HP DesignJet T700 Security Features - Page 78

Secure sanitizing erase, Secure storage, Domain Naming system DNS, Firewall, IPsec

Page 78 highlights

HP DesignJet Printer Series Security Settings Secure sanitizing erase It conforms to the U.S. Department of Defense 5220-22.M specification for deleting magnetically stored data. Secure sanitizing erase uses multiple data overwrites to eliminate trace magnetic data and also prevents subsequent analysis of the hard disk drive's physical platters for the retrieval of data. Secure storage A solution to storage critical information encrypting it (using hardware such as TPM or a virtual TPM). It is a way to add another protection barrier to protect information as certificates even access to the HDD would have been done. IP Domain Naming system (DNS) Converts host names and domain names into IP addresses on the internet or on local networks that use the TCP/IP protocol. Firewall Provides a simple way to configure which IP addresses can be accessed to/from the printer. IPsec Suite of protocols for securing communications over Internet Protocol (IP). It authenticates and/or encrypts every IP package. It is a way to secure data transmission without using upper protocols such as SSL, TLS or SSH. VULNERABILITIES TLS The successor of SSL, which solves some of its vulnerabilities. It is used, for example, by HTTPS. 78

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80

HP DesignJet Printer Series
Security Settings
78
Secure sanitizing erase
It conforms to the U.S. Department of Defense 5220-22.M specification for deleting magnetically stored data.
Secure sanitizing erase uses multiple data overwrites to eliminate trace magnetic data and also prevents
subsequent analysis of the hard disk drive’s physical platters for the retrieval of data.
Secure storage
A solution to storage critical information encrypting it (using hardware such as TPM or a virtual TPM). It is a way to
add another protection barrier to protect information as certificates even access to the HDD would have been
done.
IP
Domain Naming system (DNS)
Converts host names and domain names into IP addresses on the internet or on
local networks that use the
TCP/IP protocol.
Firewall
Provides a simple way to configure which IP addresses can be accessed to/from the printer.
IPsec
Suite of protocols for securing communications over Internet Protocol (IP). It authenticates and/or encrypts every
IP package. It is a way to secure data transmission without using upper protocols such as SSL, TLS or SSH.
VULNERABILITIES
TLS
The successor of SSL, which solves some of its vulnerabilities. It is used, for example, by HTTPS.