Web Content Viewer

Actions
 

Can cybercriminals hijack your office equipment?

Yes. Printers, multifunctional devices, and other networked office equipment can be targets for cybercriminals. If they’re connected to the internet, they can be accessed from outside your office walls. That’s why Canon imageRUNNER ADVANCE DX multifunction devices offer extensive security features to harden your defenses.

You can close unused ports, encrypt hard drives, and set up data flow protocols that can help to minimize your exposure to data breaches. Our expert field engineers can help you protect your document workflows without compromising the productivity and efficiency of your workforce.

5 Key Areas of Device Security image

 

 

Access Control

Controlling access begins by authenticating users at the printer or multifunction device. This can be done with a PIN code, a password, or a proximity card. Users can be assigned privileges by an administrator, authorizing them to have access to certain features and functions on the device (copying, printing, scanning, faxing, etc.).

uniFLOW Online is designed to help save your organization time and money and provide business and security controls over your entire printer and multifunction printer fleet.

 
 

McAfee logo

Secure your devices from malware and tampering.

The Canon imageRUNNER ADVANCE series is designed with security in mind. These devices can prevent tampering by prohibiting the installation or execution of programs without a digital signature applied by Canon. The following program-tampering detection functions are in place to counter unknown attacks.*

 
 

System Verification at Startup

Once enabled, the Verify System at Startup function runs a process during startup to verify that tampering of boot code, OS, firmware, and MEAP applications has not occurred. If tampering of one of these areas is detected, the system will not start. By using the hardware as the “Root of Trust,” enhanced security against software tampering is provided. Furthermore, standard cryptographic technologies (hash, digital signature) are used for verification.

McAfee Embedded Control

Once enabled, McAfee Embedded Control allows only known programs contained in the dynamic whitelist to be executed on the multifunction printer. Any program that is not on the whitelist is considered unauthorized and will not be permitted to execute. This helps prevent worms, viruses, spyware, and other malware from compromising the device. A log of all prevented executions is available in the Audit Log when Runtime Intrusion Detection is enabled.

 

*Note: These features are only available on third-generation Canon imageRUNNER ADVANCE models and must be enabled. McAfee Embedded Control requires Unified Firmware Platform (UFP) v3.9.

 

Big Security for Big Printer Fleets

Printer Fleet Cybersecurity as a Service™

 
 

Often, many printers on corporate networks are not configured or maintained for cybersecurity. Many cybersecurity plans don’t even mention, let alone address, these elements. Printer fleets can number in the hundreds or thousands with many different makes, models, and ages of devices. Until now, there has been no way to affordably establish and maintain cybersecurity controls in printer fleets. The Answer: Printer Fleet Cybersecurity as a Service.™

Canon Solutions America has a solution designed to help economically and systematically address gaps in device security. It’s the perfect solution for any organization to tune and manage printer security and firmware updates and treat printers like the important computing devices they are. Even more important, we can help keep any brand of printer in your fleet configured and updated for optimal security, all while reducing the work your IT staff has to do with a concierge approach.

image of the Symphions Graphic Process

 
 
 

Guide

imageRUNNER ADVANCE
Hardening Guide

Download Now

White Paper

imageRUNNER ADVANCE
Security

imageRUNNER ADVANCE Security cover

Download Now

White Paper

imageCLASS/imageRUNNER
Security

imageCLASS/imageRUNNER Security cover

Download Now

Infographic

Device Security
Infographic

Device Security Infographic cover

Download Now

Brochure

Device Security Overview
Brochure

Device Security Overview Brochure cover

Download Now

Brochure

uniFLOW Device Security
Brochure

uniFLOW Device Security Brochure cover

Download Now

 

Are you ready to step up your security? Let’s talk.

Contact Us

 
 

Many variables can impact the security of a customer’s device and data. Canon does not warrant that the use of services, equipment, or related features detailed herein will eliminate the risk of potential malicious attacks, or misuse of devices or data or other security issues.

 

Device Security

Actions
Device Security