Beacon Analytics: Data Security White Paper
Beacon Analytics: Data Security White Paper
Beacon Analytics: Data Security White Paper
Beacon Analytics
Data security white paper
Learn about the architecture, policies, and safeguards that help keep your
information secure when using Beacon Analytics
Table of Contents
INTRODUCTION ........................................................................................................................ 3
Solution Components ............................................................................................................. 3
Device Scout ........................................................................................................................ 4
Print Scout ........................................................................................................................... 4
Deployment Architecture ........................................................................................................ 5
Security Overview.................................................................................................................... 6
CUSTOMER READINESS .......................................................................................................... 7
Platform communication ......................................................................................................... 7
Cloud API endpoints ............................................................................................................... 7
Network ports and protocols .................................................................................................. 7
Fleet Analytics ..................................................................................................................... 8
Print Analytics ..................................................................................................................... 8
Deployment Requirements ...................................................................................................... 9
Device Scout ........................................................................................................................ 9
Print Scout ........................................................................................................................... 9
Network printer ................................................................................................................. 10
NETWORK UTILIZATION ..................................................................................................... 12
Print Scout ............................................................................................................................ 12
Print Scout communication patterns .................................................................................. 12
Device Scout ......................................................................................................................... 13
Device Scout network traffic .............................................................................................. 13
CLOUD ARCHITECTURE SECURITY ................................................................................ 16
Infrastructure security .......................................................................................................... 16
Privacy .................................................................................................................................. 16
INTRODUCTION
Pharos Beacon is a multivendor cloud print management platform that gives you a complete
view of your organization’s print environment, on demand. Beacon Analytics is a comprehensive
print data management and insights tool that provides the clarity and control that businesses
need to optimize their print environment. Beacon Analytics reveals the true cost of your printing
and provides the decision support you need to reduce costs and improve end-user convenience.
Beacon Analytics is a true cloud service that runs on AWS. It comprises two elements:
• Fleet Analytics: Provides a comprehensive, multivendor view of print from your network
devices and reveals volume, service, and operating cost information to help you build
and maintain a more efficient fleet.
• Print Analytics: Reveals how print is created in your environment, including information
about the user, the applications users print from, the output device, and comprehensive
document parameters. It reveals opportunities to reduce costs and waste, and it helps
you to discover the fleet design that best supports your people.
To perform its intended functions, Beacon will scan, collect, and store information about your
print environment, your users, and the print jobs that users submit. The solution also gives you
control over what data is collected and who can see it.
Solution Components
To take full advantage of Beacon Analytics, you will need to install two components in your local
area network. Depending on your requirements and licensing, these components may include:
Page | 3
• Device Scout
• Print Scout
In some cases, multiple scouts of each type may be installed. No data (device data or user
printing data) can be sent to Beacon until one or more scouts are installed and the scouts are
activated with a registration key. If your registration key is ever invalidated or deleted, no
further device or print data will be collected, even if the print/device scouts remain installed.
At any time, you may stop any scout from collecting information by uninstalling the scout.
Instructions on how to uninstall the scouts can be found in the Beacon help documentation in
the Pharos community (community.pharos.com).
Device Scout
The Device Scout is installed on a server as a best practice. It scans IP ranges that you define to
locate all printers within your network. The Device Scout collects data on device status, meters,
and consumables for use in Fleet Analytics views. The Device Scout will attempt to collect the
following information from network devices that report themselves via SNMP as output devices:
Print Scout
The Print Scout can be deployed to print servers and/or workstations (PC and Mac) to collect
comprehensive information on how print is being created within the organization.
When installed on a print server, the Print Scout collects information on network printers and
MFPs. Print Scouts deployed to employee workstations collect data on both network printing
activity and any printing sent to locally attached devices. The Print Scout collects the following
types of data:
Page | 4
You can control what data is collected and who can see it. You can configure the Print Scout’s
collection settings to disable the collection of certain types of data and obfuscate certain data if
you need to maintain individual privacy. You can also apply role-based viewing restrictions,
giving some users a limited view of the data.
Deployment Architecture
Depending on your network topology, requirements, and your print environment, you may
deploy multiple print scouts and device scouts. An architectural overview is shown here for
simplicity.
• The Device Scout registers itself via an HTTPS (TLS) connection to Beacon. Once the
Device Scout has registered and obtained a copy of its configuration, it disconnects from
Beacon and operates autonomously until the next configured check-in time.
• The Print Scout also registers itself via an HTTPS (TLS) connection to Beacon. The Print
Scout behaves slightly differently than the Device Scout in that it will upload job data as
it is captured.
• The integrity of customer data is critical. We use a combination of technological and
procedural controls to restrict access to customer data.
