Ricoh Security Brochure PDF
Ricoh Security Brochure PDF
Ricoh Security Brochure PDF
Version 15
Information at Risk
National Security, Military and Trade Secrets Mergers and Acquisitions, Stock Transactions Clinical Trials, Patent Applications, Quarterly Financial Results Customer Lists, Executive Compensation, Restructuring Plans New Product Design (R&D), Intellectual Property Test Methods, Research Reports Briefs, Depositions, Contracts Audit Data, Financial Reports Billing, Medical Records
Verizon 2012 Data Breach Investigations Report, A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting and Information Security Service, Police Central e-Crime Unit and the United States Secret Service. http://www.verizonbusiness.com/resources/reports/rp_data-breach-investigations-report-2012_en_xg.pdf
Version 15
November 2012
This guide details Ricoh Security Solutions that were designed to best meet your objectives when securing digital office systems. This multi-layered approach will help close the door on those that wish to exploit vulnerabilities. In fact, whether your Ricoh systems are networked or non-networked, these fully integrated, cost-efficient solutions will help guard against prevalent security breaches, without disruption to normal (authorized) document workflow.
1
Plus
2
Plus
3
Plus
Secure Network Devices Secure Network Print Data Destroy Latent Data
User Codes Locked Print RAM-based Security SmartDeviceMonitor HDD Encryption Data Encryption DataOverwriteSecurity System Web Image Monitor Web SmartDeviceMonitor
User Codes Locked Print RAM-based Security SmartDeviceMonitor Data Encryption DataOverwriteSecurity System Removable Hard Drive Network Port Security HDD Encryption 128-bit Encryption over SSL / HTTPS NT Authentication Web Image Monitor
User Codes Locked Print RAM-based Security SmartDeviceMonitor Data Encryption DataOverwriteSecurity System Removable Hard Drive Network Port Security 128-bit Encryption over SSL / HTTPS NT Authentication Print Copy & Control Web Image Monitor
Web SmartDeviceMonitor Web SmartDeviceMonitor HDD Encryption IPv6 Kerberos Enhanced Locked Print Print Copy Scan (PCS) Director Card Authentication Package
Version 15 November 2012 2
Version 15
November 2012
Web Image Monitor Web Image Monitor is an integrated Web-based utility for device management. Set IP Address Range (IP Filtering) System administrators can restrict authorized connections to the print controller from those hosts whose IP addresses fall into a particular IP range. Commands or jobs sent from non-authorized IP addresses are ignored by the print controller. Network Port Security The system administrator can enable or disable IP ports, thus controlling the different network services provided by the print controller to an individual user.
*Note: SmartDeviceMonitor for Admin resides on the client desktop and allows users to determine the status and availability of Ricoh networked peripherals. Once installed, an icon is placed on each users desktop in the Windows Taskbar, which shows system status at a glance.
IP (Internet Protocol) Address Filtering In a LAN, an IP Address is each networked computers unique hardware number. Just like your street address with a house or apartment number, these addresses help route e-mails and attachments, forward faxes to the proper recipient, and send print data to networked output devices from originating PCs. The ability of Ricoh devices to block/restrict a particular end-user or set of end-users based on IP addresses improves the management of PCs and users, helps to balance output volumes among multiple devices, and enhances network security by limiting access to files stored in devices. Job Logs /Access Logs A complete listing of every job executed by the device is stored in memory. This list may be viewed via Web SmartDeviceMonitor to track and trace device usage by job and/or user. When used in conjunction with external user authentication modes, it will be possible to determine which specific users may be abusing a device. It is also possible to determine which device was used and by whom in tracing an unauthorized transmission. WPA Support (Wi-Fi Protect Access) Used in conjunction with the IEEE 802.11a/b/g Wireless LAN option, WPA is a security specification that addresses vulnerabilities in wireless communications. It provides a high level of assurance to enterprises, small businesses, and even home-based users that data will remain protected by allowing only authorized users to access their networks. Personal and Enterprise authentication and encryption features block intruders with wirelessly-enabled laptops from tapping into wireless networks in any environment, preventing the interception of data streams and passwords, or from using the wireless connection as an entry point into the customer data network. 802.1X Wired Authentication 802.1X provides Network-port based authentication for point-to-point communication between network devices and a LAN port. By providing a point-to-point connection to a LAN port, communication will terminate if the authentication fails. Data Encryption As mission critical data traverses the network it is possible for the knowledgeable hacker to intercept raw data streams, files, and passwords. The advent of wireless network technology, while increasing the convenience of surfing and printing for millions, also leaves networks vulnerable to attack from intruders armed with wireless laptops via any access points within range. Without protection, intelligible information can easily be stolen, or modified/falsified and re-inserted back into the network. Ricoh devices are equipped with the following encryption capabilities to help you reduce these risks.
