Printer security
The printing infrastructure is seen by organizations as one of the biggest security risks. HP Wolf Security seeks to eliminate new attacks and provides protection at three levels: device, data and document.
Device
HP Sure Start
HP Sure Start
Validates firmware as an authentic HP code when the device is started up. Keeps the BIOS safe and reboots the device in safe recovery mode.
Whitelisting
Whitelisting
Keeps the firmware safe. If there are any signs of tampering, the printer is rebooted.
Run-time Intrusion Detection
Run-time Intrusion Detection
Active when the printer is switched on and connected to the network. Monitors run-time activity and restores itself.
HP Connection Inspector
HP Connection Inspector
Checks the printer’s outgoing data for packets commonly used by hackers. Activates a self-repairing restart after each suspicious data request.
HP Security Manager
HP Security Manager
Checks and restores printer settings. Helps improve security, strengthen compliance and reduce risks to the entire imaging and printer population.
Data
Verify users
Verify users
Prevent unauthorized access.
Encrypt data
Encrypt data
Prevent data theft and modification.
Check for threats
Check for threats
Identify problems and self-repair.
Document
Secure Print
Secure Print
Prints roll out from the printer only when users identify themselves at the device and give the order to print, so that unauthorized users cannot take your prints.
Compliance
Compliance
HP Wolf Security ensures that the entire printer population complies with your organization’s security policy, for example through secure document workflows.
Zero-trust
Zero-trust
Always verify – never trust.