Page | 5
Security Overview
Beacon addresses the following threat areas:
• Machine or technical failure: Such an event could include power loss, network
connectivity loss, or data storage failure. Beacon uses a cloud-based infrastructure with
a minimum of three geographic zones. The cloud infrastructure can detect a variety of
fault conditions and remove or fix defective components on the fly with no interruption
of service.
• Malicious attack: Such an event could include an attempt to intercept data in
transmission, denial of service, or the attempted altering or disabling of established
security measures such as logins or encrypted communication. Beacon encrypts all
external connections using SSL or TLS at the highest level supported by the connecting
browser. All application components are isolated by function; only necessary traffic can
pass between components.
• Passive data loss or corruption: These losses could be caused by software defects,
incompatibilities between software components, or data storage loss. The Beacon cloud
infrastructure mitigates these risks through a formal software quality assurance
methodology. In the event of a data corruption problem, Pharos maintains pre-state
backups in order to roll back any data-altering changes. We also use segregation of
duties and least privilege principles to restrict the level of access employees have, to
include only that which is required to perform their job function. Access levels are
periodically reviewed and adjusted as business needs or job roles change.
2. Ensure that servers and/or workstations hosting scouts are fully patched and meet all
other security requirements of your organization.
• Ensure that servers and/or workstations are regularly maintained according to the
policies of your organization.
• Ensure that the minimum necessary credentials are granted to individuals within
your organization.
3. If the Print/Device Scout will be installed on a shared server (i.e. a server that performs
multiple functions or that will be running software from another vendor), be sure to
verify compatibility with Pharos technical support before installing.
Page | 6
CUSTOMER READINESS
This section details the environmental requirements and recommendations necessary to
successfully deploy Beacon Analytics, and lists the ports and protocols required for Fleet
Analytics and Print Analytics.
Platform communication
Your email security software must be set to trust the following email address to help prevent
your organization from quarantining or blocking the message or sending the email to the Junk
or Spam folder:
• https://api.beacon.pharos.com
• https://devicescout.beacon.pharos.com
• https://files.beacon.pharos.com
• https://login.beacon.pharos.com
• https://mfp-api.beacon.pharos.com
• https://printscout.beacon.pharos.com
Page | 7
Fleet Analytics
The following diagram shows the basic structure, ports, and protocols required to deploy
Beacon Fleet Analytics.
Print Analytics
The following diagram shows the basic structure, ports, and protocols required to deploy
Beacon Print Analytics.
Page | 8
Deployment Requirements
Device Scout
The Device Scout discovers network devices and collects device-related data (status, meters,
and consumables) and uploads it to Beacon for reporting and analysis.
Requirements
Print Scout
The Print Scout is lightweight client software that is deployed to employee workstations to
capture comprehensive printing data (and enable secure printing if Sentry Print is deployed). It
Page | 9
also allows organizations to capture printing data for remote (home office) workers and their
locally attached personal printers. This has become increasingly relevant in our Covid-19
environment and the strong trend toward a distributed workforce.
Requirements
8. End point protection (antivirus) software must trust the Windows services for the Print
Scout:
Pharos Systems Print Scout Service
Pharos Systems Print Scout Spooler Service
9. The following network ports must be open:
• Outbound (Print Scout connecting to the cloud API endpoint):
o 443 TCP (TLS v1.2)
• Outbound (Print Scout connecting to the network printer):
o 161 UDP (SNMP v1/v2 or SNMP v3)
Network printer
A printer that is accessible by network connection, making it usable by other computers
connected to the network.
Page | 10
Requirements
1. SNMP v1/v2 and/or SNMP v3 must be enabled
• SNMP v1/v2: Read access is enabled and the Get Community Name string is known
• SNMP v3: Username, Authentication Protocol and Passphrase, Privacy Protocol and
Passphrase, and Context Name are known
Page | 11
NETWORK UTILIZATION
Print Scout
The Print Scout securely uploads print job information as it happens. The Print Scout does not
perform network-wide discoveries; it is only aware of locally attached printers or network print
queues. The following table details the network traffic created by the Print Scout.
Status 1x24hrs 2K
• Active Directory lookups: When an employee submits a print job, the Print Scout will
look up Active Directory (AD) information about that user. The AD lookup occurs only
once per day. AD traffic is difficult to estimate because the amount of data stored in AD
is highly variable from one organization to the next. However, the maximum traffic
equates to the total number of unique AD users multiplied by the average record size.
• Print job metadata uploads: Data describing each print job is sent to the cloud service.
This data is variable because of the strings involved (document name), but a fair
approximation is 1 KB per print job.
• Automatic scout updates: From time to time, a new version of the Print Scout will be
released, with updated functionality and any bug fixes. The scout will check for new
versions of itself whenever it checks for new configuration information. If a new version
is available, the scout will automatically download and install the new version silently.
