facebook
DATALINE OFFICE SYSTEMS, Copiers & Copier Supplies, Lubbock, TX

Secured MFP

Your business may be at risk - Data-Line can help.

Document Security is a growing concern for small, medium and large business alike, and this concern is growing each day. With the Secure MFP, all businesses can have the same peace of mind that their company and customer information is secure. With Toshiba SecureMFP, we employ innovative methods of protecting valuable data in order to help businesses of all sizes meet the increasing security challenges we face today. Toshiba has taken the lead by insuring that all Digital Copiers incorporate Data Encryption and Data Erase as a standard feature. This is an important step for you, your company, and your customers by insuring that your valuable information is "SECURE".

Device Security

In order to protect the confidentiality and integrity of your data, we continually develop comprehensive security measures for Toshiba devices. Our Advanced Encryption functionality provides on-the-fly encryption and decryption of data written to the device’s hard drive. The Data Overwrite Kit ensures that all data is erased after every fax, copy, scan and print job in order to prevent the latent storage of valuable data on the device. Because MFPs and network printers function as complex network devices, we have developed several solutions that specifically address network security.

IPv6 ensures IP security with a larger IP address range, protection from scanning and attacks, and support for authentication and confidentiality as part of our optional IPsec©. Secure Sockets Layer (SSL)© employs encryption technology to protect all data traveling to and from the MFP, while IP Filtering acts like a firewall to protect your internal network from intruders. Also, SMB Signing adds a digital signature to verify that data is received from authenticated sources and ensures the integrity of all communications.

Encompass Security Assessment

Toshiba utilizes innovative security technologies and expert personnel who are trained and certified as part of our EncompassTM Security Vulnerability Assessment Program. Our Professional Services Consultants are experienced in analyzing and assessing device, fleet and enterprise document security.

Multiple points of vulnerability are assessed, including many brands and devices that may not be manufactured by Toshiba. After analyzing possible security risks, our experts provide you with a tailored security plan and help you implement it efficiently and effectively.

Our EncompassTM Security Assessment includes four areas of focus: device security, access security, document security, and end of life security.

Document Security

The Association of Certified Fraud Examiners found that companies in the United States lose more than $600 billion a year due to fraud, and document fraud is a large part of this statistic. Now that MFPs (Multifunction Products) and laser printers are able to store data, they’ve become an integral part of business networks, and a critical point of vulnerability. They retain latent document images and contact information, leaving sensitive information and mission-critical data at risk. These threats to security can come from anyone, anywhere. The 2009 Data Breach Investigation Report found that 74% of security breaches resulted from external sources and 20% were traced to insiders. Reports from a variety of resources have come to these same conclusions: data theft is common, it happens regularly, and everyone is aware that it’s a serious problem.

That’s why we deliver serious security solutions. In addition to protecting against security breaches and possible litigation, we assist in keeping businesses compliant with ever-increasing government regulations such as HIPAA, FERPA, Sarbanes-Oxley, and eDiscovery.

Access Security

Toshiba has developed simple, yet highly effective methods of establishing access security without inconveniencing users. Network Authentication allows administrators to control access at the device in the same way it’s controlled from the desktop. Department Codes provide valuable data tracking and usage information, giving authorized users full functionality at the device. Usage Limitations enable administrators to set limits for copy and print jobs, as well as track and control costs. Strong Passwords utilizes a ten-digit alphanumeric administrative password for added protection along with a log-on attempt limitation. To streamline the user login process, our SmartCard Authentication requires the simple swipe of a card while allowing limited user access to specific features and functions.

End-Of-Life Data Scrub

Whenever the lease has ended for a particular device, it’s important to be certain all of your critical data is removed from the hard drive before it leaves the premises. Toshiba devices, as well as many other brands, can be scrubbed to remove any and all information that may still be stored on the drive. We recommend an end-of-life policy up front as part of your EncompassTM Security Assessment.