Welcome!

News Feed Item

HP Expands Portfolio of Secure Printing Solutions for Enterprises

Enhanced Security Monitoring and Management Offerings for Print Environment Help to Reduce Risk and Improve Compliance

PALO ALTO, CA -- (Marketwired) -- 09/04/14 -- HP (NYSE: HPQ) today expanded its industry-leading portfolio of printing services and solutions designed to help customers simplify printer security deployment and monitoring to protect their network and confidential information while meeting the growing list of compliance guidelines.

These new security services and solutions are part of HP JetAdvantage, a new brand that represents HP's comprehensive document and workflow printing portfolio. HP JetAdvantage delivers a portfolio of solutions for mobile printing, print security, workflow and printer management to help streamline crucial business processes and tasks to reduce cost and enhance employee productivity.

Securing a print infrastructure is rapidly becoming an important component of an enterprise's overall network security. As a leader in IT enterprise security, HP offers security solutions and services designed to protect enterprise printing environments. The new offerings include:

  • The HP Imaging and Printing Security Center (IPSC) 2.1 tool simplifies security deployment and monitoring for HP printing fleets by streamlining the time-consuming task of creating IT security policies for secure device communications. HP IPSC reduces network security risks and improves compliance without adding to IT overhead.
  • HP Print Security Advisory Services offer an analysis of a print environment, deployment of optimal security policies and recommendations for solutions to best secure the printing infrastructure.
  • HP LaserJet Enterprise flow multifunction printer (MFP) M630 series features a suite of more than 200 embedded security features, powerful document workflows for compliance and the HP Trusted Platform Module Accessory to help protect customers "out of the box."

"In the healthcare industry, there's a delicate balance between security, compliance and productivity, and the technology we use is critical to maintaining that balance," said Brad Nelson, IT Manager, Baptist Health. "We have partnered with HP to help secure our enterprise printing environment while increasing compliance and employee productivity."

"As the financial impact of a data breach increases, the fundamental need for comprehensive printing security solutions continues to grow," said Pradeep Jotwani, senior vice president, LaserJet and Enterprise Solutions, HP. "As a trusted leader in IT Security, HP is expanding its foundation of industry-leading LaserJet devices, solutions and services with new HP Print Security Innovations for print security monitoring and management."

Expanded HP print security innovations
Rounding out the HP print security portfolio are several new solutions that help customers monitor, audit and manage a printing environment, from device to data to documents, to ensure IT security requirements and satisfy compliance requirements:

  • The industry-leading security monitoring capability of HP ArcSight has been extended to include security monitoring of the full HP portfolio of FutureSmart printing and multifunction devices. With the ability to collect, analyze and correlate print device log events, risks are automatically highlighted in the HP ArcSight dashboard, giving customers a comprehensive view of their IT environment security.
  • The HP Secure Content Management and Monitoring solution helps customers reduce the risk of security breaches associated with all print, scan, copy and fax functions at the device level. By extending HP Autonomy Information Governance tools to monitor and audit all information flowing through the HP multifunction device, this solution enables early detection of document security breaches.
  • HP JetAdvantage Pull Print -- available with select HP LaserJet and Officejet products -- helps prevent unauthorized access to confidential print jobs and reduces waste that can occur from unclaimed or misprinted jobs. Each print job is securely stored in the cloud using AES 256-bit encryption until the user authenticates and claims the job from the printer. This cloud-based solution offers simple setup and management, taking the complexity out of pull print for enterprises and SMBs.

Additional information about these new HP imaging and printing offerings is available at www.hp.com/go/printsecurity.

About HP
HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. With the broadest technology portfolio spanning printing, personal systems, software, services and IT infrastructure, HP delivers solutions for customers' most complex challenges in every region of the world. More information about HP is available at http://www.hp.com.

© 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...