This document gives end users an overview of the Fiery® server’s architecture and functional aspects as they relate to device security in the System 10. It covers hardware, network security, access control, operating system and data security. The document’s intent is to help end users understand all the Fiery server’s security features that they can benefit from and to understand its potential vulnerabilities.
1.1 Electronics For Imaging (EFI) Security Philosophy
EFI™ understands that security is one of the top concerns for business worldwide today, so we’ve built strong security features into the Fiery servers to protect companies’ most valuable assets. We also proactively work with our global OEM partners and our cross-functional teams to determine companies’ current and future security requirements, so security doesn’t become an issue with our products. As always, we still recommend that end users combine Fiery security features with other safeguards, such as secure password and strong physical security procedures, to achieve overall system security.
1.2 Configure the Security Feature via Fiery Configure
An Administrator of a Fiery server can configure all Fiery features via Fiery Configure. Fiery Configure can be launched from Fiery Command WorkStation® or Webtools™ under the configure tab.
read more
More...