sponsored by ComputerWeekly.com
Posted:  02 Apr 2013
Published:  02 Apr 2013
Format:  PDF
Length:  8  Page(s)
Type:  Analyst Report
Language:  English

By Louella Fernandes and Clive Longbottom


Businesses of all sizes have data of value, such as employee and customer information, which must be protected. While many businesses have secured their IT infrastructure to minimise unauthorised access to confidential or sensitive data, unsecured MFPs and networked printers remain a critical source of vulnerability.


Network connectivity, along with hard disk and memory storage, means networked printers and multifunction peripherals (MFPs) are susceptible to the same security risks as any networked device. Without proper control, it is all too easy for sensitive or confidential information to fall into the wrong hands.


While SMBs face challenges around data protection and compliance, they also grapple with resource and time constraints. Consequently, they often mistakenly downplay the importance of print security.


This paper highlights the risks of unsecured printing and discusses how integrated print management provides SMBs with a simple and scalable approach for print security.



Quocirca is a research and analysis company specialising in the business impact of information technology and communications.

Audit Trails | Compliance (Systems Operations) | Compliance Best Practices | Data Loss Prevention (DLP) | Log Management | Network Appliances | Network Best Practices | Network Peripheral Hardware | Print Management | Print Management Services | Print Management Software | Printers | Printing Protocols | Printing Utilities | Security | Security Best Practices | Security Management | Security Policies | Security Systems | Security Threats | Small Businesses

View All Resources sponsored by ComputerWeekly.com

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement