Welcome!

News Feed Item

HP Expands Portfolio of Secure Printing Solutions for Enterprises

Enhanced Security Monitoring and Management Offerings for Print Environment Help to Reduce Risk and Improve Compliance

PALO ALTO, CA -- (Marketwired) -- 09/04/14 -- HP (NYSE: HPQ) today expanded its industry-leading portfolio of printing services and solutions designed to help customers simplify printer security deployment and monitoring to protect their network and confidential information while meeting the growing list of compliance guidelines.

These new security services and solutions are part of HP JetAdvantage, a new brand that represents HP's comprehensive document and workflow printing portfolio. HP JetAdvantage delivers a portfolio of solutions for mobile printing, print security, workflow and printer management to help streamline crucial business processes and tasks to reduce cost and enhance employee productivity.

Securing a print infrastructure is rapidly becoming an important component of an enterprise's overall network security. As a leader in IT enterprise security, HP offers security solutions and services designed to protect enterprise printing environments. The new offerings include:

  • The HP Imaging and Printing Security Center (IPSC) 2.1 tool simplifies security deployment and monitoring for HP printing fleets by streamlining the time-consuming task of creating IT security policies for secure device communications. HP IPSC reduces network security risks and improves compliance without adding to IT overhead.
  • HP Print Security Advisory Services offer an analysis of a print environment, deployment of optimal security policies and recommendations for solutions to best secure the printing infrastructure.
  • HP LaserJet Enterprise flow multifunction printer (MFP) M630 series features a suite of more than 200 embedded security features, powerful document workflows for compliance and the HP Trusted Platform Module Accessory to help protect customers "out of the box."

"In the healthcare industry, there's a delicate balance between security, compliance and productivity, and the technology we use is critical to maintaining that balance," said Brad Nelson, IT Manager, Baptist Health. "We have partnered with HP to help secure our enterprise printing environment while increasing compliance and employee productivity."

"As the financial impact of a data breach increases, the fundamental need for comprehensive printing security solutions continues to grow," said Pradeep Jotwani, senior vice president, LaserJet and Enterprise Solutions, HP. "As a trusted leader in IT Security, HP is expanding its foundation of industry-leading LaserJet devices, solutions and services with new HP Print Security Innovations for print security monitoring and management."

Expanded HP print security innovations
Rounding out the HP print security portfolio are several new solutions that help customers monitor, audit and manage a printing environment, from device to data to documents, to ensure IT security requirements and satisfy compliance requirements:

  • The industry-leading security monitoring capability of HP ArcSight has been extended to include security monitoring of the full HP portfolio of FutureSmart printing and multifunction devices. With the ability to collect, analyze and correlate print device log events, risks are automatically highlighted in the HP ArcSight dashboard, giving customers a comprehensive view of their IT environment security.
  • The HP Secure Content Management and Monitoring solution helps customers reduce the risk of security breaches associated with all print, scan, copy and fax functions at the device level. By extending HP Autonomy Information Governance tools to monitor and audit all information flowing through the HP multifunction device, this solution enables early detection of document security breaches.
  • HP JetAdvantage Pull Print -- available with select HP LaserJet and Officejet products -- helps prevent unauthorized access to confidential print jobs and reduces waste that can occur from unclaimed or misprinted jobs. Each print job is securely stored in the cloud using AES 256-bit encryption until the user authenticates and claims the job from the printer. This cloud-based solution offers simple setup and management, taking the complexity out of pull print for enterprises and SMBs.

Additional information about these new HP imaging and printing offerings is available at www.hp.com/go/printsecurity.

About HP
HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. With the broadest technology portfolio spanning printing, personal systems, software, services and IT infrastructure, HP delivers solutions for customers' most complex challenges in every region of the world. More information about HP is available at http://www.hp.com.

© 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.

Erin Tsang
HP
[email protected]

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Wooed by the promise of faster innovation, lower TCO, and greater agility, businesses of every shape and size have embraced the cloud at every layer of the IT stack – from apps to file sharing to infrastructure. The typical organization currently uses more than a dozen sanctioned cloud apps and will shift more than half of all workloads to the cloud by 2018. Such cloud investments have delivered measurable benefits. But they’ve also resulted in some unintended side-effects: complexity and risk. ...
Machine learning provides predictive models which a business can apply in countless ways to better understand its customers and operations. Since machine learning was first developed with flat, tabular data in mind, it is still not widely understood: when does it make sense to use graph databases and machine learning in combination? This talk tackles the question from two ends: classifying predictive analytics methods and assessing graph database attributes. It also examines the ongoing lifecycl...
With more than 30 Kubernetes solutions in the marketplace, it's tempting to think Kubernetes and the vendor ecosystem has solved the problem of operationalizing containers at scale or of automatically managing the elasticity of the underlying infrastructure that these solutions need to be truly scalable. Far from it. There are at least six major pain points that companies experience when they try to deploy and run Kubernetes in their complex environments. In this presentation, the speaker will d...
When applications are hosted on servers, they produce immense quantities of logging data. Quality engineers should verify that apps are producing log data that is existent, correct, consumable, and complete. Otherwise, apps in production are not easily monitored, have issues that are difficult to detect, and cannot be corrected quickly. Tom Chavez presents the four steps that quality engineers should include in every test plan for apps that produce log output or other machine data. Learn the ste...
Dhiraj Sehgal works in Delphix's product and solution organization. His focus has been DevOps, DataOps, private cloud and datacenters customers, technologies and products. He has wealth of experience in cloud focused and virtualized technologies ranging from compute, networking to storage. He has spoken at Cloud Expo for last 3 years now in New York and Santa Clara.
"Peak 10 is a hybrid infrastructure provider across the nation. We are in the thick of things when it comes to hybrid IT," explained , Chief Technology Officer at Peak 10, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
When building large, cloud-based applications that operate at a high scale, it's important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. "Fly two mistakes high" is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Le...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
DevOps tends to focus on the relationship between Dev and Ops, putting an emphasis on the ops and application infrastructure. But that’s changing with microservices architectures. In her session at DevOps Summit, Lori MacVittie, Evangelist for F5 Networks, will focus on how microservices are changing the underlying architectures needed to scale, secure and deliver applications based on highly distributed (micro) services and why that means an expansion into “the network” for DevOps.
Is it possible to migrate 100% of your data ecosystem to the cloud? Join Joe Caserta as he takes you on a complete journey to digital transformation mapping out on-prem data footprint and walking it to the cloud. Joe will also explain how the modern ecosystem supports Artificial Intelligence and will include business use cases to back each of his insights.