Information is your customer’s most valuable asset. ‘Information’ can mean classified, confidential, or otherwise sensitive documents—anything from floor plans to personnel reviews. The risk of information getting into the wrong hands is real, and that is why every business needs to implement effective strategies to protect their information assets.
High risk sectors
Digital technology has transformed business practices by enabling nearly instantaneous data exchange, but it has brought with it some new challenges in terms of security. The risk can expose your customers to diminished competitive advantage, and possible litigation or erosion of stockholder trust.
These can be considered high-risk sectors:
- Federal government—national security, military, and trade sectors
- Financial—mergers and acquisitions, stock transactions
- Pharmaceutical—clinical trials, patent applications, quarterly financial results
- General offices—customer records, restructuring plans
- Engineering—new product design, intellectual property
- Law firms—briefs, depositions, contracts
- Medical—billing, medical records
Ricoh’s security features
By providing customised security features for your customers, you can develop a comprehensive suite of security solutions. These security solutions can protect printed and electronic data against opportunistic or targeted threats, both internal and external.
This document provides you with an overview of these security measures that are designed to best meet your customer’s objectives when securing digital office systems:
- Restricting unauthorised device access
- Controlling device output
- Securing network devices
- Securing network print data
- Destroying latent data
- Physically securing data and port
- Encrypting data communications
- Preventing unauthorised system use
- Auditing all device activity
- Preventing unauthorised copying
- Displaying who, when, and from where output was printed.
Restricting unauthorised devices access
User codes
User codes are standard in most Ricoh devices. They enable the system administrator to manage and track the use of Ricoh digital output devices. A user code can be assigned to an individual, based on the functions they have permission to use. This level of control enables the administrator to monitor system usage, by generating print counter reports by a user code and function.
Controlling device output
Locked print
Locked print is available through Ricoh’s advanced printer drivers, and it maintains confidentiality by suspending document printing until the authorised user enters the correct user ID from the device’s operation panel. This eliminates the possibility of anyone viewing or removing a document from the paper tray.
Locked print requires a HDD.
Locked print password encryption
The password used for locked printing can be encrypted to help protect against wiretapping.
Enhanced Locked Print NX
Enhanced Locked Print NX lets users capture all the benefits of shared, centralised multifunction products (MFPs), without compromising document security. Users can store, release, and manage confidential documents with the security of user ID and password authorisation.
It offers these benefits:
- Users can safely send documents to devices where they are securely held until released by the authorised user
- Documents cannot be picked up at the device by another user, protecting information confidentiality
- Documents stored at the device are encrypted, therefore information cannot be compromised if the HDD is stolen.
The FlexRelease server option provides even more flexibility, in enabling prints to be picked up from any Ricoh device in the company network.
Enhanced Locked Print NX can be implemented with Ricoh’s optional CardAuthentication Package for faster and more secure device access.
Card Authentication Package
Card Authentication Package improves security while making it easier and faster for users to authenticate and access networked MFPs. User privileges can be managed with security cards that restrict colour printing, regulate scanning, and provide users with secure printing of confidential documents.

RAM-based security
Some Ricoh MFPs use Random Access Memory (RAM), instead of an HDD, for document processing tasks such as copying. Without the means to permanently store data, such as on an HDD, a key security threat is eliminated. As such, these MFPs can be proposed for low-volume environments where information security is the top priority.
Securing network devices
SmartDeviceMonitor for Admin
SmatDeviceMonitor for Admin is utility software bundled with all Ricoh printers, print-enabled MFPs, and the Printer/Scanner option. This software suite simplifies installation, monitoring, and management of Ricoh network output systems, while supporting key security features.
Tracking device usage
SmartDeviceMonitor for Admin tracks the activities of an entire system, providing a detailed log of all devices accessed by each user or department.
Restricting user access
The system administrator can control user privileges through the User Management Tool. It displays all supported Ricoh devices on the network, and a simple click on the device opens a menu to restrict or enable access to the device for individual users.
Web Image Monitor
Web Image Monitor is an integrated web-based utility for device management.
Setting IP address range (IP filtering)
The system administrator can restrict authorised connections to the device from the hosts whose IP addresses fall into a particular IP range. Commands or jobs sent from unauthorised IP addresses are ignored by the device.
Network port security
The system administrator can enable or disable IP ports, controlling the different network services provided by the device to an individual user.