Page | 12
Device Scout
The Device Scout requires access to your local area network to operate effectively. The Device
Scout will generate local network traffic when performing these operations:
• Scanning configured network ranges for printing devices
The Device Scout uses SNMP to communicate with local network devices and supports SNMP v1,
2, and/or v3. In some cases, the Device Scout will also try to connect to a device using HTTP
port 80, if the device is a known model that cannot report serial number or meter reads via
SNMP.
NOTE: The Device Scout does not record or track SNMP-enabled devices within its scanning
range that do not report themselves as output devices.
The Device Scout will generate Internet traffic when performing these operations:
• Registration
• Polling the Device Scout control server for new configuration or instructions
The Device Scout uses secure HTTPS communication when connecting to Sentry Print.
Additionally, all end-user access to the application is encrypted using TLS. Unencrypted SNMP
traffic is restricted to the local subnets that the Device Scout is configured to monitor.
Integration 2K
Page | 13
Excluding IP ranges
Non-printing SNMP-configured devices respond with a 126-byte payload, which tells the Device
Scout that the device is not a printing device. While not harmful, this overhead may add up over
large IP ranges. Therefore, we recommend using “Exclude Ranges” in the Device Scout
configuration to skip over any IP ranges that are not likely to contain output devices.
• Uploading discovered device data: The Device Scout will upload discovered devices
once per period, configured within the application. Discovery scans can be configured
daily or weekly. More frequent uploads will result in more network traffic, but newly
discovered devices will be displayed in the application more quickly.
• Uploading device meter data: The Device Scout will upload meter reads to the scout
control server on a scheduled basis. Usage (meter) data can only be scheduled for a
daily scan and upload. You configure this setting within the application.
• Uploading toner data: Toner information will be collected along with meter data by
default. Or, you can configure it to be collected as frequently as 15-minute intervals.
• Uploading scout health check information: The Device Scout Monitor runs as a
scheduled Windows task to check the health of the Device Scout and its ability to
communicate. It tracks the successful completion of scout activities such as discoveries,
status collections, and configuration updates. It uploads this information on a
configured basis, once per day.
• Cloud connection: The communication channel between the Device Scout and the cloud
is kept alive by means of a server-initiated ping. This request occurs approximately once
per minute and consists of a small packet of bytes.
• SNMP device discovery: The Device Scout performs SNMP scans to discover new
printing devices on a configured network segment. Some network monitoring tools may
treat SNMP scans as sources of network congestion. We recommend registering the
Device Scout with your network security office so that they know to expect this network
traffic. You can configure the Device Scout to exclude certain subnets or IP addresses,
restrict its scans to certain times of the day, and reduce network utilization to a specific
level.
Page | 14
• Scout configuration data: The Device Scout retrieves its configuration data by initiating
an outgoing secure HTTPS connection to the scout control server. When the
configuration has been received, the Device Scout terminates the connection and
operates without any outgoing connections until the next scheduled configuration
check. Additionally, the Device Scout will only communicate with output devices when
configured to do so, and it does not hold open continuous data connections.
• Automatic scout updates: From time to time, a new version of the Device Scout will be
released with updated functionality and any bug fixes. By default, the Device Scout will
check for new versions of itself daily. If a new version is available, the scout will
automatically download and install the new version. Based on your organization’s
preferences, you can easily control this setting; you can set it to Notify, Off, or
Automatic (the default).
Page | 15
CLOUD ARCHITECTURE SECURITY
Pharos Beacon runs on a true cloud platform built on Amazon Web Services (AWS) to deliver a
safe and scalable web application experience. The solution runs on a true cloud (cloud-native)
platform built on Amazon Web Services (AWS). Pharos exclusively uses Infrastructure-as-a-
Service (IaaS) providers that have achieved an SSAE 16 audit and ISO 27001 security certification
covering all IaaS infrastructure and facilities. Additionally, Beacon uses a tiered application
structure to isolate data within the cloud.
Infrastructure security
Pharos conducts periodic vulnerability assessments in all production environments. Access to
production environments is restricted based on business need. Access roles are configured
using Segregation of Duties (SOD) principles. System access levels are periodically reviewed and
adjusted when necessary.
All production operating system and framework components are patched during predetermined
maintenance windows. Pharos uses generally accepted guidelines for deploying new operating
system and framework updates in a test environment before promoting to production.
Pharos monitors all vendor service bulletins for zero-day vulnerabilities and has processes in
place for emergency patching should the need arise.
Privacy
Pharos does not collect, store, maintain, or transmit any information regarding the content of
print jobs, and thus has no way of accessing, housing, or transmitting information, even if this
information is printed or otherwise sent to print devices monitored by Beacon.
For more information regarding our privacy policy, please review our Privacy Statement at:
https://community.pharos.com/s/article/Pharos-Beacon-Privacy-Statement-764158147
Learn more:
https://pharos.com/cloud-print-management/
Page | 16