Imag Print Security
Imag Print Security
Imag Print Security
FUNDAMENTALS
HP ExpertOne
Rev. 15.21
Course #: 00990446
Part #: 00990446S61503
HP DOCUMENT SOLUTIONS TECHNICAL
FUNDAMENTALS
HP ExpertOne
Rev. 15.21
Course #: 00990446
Part #: 00990446S61503
Notice
© Copyright 2015 Hewlett-Packard Development Company, L.P. The
information contained herein is subject to change without notice.
The only warranties for HP products and services are set forth in the express warranty statements accompanying such
products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for
technical or editorial errors or omissions contained herein.
This is an HP copyrighted work that may not be reproduced without the permission of HP.
Trademark Credits
Adobe™ and PostScript™ are trademarks of Adobe Systems Incorporated, which may be registered in certain jurisdictions.
Apple®, Mac®, and Macintosh® are registered trademarks of Apple Computer, Inc.
Windows® is a U.S. registered trademark of Microsoft Corporation.
Microsoft® is a U.S. registered trademark of Microsoft Corporation.
Edition History
COURSE OBJECTIVES 4
IMAGING AND PRINTING SECURITY TODAY 5
d.
EDUCATING CUSTOMERS AROUND DEVICE-BASED RISKS 12
te
THE SECRET TO YOUR SUCCESS 15
i
ib
HARD COPIES 17
oh
DATA ON PRINTER 24
pr
DATA SENT OVER THE NETWORK 29
is
on
PRINTER CONTROL PANEL 36
si
TAMPERING AND FORGERY 42
is
m
PRINTING FLEET 48
er
TAKING ACTION 58
tp
COURSE SUMMARY 61
ou
ith
w
rt
pa
in
or
le
ho
w
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
ake
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
or
le
ho
w
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
a ke
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
or
le
ho
w
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
a ke
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
Examine the lengths SMB operators go to in order to protect their network and data infrastructure (routers,
w
•
PCs, servers, etc.).
in
n
•
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
ake
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
Perform Google search to locate a college campus device that can print from EWS.
w
•
in
• Define that this is an industry problem not just for HP but for all network print manufactures.
n
io
• Examine the lengths that SMB operators go to in order to protect their network and data infrastructure
ct
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
• It’s hard to deny that cybercrime is real and that it is a threat. Devices are more connected to the Internet
ho
than ever.
w
Despite efforts to protect from outside intrusion, the real threat is from within.
in
•
n
•
ct
Failure to have a complete end-to-end company perspective can have financial and legal ramifications.
du
•
ro
ep
.R
ly
on
s
er
ld
ho
ake
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
Customer’s do not see the value in securing their imaging and printing devices.
w
•
in
*Infotrends 2013
ro
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
HP has the ability to provide end-to-end print security through a comprehensive HP JetAdvantage Security
ho
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
The state of imaging and printing security today combined with the HP Jet Advantage portfolio provides the
w
•
essential pieces to have productive security conversations with your customers.
in
n
•
ct
•
ro
• Educate customers about device-based risks not about the HP Jet Advantage portfolio.
ep
• Device-based risks, if important to the customer, lead to consulting opportunities for hardware, software,
.R
and services.
ly
on
s
er
ld
ho
ake
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
or
le
ho
w
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
a ke
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
• Concerned about employees getting their tasks completed and meeting the objectives of the business
n
May have requirements to protect business sensitive data but unsure how to
du
•
ro
IT administrator:
ep
Concerned about how complex the solution is to install, configure, use, and support
.R
•
ly
• Typically has to balance limited resources across multiple LOB managers and their demands for keeping
on
Print administrator:
ld
ho
• Needs to know the impacts of any solution to current business print processes
ke
• Is responsible for the print devices from their physical operation to the software infrastructures that make
a
it possible for a user to hit file print and the resulting outcome
St
&L
• Focused on creating an effective end-to-end print operation that satisfies the needs of the LOB managers
and IT administrators
C
P
• Focused on governing company policy around regulatory compliance and or industry regulation
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
• First is hard copies left on output trays. A typical business setting can see almost a 1/3 of printed documents being left
ho
in the out output bin for someone else to see, and, sometimes, even forgotten completely. Some of these may be
w
• Next is the device control panel. By default, anyone can browse through the menus, change settings, and copy or email
n
io
copies of internal documents. Whether it is intentional or unintentional, a control panel represents a vulnerability that
ct
• Another security vulnerability concerns managing the entire printing fleet. Is there a need to know who, what, and
ro
when someone prints, copies, or digital sends from a device? How is security monitored or assessed. Do you need to
ep
show fleet compliance or have a need to enforce policy across an entire fleet?