Version 15
November 2012
Kerberos Kerberos is a network authentication protocol designed to provide strong authentication for client/server applications by implementing secret-key cryptography. Many internet protocols do not provide any security for their passwords. Hackers employ programs called sniffers to extract passwords to gain access to networks. Sending an unencrypted password over a network is risky and can open the network to attack. Kerberos authentication helps to limit the risks caused by unencrypted passwords and keep networks more secure. IPsec Communication IPsec (IP security) is a suite of protocols for securing Internet Protocol (IP) communications by authenticating and/or encrypting each IP packet in a data stream. IPsec also includes protocols for cryptographic key establishment. Organizations that require high levels of security have networks with IPsec for data protection. These organizations require printing using IPsec. S/MIME for Scan to E-mail S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for public key encryption and signing of e-mail encapsulated in MIME (Multipurpose Internet Mail Extensions). MIME is an Internet Standard that extends the format of e-mail to support text in character sets other than US-ASCII, non-text attachments, multi-part message bodies, and header information in non-ASCII character sets. This function is used to encrypt confidential data transmitted by Scan to E-mail for data protection against wiretapping.
Version 15
November 2012
Network Port Security Typically, network-enabled systems are shipped to the customer with all the network ports open, making the addition of these systems to different networks as easy as possible. Although making the network-enabled systems easy to install, opened unused network ports pose a security risk. To provide enhanced network security, Administrators can disable a specific protocol such as SNMP or FTP using Web Image Monitor or SmartDeviceMonitor. This prevents the theft of user names and passwords, as well as helping address outside threats including destruction/falsification of stored data, Denial of Service (DoS) attacks and viruses that can enter the network via an unused printer or MFP port. GlobalScan is a Web-based Content and Document Management Solution that enables select Ricoh systems to perform network scanning functions, specifically, scan to e-mail or folder, as well as perform OCR, fax and document management functions via optional plug-ins. This powerful, yet easyto-use, paper document capture and distribution system integrates seamlessly with your existing mail infrastructure to significantly boost workgroup productivity by combining scanning functionality within an accessible copier platform. GlobalScans enhanced security features include: Secure LDAP, Secure SMTP, Kerberos Authentication and Password Protected PDF.
Authenticate Users
Prevent Unauthorized System Usage: Authentication is an MFP security feature that restricts unauthorized users, or a group of users, from accessing system functions or changing machine settings. This important capability enables the system administrator to employ Access Limitation Management, helping to protect your MFP installed base from unapproved usage or tampering.
7
DocumentMall, a low cost application with many security features, provides Internet access to your documents from anywhere in the world, 24 hours a day, 7 days a week, enabling easy sharing and collaboration across disperse geographic boundaries.
