Sponsored

HP User Authentication

Sharing printers means thinking about security and accountability, both of which rely on robust user authentication

Sharing a printer in a business environment makes a lot of economic sense, and consolidating print resources in fewer, larger printers extends this financial wisdom, but can create security issues. If the same printer is shared among employees at different levels of the management structure, it may be important to ensure confidentiality for documents.

Advertisement - Article continues below

It's also usually important to be able to allocate printing costs between departments or even to individuals and for both these reasons, user authentication is an important feature of HP enterprise-level printers, such as the LaserJet Enterprise Flow MFP M880z.

This machine has very flexible authentication facilities, ensuring that individuals can send print jobs and delay printing until they sign in at the printer. The process of calling up a job already sent, when you're at the control panel of the printer is called pull printing'. At the simplest level, a PIN can be used for identification, but Windows, Kerberos and LDAP authentication is also available.

Not everybody needs the same level of access to multi-function devices and HP's FutureSmart tool works with corporate IT policies to allocate permissions separately for scanning, copying, printing and for direct sending of documents from the control panel of the machine, internally or externally through email.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Authentication can be tied in with physical access methods, such as proximity cards and smartcards, by adding third-party readers into the hardware integration pocket provided on the machine. This interface enables a hardware device to be attached to the MFP and integrated with its operating system, so information gleaned from hardware readers can be used as all or part of effective authentication.

Near Field Communication (NFC) is also supported, with tap-to-print from enabled devices ensuring that a direct link can be set up with the printer, simply by bringing the device into proximity with the machine.

An extension of this technology, tap-to-authenticate, will be introduced in Spring 2014. If required, NFC can be combined with other authentication methods, such as a password or PIN, to prevent the use of an NFC device by somebody other than its owner.

Anybody needing to ensure that a document stays secure from originating computer to printer can encrypt it and send it to the LaserJet Enterprise Flow MFP M880z's secure 320GB hard drive. Encryption on the drive is to the AES256 standard, so even if the hard drive were physically removed from the printer, data on it would be extremely hard to retrieve. As an option, the drive can be physically constrained under lock and key within the printer too.

Advertisement - Article continues below

This kind of end-to-end Secure Encrypted Printing is enabled by the latest version of HP's Universal Printer Driver, which incorporates the same symmetric AES256 encryption as on the secure hard drive, to ensure documents retain their encryption all the way through the printing process.

To do this, the creator of the document enters a password at the time of scanning or issuing the print job and again when pulling the job through to get it printed or to view the result of the scan.

The passwords used to access print jobs are themselves encrypted, so can't be obtained from the printer and there's secure erasure of completed jobs, in line with NIST Special Publication 800-88 recommendations. This includes overwriting print files with random data.

Depending on the areas in which a company undertakes business, user authentication can be a very important consideration. HP combines hardware and software authentication, which can be combined together for dual-source or multi-source validation, all within the multifunction printer itself.

Advertisement - Article continues below

By providing industry and government standards for document security, authentication becomes part of a complete security system, designed to work with a company's existing security regime. It ensures the only people to receive hard copy are those authorised to see it.

For more advice on transforming your business, visit HP BusinessNow

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now
Advertisement
Advertisement

Recommended

Visit/hardware/monitors/356368/hp-dreamcolor-z27x-g2-review-picture-perfect
monitors

HP DreamColor Z27x G2 review: Picture perfect

7 Jul 2020
Visit/hardware/peripherals/356346/epson-workforce-wf-110w-review-portable-perfection
peripherals

Epson WorkForce WF-110W review: Portable perfection

3 Jul 2020
Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020

Most Popular

Visit/mobile/google-android/356373/over-2-dozen-additional-android-apps-found-stealing-user-data
Google Android

Over two dozen Android apps found stealing user data

7 Jul 2020
Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/cloud/356260/the-road-to-recovery
Sponsored

The road to recovery

30 Jun 2020