IP address filtering
In a Local Area Network (LAN), an IP address is each network computer’s unique hardware number. An IP address helps route emails and attachments, forward faxes to the correct recipient, and send print data to networked output devicesfrom PCs. The ability of Ricoh devices to block or restrict a particular user or a group of users based on IP addresses, improves the management of PCs and users, helps to balance output volumes among multiple devices, and enhances network security by limiting access to files stored on devices.
Job logs and Access logs
A complete list of every job executed by the device is stored in memory. This list may be viewed via Web SmartDeviceMonitor to track and trace device usage by job and/or user.
When used in conjunction with external user authentication modes, it will be possible to determine which specific users may be abusing privileges to resources. It’s also possible to determine which device was used and by whom in tracing an unauthorised transmission.

WPA support
Used in conjunction with the IEEE802.11 Wireless LAN option, Wi-Fi Protected Access (WPA) is a security specification that addresses vulnerabilities in wireless communications. It provides a high level of assurance to enterprises, small businesses, and even home-based users that data will remain protected by allowing only authorised users to access their networks. ‘Personal’ and ‘Enterprise’ authentication and encryption features block intruders with wirelessly-enabled laptops and other mobile devices from tapping into wireless networks in any environment. This prevents the interception of data streams and passwords, or prevents using wireless connections as an entry point into the customer’s data network.
802.1x wired authentication
802.1x provides network port based authentication for point-to-point communication between network devices and a LAN port. By providing a point-to-point connection to a LAN port, communication will terminate if authentication fails.
Data encryption
Advanced network technologies increase the convenience of surfing and printing for millions, but also leave networks vulnerable to attack from intruders using wireless laptops or other mobile devices via any access points within range. Without protection, confidential information can easily be stolen, or modified and reinserted back to the network.
Ricoh devices provide these encryption capabilities to help your customers reduce these risks:
Address book encryption
Address book encryption protects contact information by encrypting the data stored in a device’s address book. Even if the HDD is removed from the device, the data cannot be read. This feature eliminates the danger of a company’s or department’s entire staff, customers, or vendors being targeted for malicious emails or PC virus contamination. Also, as address book data usually corresponds to usernames and passwords used elsewhere on the network, protecting a device’s address book increases overall network security.
Encrypted PDF transmission
While Adobe offers a number of security features within the Acrobat application to lock and password-protect documents, there is nothing to prevent data being obtained from the files while travelling over the network. That’s where Ricoh’s Encrypted PDF transmission adds value—scrambling and encrypting the data that would otherwise be very transparent during transmission.
HDD encryption
This feature can encrypt the device’s HDD to protect against data theft. Even if the HDD is stolen, data cannot be extracted.
Driver encryption key
Ricoh devices offer this feature that scrambles user authentication passwords when using the PCL and RPCS drivers, so others cannot access the system fraudulently.
PDF password encryption
This function corrects vulnerability in Encrypted PDF transmission in a way that the window for entering the user passwords displays the password in clear text. It encrypts passwords up to 32 characters for more secure PDF transmission and storage.

SNMP v3 encrypted communication
Simple Network Management Protocol version 3 (SNMP v3) is a network management standard widely used in TCP/IP environments. It provides a method of managing network hosts, such as printers, scanners, workstation or server computers, and groups bridges and hubs together into a ‘community’ from a centrally-located computer running network management software. It allows the system administrator, for example, to make changes to device settings via SmartDeviceMonitor for Admin from a networked PC with encrypted communications to help a business maintain a secure environment.
Kerberos
Kerberos is a network authentication protocol designed to provide strong authentication for client/server applications by implementing secret-key cryptography. Many internet protocols don’t provide any security for their passwords, and sending an unencrypted password over a network is risky and can open the network to attack. Kerberos authentication helps to limit the risks caused by unencrypted passwords and keep networks more secure.
IPsec communication
IP security (IPsec) is a suite of protocols for securing Internet Protocol (IP) communications by authenticating and/or encrypting each IP packet in a data stream. IPsec also includes protocols for cryptographic key establishment. Organisations that require high levels of security have networks with IPsec for data protection. These organisations require printing using IPsec.
S/MIME for Scan to email
Secure/Multipurpose Internet Mail Extensions (S/MIME) is a standard for public key encryption and signing of email encapsulated in MIME. This feature is used to encrypt confidential data transmitted by Scan to email for data protection against wiretapping.