Version 15
November 2012
User Authentication enables you to restrict machine access so that only those with a valid user name and password can access MFP functions. Windows Authentication verifies the identity of the MFP user by comparing login credentials (user name/password) against the database of authorized users on the Windows Network Server, thus granting or denying access to MFP functions. LDAP Authentication validates a user against the LDAP (Light-weight Directory Access Protocol) server, so only those with a valid user name/password can access your global address book, i.e., search and select e-mail addresses stored on the LDAP Server. Administrator Authentication A registered administrator manages system settings and user access to MFP functions. Up to four Administrators can share the administrative tasks, enabling the workload to be spread and limit unauthorized operation by a single administrator, though the same individual can assume all roles. In addition, a separate Supervisor can be established for setting or changing the administrator passwords. Basic Authentication Authenticates a user utilizing the user name/password registered locally in the MFPs Address Book. No one without a valid user name/password can access the machine. User Code Authentication Utilizes Ricohs standard User Code system to authenticate the user. The MFP operator simply enters their User Code, which is compared to the registered data in the MFPs address book. No one without a valid User Code can access the machine. Basic Authentication and User Code Authentication can be utilized in non-Windows and/or non-networked office environments. US Department of Defense Common Access Card (CAC) Authentication The Common Access Card (CAC) is a US DoD specialized ID card-based authentication system design for government users that must be compliant with the Homeland Security Presidential Directive -12 (HSPD-12). This Directive requires that all federal employees and contractors enhance security efficiently by reducing identity fraud through increased protection of personal privacy. The only customers for Ricohs CAC Authentication Solution is the U.S. Department of Defense (DoD) [US Army, Navy, Air Force, Marines, Coast Guard and affiliated agencies]. Personal Identity Verification (PIV) is the civilian U.S. government version of the CAC card.
ith J. Sm
ith J. Sm
ith J. Sm
2. Select Data Security for Copying1 all copy output that is made on a MFP equipped with the Copy Data Security Unit will be grayed out, leaving only a 0.16 (4mm) margin of masking pattern.
Notes: 1 Requires optional Copy Data Security Unit. Not supported on some Fax-enabled configurations. Copy reduction ratio less than 50% will be deactivated.
2
Closed Network With Closed Networks, the ID codes of the communicating machines are checked. If they are not identical, the communication is terminated, thus preventing possibly confidential documents from being transmitted intentionally or accidentally to the wrong location(s), i.e., outside the network. (Note: Closed Network requires all fax systems be Ricoh systems with closed network capability.) Confidential Transmission/Reception This feature enables the user to transmit/receive to a mailbox that is passcode-protected. Messages are only printed after the recipient enters the proper passcode, providing an enhanced level of security when communicating between machines. Memory Lock When Memory Lock is enabled, documents from all senders (or specific senders) are retained in memory. When the Memory Lock ID is entered from the control panel, the documents print, another form of security that prevents documents from sitting on a receive tray for passers-by to read. Networked Commercial Fax ITU-T Sub-address Routing Using a Sub-address, appended to a fax number, makes it possible to route a fax directly to the recipients PC, via their e-mail address. When received to a PC, confidentiality is maintained, i.e., only the recipient can view the message. IP-fax Ricoh Facsimile Systems, with NIC FAX Unit installed, support secure T.38 real-time IP-fax over a corporate Intranet, not only bypassing costly phone lines, but also operating securely behind the firewall.
Confidential Transmission/Reception
Version 15
November 2012
Restricted Access
Closed Network
Memory Lock
IP Fax
10
11
Version 15
November 2012
Areas of the MFP that have been tested to the IEEE 2600.1 Standard The following MFP functional areas have been validated to the IEEE 2600.1 standard. These areas have been identified as the most vulnerable for possible data breach. User Identification and Authentication systems Data Encryption technology available for the MFP systems Validation of the MFP systems firmware Separation of the analog fax line and copy/print/scan controller Validation of the data encryption algorithms DOSS Operation Product Certification Statement Ricoh Americas Corporation has a dynamic and evolving product offering. Please visit http://www.ricoh.com/about/security/products/mfp/cc/ for the most up-to-date product certification information. Ricoh is a forward looking company with a dynamic product line constantly being improved to meet our customers changing requirements. IEEE P2600.1/ISO 15408 Certification for Ricoh products is a constant process with ongoing certification updates and efforts. This being said the latest certification information may not be listed on this website. Please contact your Ricoh sales professional for the most up-to-date information regarding IEEE P2600.1/ISO 15408 Certification.
