Lexmark XC4342 Security White Paper - Page 5

Executive Overview

Page 5 highlights

Executive Overview 5 Executive Overview Executive Overview As organizations enhance the security of their infrastructure and move towards security methodologies and strategies, such as, Secure Access Service Edge (SASE), defense in depth, assume breach, and zero trust to provide tighter access controls, the print infrastructure must also adapt. It must become a strategic initiative to secure the print infrastructure and consider both internal and external threats. Data has become a cornerstone for innovation and has become a company's most valuable asset. Some of the challenges that companies face are inadequate security practices and too much data to manage. It is important to remember that security is not a solo sport, and as a community, we are stronger together. LexmarkTM expertise as an industry leader in document and device security forms the backbone of our strategy. This systematic approach to security delivers a critical benefit to our customers: the confidence to efficiently and cost-effectively get the job done, knowing their devices and data are protected every step of the way. Lexmark comprehensive approach to security covers a full spectrum of features, solutions, software, and services designed to protect every aspect of your output environment. Lexmark meets the most stringent industry and government security standards including Common Criteria and Federal Information Processing Standard (FIPS). Our security ecosystem is designed to overcome the most complex data protection challenges for every business, in every industry. In 2020, Lexmark was the first printer manufacturer to achieve the ISO 20243 certification on an entire printing device, including supplies. ISO 20243 is an accreditation that certifies the supply chain integrity of hardware products, evaluating development practices, supplier management, related IT systems, manufacturing processes, and logistics. The ever-changing security landscape has led Lexmark to work closely with our customers to help provide advice and solutions to mitigate risks related to their print environment. For our customers that have specific security needs or requirements, Lexmark security services are designed to ensure customers print devices and security policies are configured in alignment with their security goals and industry best practices. Lexmark's Security Consulting Team, composed of dedicated security professionals, assesses vulnerabilities and risk for print devices (inclusive of firmware, settings, and software), print server configuration (ports and drivers), authentication, and physical document controls. In conclusion, when configuring Lexmark devices, it is important to consider the security posture of an organization. Because no two customers are alike, our goal is to provide a consultative approach that helps to define a secure configuration that includes a heightened level of security while maintaining an ease of use. It is important to emphasize that an administrator should validate, with the organizations IT security and compliance experts, that these recommendations meet the companys strategic security goals.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64

Executive Overview
Executive Overview
As organizations enhance the security of their infrastructure and move towards security methodologies and
strategies, such as, Secure Access Service Edge (SASE), defense in depth, assume breach, and zero trust to
provide tighter access controls, the print infrastructure must also adapt. It must become a strategic initiative to
secure the print infrastructure and consider both internal and external threats. Data has become a cornerstone
for innovation and has become a company's most valuable asset. Some of the challenges that companies face
are inadequate security practices and too much data to manage. It is important to remember that security is
not a solo sport, and as a community, we are stronger together.
Lexmark
TM
expertise as an industry leader in document and device security forms the backbone of our strategy.
This systematic approach to security delivers a critical benefit to our customers: the confidence to efficiently
and cost-effectively get the job done, knowing their devices and data are protected every step of the way.
Lexmark comprehensive approach to security covers a full spectrum of features, solutions, software, and
services designed to protect every aspect of your output environment.
Lexmark meets the most stringent industry and government security standards including Common Criteria and
Federal Information Processing Standard (FIPS). Our security ecosystem is designed to overcome the most
complex data protection challenges for every business, in every industry.
In 2020, Lexmark was the first printer manufacturer to achieve the ISO 20243 certification on an entire printing
device, including supplies. ISO 20243 is an accreditation that certifies the supply chain integrity of hardware
products, evaluating development practices, supplier management, related IT systems, manufacturing
processes, and logistics.
The ever-changing security landscape has led Lexmark to work closely with our customers to help provide
advice and solutions to mitigate risks related to their print environment. For our customers that have specific
security needs or requirements, Lexmark security services are designed to ensure customers print devices and
security policies are configured in alignment with their security goals and industry best practices. Lexmark's
Security Consulting Team, composed of dedicated security professionals, assesses vulnerabilities and risk for
print devices (inclusive of firmware, settings, and software), print server configuration (ports and drivers),
authentication, and physical document controls.
In conclusion, when configuring Lexmark devices, it is important to consider the security posture of an
organization. Because no two customers are alike, our goal is to provide a consultative approach that helps to
define a secure configuration that includes a heightened level of security while maintaining an ease of use.
±
It
is important to emphasize that an administrator should validate, with the organizations IT security and
compliance experts, that these recommendations meet the companys strategic security goals.
Executive Overview
5