
3.1.1

Government

U.S. government requirements include hard drive overwriting schemes that digitally shred the latent document
information from the hard drive of a device. When devices with hard drives are removed from secure sites, the hard drives
must be removed and physically destroyed.
Regulatory requirements that require these practices include the following:
FISMA
This regulation requires a mandatory set of processes that must be followed for all information systems used or
operated by a U.S. federal government agency.
HSPD-12
A common identification standard used to ensure that government facilities and sensitive information stored in
networks remain protected.
Page - 10
36%
37%
24%
19%
13%
16%
9%
11%
Enterprise
6%
SMB
6%
Copyright 2014 Samsung Electronics Co., Ltd., All rights
 Many regulations and IT
best practices prescribe
appropriate security
requirements to which
organizations, especially
within regulated verticals,
must comply.
 Data security, data leak
prevention, identity
management, security
information logging, and
event management are
the most important
security categories.
SAMSUNG MFP SECURITY
reserved.

Advertisement

Table of Contents
loading

Table of Contents