.R
• Many HP devices today ship with hard drives. During print, copy, and digital sending activities, data is retained on the
ly
on
hard drive. Information such as fax numbers, email addresses, network share information, and stored jobs are stored
locally on the device.
s
er
• A vulnerability that is often overlooked is data sent over the network. By default, HP devices are compatible with many
ld
operating systems, such as MacOS, Unix, Windows, Novell, etc. Even though customers don’t use all of these systems,
ho
the ports are still open and can be exploited. Print data on the network can also be intercepted, viewed, and routed to
ke
other destinations.
a
St
• If customers are using pre-printed forms or checks in paper trays, they may want to lock the trays to prevent
&L
tampering and forgery of documents. Printed documents can be tampered with and easily duplicated. Do you have a
need to protect your hard copy? Examples of hard copy that may be at risk: report cards, registration papers (vehicle,
C
• Discuss these vulnerabilities with your customers so that they are aware of them. They can choose what to do about
them. They may want to mitigate these problems or ignore them, but at least they know what the vulnerabilities are.
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
or
le
ho
w
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
a ke
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
• Educating the customer about risks is half the battle. The other half is understanding how to help the
ho
The rest of this class is dedicated to helping you build this map so, in the end, you know how to help the
in
•
customer.
n
io
ct
− Assess how frequent and to what severity a risk poses to their organization.
ro
ep
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
or
le
ho
w
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
a ke
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
Compare data protection in a laptop that then moves to hard copy print (unsecure process and result).
w
•
in
− Did you know that almost a 1/3 of all printed documents are not retrieved immediately being left in the output bin
du
− Are you aware that some unclaimed documents could be sensitive and or confidential in nature?
.R
− What is the likelihood of an end user failing to retrieve their print out?
s
− What would be the impact if an unclaimed document was retrieved or viewed by the wrong person?
er
ld
Source: The 2112 Group, IDC, Gardner Group Inc, Info-Tech Research Group, Cleveland State University, Buyers
ho
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
•
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
ake
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
• No server required.
ho
User prints and marks job for private print and hold at the device.
w
•
in
• Job is sent (pushed) to the device and held on the local hard disk.
ct
du
•
.R
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
•
in
• Data leaves the server (secured) and arrives at Pull Print server for holding.
n
io
• User needs to print, locates pull print enabled device, and authenticates.
ct
du
•
.R
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
•
in
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
or
le
ho
w
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
a ke
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
or
le
ho
w
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
a ke
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
•
in
− Are you aware the printer retains data on its hard drive when printing and or copying?
ct
du
− Do you know that fax numbers, email addresses, network share information, and stored jobs may be
ro
− What is the likelihood of a device hard drive being stolen or disposed of improperly within the
ly
on
organization?
s
− What would the impact be if a device hard drive ended up in the hands of somebody outside of the
er
ld
organization?
ho
ake
St
&L
C
P
H
d.
i te
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
The secure disk erase feature provides a choice of three different levels of disk security, which are configurable by an administrator
ho
Sanitized erase: conforms to the DoD 5220-22.M specification for deletion of magnetically stored data. Using multiple data writes to
in
eliminate trace magnetic data, sanitized erase prevents subsequent analysis of the hard disk drive’s physical platters for the retrieval
n
of data.
io
ct
Secure erase: provides increased performance overwriting the existing data once and preventing software-based “undelete”
.R
Fast erase: provides the greatest performance flagging the print job as deleted and allowing the MFP’s operating system to reclaim
on
Encrypting data is another way to protect against theft. When used for data at rest situations, data, if compromised, is illegible and, thus, rendered
useless. Protection of this type requires a highly secure method that is highly efficient for active processes.
ke
• The Advanced Encryption Standard (AES) is a specification for the encryption of electronic data established by the U.S. National Institute of
a
St
• AES has been adopted by the U.S. government and is now used worldwide. It supersedes the Data Encryption Standard (DES),which was published in
1977. The algorithm described by AES is a symmetric-key algorithm meaning the same key is used for encrypting and decrypting the data.
C
− AES 128 bit would take over a billion years to crack with today’s supercomputers.
P
H
− Removing the device or module makes it virtually impossible to read without the unique key generated by the HP printer.
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
•
in
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
or
le
ho
w
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
a ke
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
or
le
ho
w
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
a ke
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
•
in
• Discuss how this also relates to the GOOGLE EWS demo from earlier.
n
io
• Examine how devices are, by default, open to all network traffic to provide the best out of box experience
ct
possible.
du
ro
•
on
− Did you know that the printer accepts network connections from MAC, Windows, Novell, and UNIX clients
s
by default?
er
ld
− Are you aware that print jobs travel across the network in clear view for anyone to see?
ho
ke
− What is the likelihood of a person intercepting and/or manipulating data being sent to the device?
