Printer security protects devices, data, and documents

With industry-leading intrusion detection, self-healing firmware, and authentication-based 'pull' printing, HP A3 MFPs keep sensitive information and your network safe.

Movie fans of a certain age will remember iconic films where the super-spy sneaks into the villain's office and snaps photos of secret documents with a miniature camera.

As quaint as these old-school espionage tactics seem, it's actually even easier today for criminals to intercept and exfiltrate data - or for sensitive information to be leaked inadvertently - because of unsecure printers and printing processes.

Network-connected printers are endpoints, just like employee PCs. Companies may spend millions on network security and endpoint protection, but printers are often overlooked. Earlier this year, executives from HP spoke with ZDNet about vulnerabilities exposed by unmonitored printers and copiers. "Typically, we're seeing the printer gets left out and overlooked and left exposed. Businesses can no longer afford to overlook print when it comes to their overall IT cybersecurity strategy," said Ben Vivoda, director of printing systems for HP South Pacific.

Provided by HP

Examples cited in the story include one bad actor who stole samples of a company's invoices from a printer tray and rerouted payments, and a case where a rival got hold of one firm's intellectual property and trade secrets over the course of months.

These issues are plaguing the highest levels of government in the US, as well. In a recent ZDNet story about information leaks at the NSA, Editor in Chief Larry Dignan wrote: "Printer security and management have been primarily a cost issue at this point, but the Internet of Things and cybersecurity issues have exposed these relatively boring endpoints as a risk."

The risks are very real, in fact, and they extend from hardware to software to network connections and paper output. Of particular concern is malware that may be installed on the printer itself; this kind of attack can go unnoticed for months or longer while it siphons data and provides hackers with an entry point to the network.

These scenarios are especially problematic for industries where many sensitive business details are shared and disseminated on paper - such as manufacturing, construction, and insurance - and where private information is subject to regulation - such as in healthcare and finance.

Companies that are concerned about security and regulatory compliance must make printer and document protection a priority. That's where HP's new A3 MFPs (multifunction printers) come into play.

HP has been positioned as a leader in the IDC MarketScape Report.2

Big pages, big security

Last fall, IDC named HP a leader in its first "MarketScape for Security Solutions and Services from Hardcopy vendors" report. Analysts Robert Palmer and Allison Correia write:

"HP's approach to security takes the entire print and document infrastructure into account, beginning with locking down the device and extending into all aspects of device usage and content protection... Organizations should consider HP Inc. when ongoing threat monitoring and risk remediation within the print and document infrastructure is crucial to business operations."

In response, Tuan Tran, General Manager and Global Head of Office Printing Solutions at HP, said: "From elevating awareness of the security risks facing organizations to best-in-class print fleet threat monitoring and risk remediation, security is at the heart of everything we do."

HP's family of A3 MFPs, which print as large as 11 x 17, include the most advanced print security features available today1:

  • HP Sure Start inspects the BIOS at boot-up. If there's any sign of compromise, it 'self-heals' by deleting the infected software and loading a pristine copy of the BIOS that's hidden directly in the printer.
  • Whitelists ensure that only firmware certified and signed by HP can be loaded onto the MFPs.
  • Run Time Intrusion Detection monitors the device memory for unusual activity. If anything is amiss, the device reboots and self-heals.
  • HP Connection Inspector evaluates outbound network connection requests from the printer. Suspicious activity, once again, triggers a self-healing reboot.

HP's A3 MFPs include data encryption features for sensitive documents and a secure cloud queue for companies where workers may be collaborating across several office locations. The result is a comprehensive set of security measures that protect data, devices, and documents without requiring heavy intervention from IT.

HP also draws on its decades of expertise in print technology to offer consultative services for companies that are concerned about print security. HP solution designers can tailor secure printing solutions to meet the needs of any-sized business in any industry.

To learn more about HP's A3 MFPs, please click here.

To learn more about HP Print Security, please click here.

1 HP's most advanced embedded security features are available on HP Enterprise-class devices with FutureSmart firmware 4.5 or above and is based on HP review of 2017 published embedded security features of competitive in-class printers. Only HP offers a combination of security features for integrity checking down to the BIOS with self-healing capabilities. For more information visitFor more information visit: hp.com/go/printersecurityclaims.
2 IDC MarketScape: Worldwide Security Solutions and Services Hardcopy 2017 Vendor Assessment, by Allison Correia and Robert Palmer, Oct 2017, IDC Doc#US41988517. IDC MarketScape vendor analysis model is designed to provide an overview of the competitive fitness of ICT suppliers in a given market. The research methodology utilizes a rigorous scoring methodology based on both qualitative and quantitative criteria that results in a single graphical illustration of each vendor's position within a given market. The Capabilities score measures vendor product, go-to-market and business execution in the short-term. The Strategy score measures alignment of vendor strategies with customer requirements in a 3-5-year timeframe. Vendor market share is represented by the size of the circles. Vendor year-over-year growth rate relative to the given market is indicated by a plus, neutral or minus next to the vendor name.