The security of valuable information was an easy process back in the early days of computing. All of the data was kept on
tapes and disks, which were not accessible to anybody outside of the building. However, now with networks connecting
everything to the outside world, security leaks can occur anywhere.
IT professionals are faced with managing an assortment of devices that can allow security breaches. This overwhelming
burden of device management has led IT managers to demand better security features from the manufacturers of the
devices they use.
Samsung has responded to the requests of our IT customers and created security features for our MFPs that protect
valuable data from unauthorized access.
In our digital information-based society, we have become more aware of the perils associated with sharing information. In
the name of productivity we have created increasingly easier ways to share information, at faster speeds and with higher
bandwidth. The downside to this increase in sharability is the decrease in our ability to secure our information. Search
engines and sniffers are constantly monitoring networks for information, usually for innocuous purposes, but sometimes
the reasons are malicious.
To address this situation we need to understand the path information travels and then we can identify the vulnerabilities
the information can encounter. A simple path is one that uses a single connection such as the path from a computer to a
A complex path can include several connections over various wired and wireless networks such as sending an email from a
cell phone to several distant locations.
In the Information Technology field, our goal is to make information highly available, but only to the desired recipients.
The tools we use to achieve this goal include data encryption and user authentication.
Page - 6
Copyright 2014 Samsung Electronics Co., Ltd., All rights
SAMSUNG MFP SECURITY