• Data protection—Network-transmitted data can be protected with IPsec, which allows
you to encrypt data that travels to the printer (provided you have congured each network
resource to use IPsec). Print jobs can also be encrypted using Internet Printing Protocol
(IPP) over SSL/TLS.
• IPv6 support—Keep data safe while benetting from an expanded number of IP addresses
on your network.
• Management safeguards—Device management data that travels over the network
between the printers and the HP Embedded Web Server or HP Web Jetadmin can also be
encrypted.
• Password protection—Stored passwords are encrypted to help ensure protection of this
critical information.
• Hard disk encryption—Secure your business-critical data with the HP High Performance
Secure Hard Disk. Once congured, the hard disk automatically encrypts stored job
information (available on the M603xh).
• Secure erase—The printer provides built-in capabilities for securely deleting data stored
on it, allowing sensitive data to be safely removed. HP oers multiple mechanisms to erase
stored data, including erase functionality that conforms to U.S. National Institute of Science
and Technology (NIST) overwrite algorithm specications.
• Access port for optional Kensington-style lock—Physically secure the printers from
theft. The security access port lets you attach an optional cable-type security lock.
• Security policy management—The HP Imaging and Printing Security Center helps you
dene and manage security policies across your business, monitor printer compliance, and
update all managed printers when policies change. This tool is available via HP Assessment
Services. For more information, see hp.com/go/secureprinting.
• Third party validation and best practices:
– U.S. and Canadian Cryptographic Module Validation Program (CVMP) validates
cryptographic modules to U.S. Federal Information Processing Standards (FIPS)140.
Hewlett Packard provides solutions that align with this standard in its HP UPD 5.3 Secure
Encrypted Print and HP High Performance Secure Hard Disk solutions (available on the
M603xh US government sku). For more information, see csrc.nist.gov/groups/STM/cmvp/
index.html.
– HP Security Best Practices. Since 2005, Hewlett Packard has published security best
practice checklists for networked environments common to enterprises and small to
medium businesses. HP recommends that customers incorporate recommended security
congurations in their environments. h71028.www7.hp.com/enterprise/downloads/
HP-Imaging10.pdf.
Take control of printing practices
With HP Access Control, you can apply custom rules to printing and imaging devices, and
create a more secure printing environment via pull-printing and other solutions.
12
Track
resource use, prevent waste from unclaimed documents, and oer multiple authentication
options. To learn more about the ways HP Access Control can boost eiciency, add security,
and save time and money, visit hp.com/go/gsc.
Monitor and manage your networked devices
HP gives you the industry-leading manageability tools you need to print responsibly.
Command your printing environment and slash costs, with HP Web Jetadmin. Use the
HP Universal Print Driver to easily update the entire managed printing environment.
And add HP EcoSMART Fleet to make and manage environmental goals.