Securing network print data
Data encryption via IPP
Using Ricoh’s SmartDeviceMonitor for Client utility, print data can be encrypted by means of Secure Sockets Layer/Transport Layer Security (SSL/TLS) via the Internet Printing Protocol (IPP), hence, securing data between workstations and network printers and MFPs.
Destroying latent data
Data Overwrite Security System (DOSS)
To further prevent data loss, an organisation’s security measures should incorporate technology that destroys latent digital images on the device’s HDD. Ricoh Data Overwrite Security System (DOSS) destroys temporary data stored on the device’s HDD by writing over the latent image with random sequences of 1’s and 0’s.
It offers these benefits:
- Three-pass random data overwrite process makes any effort to access and reconstruct stored print and copy files virtually impossible
- A simple operation panel icon provides visual feedback about the overwrite process, for example, completed or in-progress
- DOSS is ISO 15408 certified.
Physically securing data and ports
Network port security
Typically, network-enabled systems are shipped to the customer with all network ports ‘open’, making the addition of these systems to different networks as easy as possible. However, there is also a drawback in this, as opened unused network ports pose a security risk.
To provide enhanced network security, the system administrator can disable a specific protocol such as SNMP or FTP using Web Image Monitor or SmartDeviceMonitor. This prevents the theft of usernames and passwords, and helps address outside threats, including destruction or falsification of stored data, and viruses that can enter the network via an unused printer or MFP port.
Encrypting data communication
128-bit encryption over SSL
Ricoh’s GlobalScan NX supports 128-bit encryption over SSL. SSL technology works by using a private key to encrypt data that is scanned from a Ricoh MFP to the GlobalScan NX server, creating a secure connection.
Preventing unauthorised system use
User authentication
Enables the system administrator to restrict device access so that only those with a valid username and password can access MFP functions.

Windows authentication
Verifies the identity of the MFP user by comparing login username and password against the database of authorised users on the Windows Network Server, and then granting or denying access to MFP functions.
LDAP authentication
Validates a user against the Light-weight Directory Access Protocol (LDAP) server, and only those with a valid username and password can access the organisation’s global address book—that is, search and select email addresses stored on the LDAP server.
Administrator authentication
A registered administrator manages system settings and user access to MFP functions. Up to four administrators can share the administrative tasks, enabling the workload to be spread and limit unauthorised operation by a single administrator—though the same individual can assume all roles. In addition, a separate supervisor can be established for setting or changing administrator passwords.
Basic authentication
Authenticates a user with the username and password that have been locally registered in the MFP’s address book. Users without a valid username and password cannot access the device.
User code authentication
Based on Ricoh’s standard user code system to authenticate the user. The MFP user simply enters their user code which is compared with the registered data in the MFP’s address book.
Basic authentication and User code authentication can be used in non-Windows and/or non-networked office environments.
Auditing all device activity
Ricoh Print and Copy Control (PCC) for Equitrac Office and Express
Ricoh Print and Copy Control (PCC) enables customers to better control user access and track copy and print information via software embedded on the HDDs of some Ricoh devices. It protects sensitive data and prevents unauthorised use with the authentication method that fits your customer’s business.
Preventing unauthorised copying
Unauthorised copy control
Ricoh’s Unauthorised copy control embeds patterns and text under printed text to help eliminate the risk of unauthorised copying of sensitive documents. This feature is ideal for smaller businesses that primarily use the device for fax, and copy and print output. For example, companies that copy personnel reports, compensation plans, medical records, financial reports, and so on.
Unauthorised copy control consists of two functions:
- Mask Type for Copying is a standard feature that embeds a masking pattern and message within the original printout. If copies are made, either on the Ricoh or competitor’s digital devices, the embedded message is displayed. Note that some digital MFPs may not detect masking patterns.
- Data Security for Copying can be selected for output that is produced on an MFP equipped with the Copy Data Security unit. It will grey out all output, leaving only a 4 mm margin of masking pattern. This feature requires the optional Copy Data Security unit, and is not supported on some fax-enabled configurations.
Displaying who, when, and from where output was printed
Mandatory security information print
Mandatory security information print is a feature that includes information about who printed the document, when, and from which device.
Mandatory security information can include this information:
- Date and time when the job was printed
- Name and login user ID of the user who printed the job
- IP address of the device that printed the job
- Serial number of the device that printed the job.
The system administrator can select which type of information is printed on the output. The print position can be changed from the default lower right position to upper left, upper right, or lower left.
Comments
Post a Comment