Version 15
November 2012
12
Web Image Monitor SmartDeviceMonitor Network Protocols ON/OFF Administrator Authentication Job Log/Access Log IP Address Filtering User Account Registration User Authentication Wi-Fi Protect Access (WPA) Kerberos 802.1X Wired Authentication U.S. DoD Common Access Card (CAC) Auth. 128-bit Secure Socket Layer (SSL) Address Book Encryption Encrypted PDF Transmission Driver Encryption Key PDF Password Encryption SNMP v3 Encryption S/MIME for Scan to Email IPsec Communication HDD Encryption Locked Print Password Encryption DataOverwriteSecurity System (DOSS) Locked/Secure Print/Enhanced Locked Print Password Protection of Stored Documents RAM-based Security* (If Hard Drive is Optional)
Color Multifunction
Aficio MP C6501/ C7501 Pro C550EX/ C700EX* Pro C900s
I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I
Aficio MP C300/SR/ I I C400/SR Aficio MP C3001/ C3501 Aficio MP C4501/ C5501 Aficio MP C2051/ C2551 Aficio MP C3502/ C3002 SPF Aficio MP C5502/ C4502 SPF Aficio SP C242SF
I I I I I I
Aficio MP C305SPF I I
I I I I I I
* Note: The Pro C550EX/Pro C700EX and Fiery controllers have separate security features. The security features listed above are for the mainframe GW controller only. If the mainframe is configured with the Fiery, the Fiery's security features take precedence.
13
Removable Hard Drive Unauthorized Copy Control Mask Type for Copying Copy Data Security Option Mandatory Security Information Print
Version 15
November 2012
Data Encryption
Document Protection
Security Certs.
Web Image Monitor SmartDeviceMonitor Network Protocols ON/OFF Administrator Authentication Job Log/Access Log IP Address Filtering User Account Registration User Authentication Wi-Fi Protect Access (WPA) Kerberos 802.1X Wired Authentication U.S. DoD Common Access Card (CAC) Auth. 128-bit Secure Socket Layer (SSL) Address Book Encryption Encrypted PDF Transmission Driver Encryption Key PDF Password Encryption SNMP v3 Encryption S/MIME for Scan to Email IPsec Communication HDD Encryption Locked Print Password Encryption DataOverwriteSecurity System (DOSS) Locked/Secure Print/Enhanced Locked Print Password Protection of Stored Documents RAM-based Security* (If Hard Drive is Optional) Removable Hard Drive Unauthorized Copy Control Mask Type for Copying Copy Data Security Option Mandatory Security Information Print
Aficio MP 4001SP/ I I MP 5001SP Aficio MP 4000B/ 4000/SPF Aficio MP 5000B/ 5000/SPF Aficio MP 6001/ 7001/8001/9001
I I I I I I
Pro 907EX/1107EX/ I I 1357EX Aficio MP 201F/ 201SPF Aficio SP 5200S/ 5210SF/5210SR Aficio SP 1200SF Aficio MP 301SPF Aficio SP 3400/ 3410 SF Aficio SP 3510 SF Aficio SP 4410SF (SFgx) Aficio MP 2352/ 2852/3352 SPF Aficio MP 5002/ 4002/SPF Aficio MP 6002/ 7502/9002 SPF
1
I I
I I
I1 I1 I1 I1 I1 I1 I2 I1 I1 I I I I I I I I I
I1 I1 I1 I1 I1 I1 I1 I1 I1 I1 I1 I1 I1 I I I I I I I I I I I I I
Version 15
November 2012
Web Image Monitor SmartDeviceMonitor Network Protocols ON/OFF Administrator Authentication Job Log/Access Log IP Address Filtering User Account Registration User Authentication Wi-Fi Protect Access (WPA) Kerberos 802.1X Wired Authentication U.S. DoD Common Access Card (CAC) Auth. 128-bit Secure Socket Layer (SSL) Address Book Encryption Encrypted PDF Transmission Driver Encryption Key PDF Password Encryption SNMP v3 Encryption S/MIME for Scan to Email IPsec Communication HDD Encryption Locked Print Password Encryption DataOverwriteSecurity System (DOSS) Locked/Secure Print/Enhanced Locked Print Password Protection of Stored Documents RAM-based Security* (If Hard Drive is Optional) Removable Hard Drive Unauthorized Copy Control Mask Type for Copying Copy Data Security Option Mandatory Security Information Print
Color Printers
Aficio SP C231N/ C232DN Aficio SP C420DN
I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I
Aficio SP C420DN-KP I I HotSpot Aficio SP C820DN Aficio SP C821DN Aficio GX2500 Aficio GX3000* Aficio GX3050N* Aficio GX5050N* Aficio GX7000 Pro C900
I I I I I I I I
Aficio GX e3300N* I I
I I
Aficio GX e3350N* I I
I I
Aficio GX e5550N* I I
I I I I
Pro C651EX/C751EX I I
GX3000/3050N/5050N does not use the same Web Image Monitor as the other Ricoh printers. The browser is developed by Silex Technology and will be slightly different from the other models. *The GX3000/GX e3300N/GX3050N/GX e3350N/GX5050N/GX e5550N support IP address filtering feature only. Mac address filtering is not supported. Locked/Secure Print is only available if the Hard Disk is installed
15
Version 15
November 2012
Version 15 Aficio SP 5100N Aficio SP 1210N Aficio SP 1210N Aficio SP 4310N Aficio SP 4210N Aficio SP 6330N Aficio SP 4100NL Aficio SP 3400n/ SP 3410D
I I I I I I I I I I I I I I I I I I I I I I I I
Aficio SP 3510DN
I I
Aficio SP 5210DN
Aficio SP 9100DN
Aficio SP 5200DN
Aficio SP 8200DN
November 2012
I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I
Web Image Monitor SmartDeviceMonitor Network Protocols ON/OFF Administrator Authentication Job Log/Access Log IP Address Filtering User Account Registration User Authentication Wi-Fi Protect Access (WPA) Kerberos 802.1X Wired Authentication U.S. DoD Common Access Card (CAC) Auth. 128-bit Secure Socket Layer (SSL) Address Book Encryption Encrypted PDF Transmission Driver Encryption Key PDF Password Encryption SNMP v3 Encryption S/MIME for Scan to Email IPsec Communication HDD Encryption Locked Print Password Encryption DataOverwriteSecurity System (DOSS) Locked/Secure Print/Enhanced Locked Print Password Protection of Stored Documents RAM-based Security* (If Hard Drive is Optional) Removable Hard Drive Unauthorized Copy Control Mask Type for Copying Copy Data Security Option Mandatory Security Information Print IEEE 2600.1/ISO 15408 Certification
Security Certs.
16
The content of this document, and the appearance, features and specifications of Ricoh products and services are subject to change from time to time without notice. Products are shown with optional features. While care has been taken to ensure the accuracy of this information, Ricoh makes no representations or warranties about the accuracy, completeness or adequacy of the information contained herein, and shall not be liable for any errors or omissions in these materials. The only warranties for Ricoh products and services are as set forth in the express warranty statements accompanying them. Nothing herein shall be construed as constituting an additional warranty. Your actual results, including print speed and other performance measures, will vary depending upon your use of the products and services, and the conditions and factors affecting performance. THERE ARE NO GUARANTEES THAT YOU WILL ACHIEVE RESULTS SIMILAR TO OURS. RICOH DOES NOT PROVIDE LEGAL, TAX, ACCOUNTING OR AUDITING ADVICE, OR REPRESENT OR WARRANT THAT OUR PRODUCTS OR SERVICES WILL GUARANTEE OR ENSURE COMPLIANCE WITH ANY LAW, REGULATION OR SIMILAR REQUIREMENT. Customer is responsible for making the final selection of products, solutions and technical architectures, and for ensuring its own compliance with various laws such as the Gramm-Leach-Bliley Act, the Sarbanes-Oxley Act and the Health Insurance Portability and Accountability Act (HIPAA).
www.ricoh-usa.com
Ricoh Americas Corporation, 70 Valley Stream Pkwy, Malvern, PA 19355, 1-800-63-RICOH Ricoh and the Ricoh logo are registered trademarks of Ricoh Company, Ltd. Windows and Windows 3.1/95/98/Me/NT 4.0/2000/XP are registered trademarks of Microsoft Corporation. All other trademarks are the property of their respective owners. Print speed may be affected by network, application or PC performance. Specifications and external appearances are subject to change without notice.