Canon Canon Document Professional Services Brochure

Page of 2
 
 
Business Challenges:
“We need to 
support 
compliance
 with 
industry-standard security 
regulations.”
“Are the hard drives on our 
devices storing images of 
confidential data?
“Are 
hackers able to access
 
our information after our 
devices are retired?”
“Can we keep our office 
running smoothly
 and 
maintain security?”
“We need a 
document 
security policy
 that’s easy 
for everyone to understand 
and follow.”
“How can we
 reduce
 
security 
vulnerabilities
 and 
breaches in confidentiality?”
Close the Document and Device Security Loophole 
For many companies today, security has become a necessary part of doing business. 
You need to safeguard confidential information to comply with regulations, ensure client 
confidentiality, protect intellectual property, and preserve a competitive advantage. 
But while most companies focus on facilities and computer security, office technology 
can remain vulnerable. Today’s printers, fax machines, and multifunction devices have 
evolved to support more advanced and integrated workflows. To do so, they require  
hard drives, communications technology, and networking tools — all of which need to  
be secured and protected. But how can you begin?
Canon Information & Imaging Solutions can undertake a comprehensive review of 
your device, document, and communication security, find potential vulnerabilities 
and recommend appropriate measures to address them. Services range from onsite 
evaluations to the development of detailed document security guidelines that cover all 
aspects of user access, device storage, networking, and communication workflows.
Take a Clear Path to Better Security
Canon Information & Imaging Solutions offers a two phase process for assessing the 
strength of your current security measures and finding ways to extend and enhance them. 
What is a document and device security policy?
Companies have traditionally established and followed information and physical 
security policies that cover a wide range of activities. Many today are also extending 
these policies to cover document and device workflows. Such policies typically provide 
guidelines for employee access to devices and functionality, steps needed to secure 
hard drives, guidelines for fax routing and printout retrieval, and requirements for 
accessing information—among others. 
As a result, you can provide your employees with a touchstone that enables them to 
better understand and follow responsible practices. 
Security Analysis
Canon Information & Imaging 
Solutions Security Services begin with 
a comprehensive onsite review of 
your organization’s document and 
communications processes. 
This also includes a review of your security 
policies and outside regulations, as well as 
the capabilities and internal processes of 
the devices in your office.
Security Recommendations
In the next phase, our security advisors  
can deliver recommendations for 
integrating documents and devices with 
your security policies. These can also 
inlcude technology solutions to help 
improve security and reduce vulnerabilities. 
Canon Information & Imaging Solutions  
can also help guide you on best practices 
so you can develop security policies that 
are right  for your organization.
Security Services >
 
n
 
AUTHENTICATION & CONFIDENTIAL INFORMATION PROTECTION 
n
 
SECURITY GUIDELINES
PROFESSIONAL SERVICES