Fiery Security White Paper

Collapse
This topic is closed.
X
X
 
  • Time
  • Show
Clear All
new posts
  • RSS Robot
    I post the news

    1,000+ Posts
    • Jan 2009
    • 1466

    Fiery Security White Paper

    1 Document Overview

    This document outlines architectural and functional aspects of Fiery Network Controllers with respect to device security. The purpose of this document is to provide a general overview of the Fiery Network Controller so that end users may research security features from which they can benefit and potential vulnerabilities they may encounter. This document outlines the current System 6, 6e, 5.5, 5.5e, 5.1e, and 5 models of the Fiery Network Controller generally from the perspective of its hardware architecture, software configuration, security features, and document information flow.
    1.1 Electronics For Imaging Security Philosophy
    For end users, Fiery network controllers have brought tremendous value to otherwise standalone devices. EFI recommends installation of network devices such as a Fiery network controller is done in accordance with existing security paradigms. EFI’s goal is to lead the printing industry in
    the level of security of our devices and their data. To this end, EFI has incorporated security features into its line of Fiery network controllers. To create a more secure network environment, end-users will need to combine the Fiery security features with other security safeguards.
    EFI places a high priority on producing a product with strong security features. EFI has worked with all our OEM partners to determine the requirements of the digital printing community. EFI has also created a cross-functional team whose primary focus is to deal with present and future
    security issues. EFI hopes that the end users will be able to independently evaluate the information provided in this overview to develop their own chosen system of security. Only by choosing measures designed to enhance security such as secure password procedures and strong physical security procedures, can the end user realize a system with security features.
    read more


    More...
Working...