Outline
How do you protect your critical confidential data?
Panasonic helps you plug your information leaks:
• User Authentication
Job Tracking, Fax Transmission via RightFax
®
Server
• Secure Printing Functions
Mailbox, Secure Mailbox
• HDD/Memory Security
HDD Erasure (Job-by-job, Bulk)
Image Memory Erasure
• Data Security Kit
Security issues in today’s business:
Security in today’s networked office
With the rapid popularization of local and wide area networks, the volume of data transmitted/received,
edited, and stored in the modern office is growing ever larger. Unfortunately, as information becomes
more valuable and as communication becomes more efficient, the threat posed by unauthorized
access or inadvertent leakage of confidential data has also become far more serious.
In today’s environment, the need for enhanced security doesn’t apply only to computer networks and
individual computers, it also applies to document processing equipment — such as printers, scanners
and faxes — used in the office. All of these devices handle and process important data, so more
effective ways of preventing security breaches are required.
How to protect data
Even when users recognize the importance of
security, they may not know how to protect their
data, or may find that maintaining security interferes
with normal operations. Consequently, many users
tend to ignore these problems.
Protecting individual data is difficult and
complicated. For example, it is very difficult to keep
track of every operation, such as who copied or
printed what, when they did it, and where they sent
it. To manage all of this efficiently is virtually
impossible. Detecting unauthorized users can also
be difficult if an approved user account and
password are used to access internal data. This
kind of “spoofing” has to be prevented if security is to be maintained.
Rather than address these issues, many office users tend to leave things as they are until an actual
security breach occurs or someone complains about the lack of security. This is why Panasonic’s
multi-functional units
*
are provided with a powerful set of standard security features.
* Refer to the applicable models.