Sponsored

HP User Authentication

Sharing printers means thinking about security and accountability, both of which rely on robust user authentication

Sharing a printer in a business environment makes a lot of economic sense, and consolidating print resources in fewer, larger printers extends this financial wisdom, but can create security issues. If the same printer is shared among employees at different levels of the management structure, it may be important to ensure confidentiality for documents.

It's also usually important to be able to allocate printing costs between departments or even to individuals and for both these reasons, user authentication is an important feature of HP enterprise-level printers, such as the LaserJet Enterprise Flow MFP M880z.

This machine has very flexible authentication facilities, ensuring that individuals can send print jobs and delay printing until they sign in at the printer. The process of calling up a job already sent, when you're at the control panel of the printer is called pull printing'. At the simplest level, a PIN can be used for identification, but Windows, Kerberos and LDAP authentication is also available.

Not everybody needs the same level of access to multi-function devices and HP's FutureSmart tool works with corporate IT policies to allocate permissions separately for scanning, copying, printing and for direct sending of documents from the control panel of the machine, internally or externally through email.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Authentication can be tied in with physical access methods, such as proximity cards and smartcards, by adding third-party readers into the hardware integration pocket provided on the machine. This interface enables a hardware device to be attached to the MFP and integrated with its operating system, so information gleaned from hardware readers can be used as all or part of effective authentication.

Near Field Communication (NFC) is also supported, with tap-to-print from enabled devices ensuring that a direct link can be set up with the printer, simply by bringing the device into proximity with the machine.

An extension of this technology, tap-to-authenticate, will be introduced in Spring 2014. If required, NFC can be combined with other authentication methods, such as a password or PIN, to prevent the use of an NFC device by somebody other than its owner.

Anybody needing to ensure that a document stays secure from originating computer to printer can encrypt it and send it to the LaserJet Enterprise Flow MFP M880z's secure 320GB hard drive. Encryption on the drive is to the AES256 standard, so even if the hard drive were physically removed from the printer, data on it would be extremely hard to retrieve. As an option, the drive can be physically constrained under lock and key within the printer too.

This kind of end-to-end Secure Encrypted Printing is enabled by the latest version of HP's Universal Printer Driver, which incorporates the same symmetric AES256 encryption as on the secure hard drive, to ensure documents retain their encryption all the way through the printing process.

To do this, the creator of the document enters a password at the time of scanning or issuing the print job and again when pulling the job through to get it printed or to view the result of the scan.

Advertisement - Article continues below

The passwords used to access print jobs are themselves encrypted, so can't be obtained from the printer and there's secure erasure of completed jobs, in line with NIST Special Publication 800-88 recommendations. This includes overwriting print files with random data.

Depending on the areas in which a company undertakes business, user authentication can be a very important consideration. HP combines hardware and software authentication, which can be combined together for dual-source or multi-source validation, all within the multifunction printer itself.

By providing industry and government standards for document security, authentication becomes part of a complete security system, designed to work with a company's existing security regime. It ensures the only people to receive hard copy are those authorised to see it.

For more advice on transforming your business, visit HP BusinessNow

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/hardware/354336/the-it-pro-products-of-the-year-2019-all-the-years-best-hardware
Hardware

The IT Pro Products of the Year 2019: All the year’s best hardware

24 Dec 2019
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/printers/29013/best-printers
Hardware

Best printers 2020

18 Dec 2019
Visit/hardware/peripherals/354337/lexmark-c3224dw-review-cheap-but-not-necessarily-good-value
peripherals

Lexmark C3224dw review: Cheap, but not necessarily good value

14 Dec 2019

Most Popular

Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/operating-systems/microsoft-windows/354526/memes-and-viking-funerals-the-internet-reacts-to-the
Microsoft Windows

Memes and Viking funerals: The internet reacts to the death of Windows 7

14 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020