&L
− What would the impact to the organization be if print jobs and or the device was compromised as a
C
result?
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
•
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
ake
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
• Leverage the HP Base Policy to help define what and to what risk level should be enabled or disabled.
w
in
− TCP/IP: Standard TCP/IP printing, also called standard network printing or AppSocket, is the most common
du
method for printing over the network and is the standard printing protocol used by HP print devices. It is the
ro
− LPD/LPR: This protocol and set of programs is typically associated with line-printer spooling services on
ly
various TCP/IP systems, such as Berkeley-based (BSD) UNIX, HP-UX, Linux, and Windows Server.
on
− IPP: This is a standard network protocol for remote printing and for managing print jobs and device media
s
− FTP: File transfer protocol (FTP) printing sends print files from a client system to the print device using a TCP
ho
control and data connection. Although FTP provides user name and password authentication, the credentials
ke
− AppleTalk: Appletalk is an obsolete protocol used by the original Apple networking. Apple no longer supports
&L
Appletalk.
C
− IPX/SPX: Internetwork packet exchange (IPX) and sequenced packet exchange (SPX) are protocols primarily
P
used on networks that run the Novell NetWare operating system. These protocols are obsolete.
H
− Bonjour: Apple Bonjour (also known as multicast domain name system or mDNS) is used for discovering Apple
services over the TCP/IP protocol. You can safely disable this policy item if the device is not using Apple
services on the network.
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
•
in
• HP Firewall makes it possible to model access to business processes ensuring a complete and secure
n
lockout.
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
ake
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
•
in
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
or
le
ho
w
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
a ke
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
or
le
ho
w
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
a ke
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
Describe the simplified, yet advanced, state that today’s control panel operate.
w
•
in
− Are you concerned about users accessing areas of the printer they shouldn’t, such as scan to network,
ct
− Do you care who has access to the configuration menus of the device?
ep
− What is the likelihood of an employee misusing, either intentionally or unintentionally, a control panel
ly
on
− What would be the impact of an employee trying to use a device feature that you would rather not have
er
ld
them use?
ho
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
•
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
ake
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
Walk through access control flow and process at the device. Show animated slide.
ho
w
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
a ke
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
•
in
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
or
le
ho
w
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
a ke
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
or
le
ho
w
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
a ke
St
&L
C
P
H
d.
ite
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
•
n
− Checks/Vouchers – Any organization issuing checks or payment vouchers runs big risks of counterfeiting and tampering, and multiple levels of
io
− Parking passes/stickers – Counterfeits can cause loss of revenue and even liabilities if forgeries are used to gain access to unauthorized areas.
ro
− Product labels – Fraudulent labels on counterfeit products can flood a marketplace and expose consumers to inferior products presented under a
ep
company’s brand name thus damaging the true product’s brand image.
.R
− Tickets or coupons – Event tickets or retailer coupons can often be easily counterfeited with obvious potential loss to the event venue or store.
ly
− Medical documents – Prescription forms and other sensitive medical documents are also potential targets for counterfeiters.
on
− Insurance/Financial documents – Many documents in these industries contain sensitive personal information and should be secured against
s
tampering or reproduction.
er
− Government and legal documents – Government entities and other official organizations need to secure printed documents, such as permits and
ld
− ID cards and personal identity documents – It’s critical that issuers use state-of-the-art document security techniques to protect any documents
ke
containing sensitive personal information. ID cards, birth certificates, passports, and related documents are among the favorite targets of
a
thieves.
St
− Do you care who has access to sensitive preprinted forms, such as checks or letterhead, in paper trays?
C
P
− Are you concerned that your printed documents could be duplicated or altered?
H
− What would the impact be if sensitive documents were tampered with or physically altered?
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking Points:
or
le
•
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
ake
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
• Unique as a software solution, adding copy prevention requires interacting with the print stream directly.
ho
•
in
• The print job enters into a special shared queue that redirects the print data to the copy prevention
n
software.
io
ct
•
ro
• The printer creates the original print job along with copy prevention features.
.R
Pantograph makes it so that, if the original is copied, the copy document exposes “void” or “copy” on the
ly
•
on
page.
s
− This works by exploiting the limitations and features of copying equipment. A scanner or photocopier acts
er
ld
as a low-pass filter on the original image by blurring edges slightly. It will also not be perfectly aligned
ho
• Microprint is a small line of text that is legible on the original but, if copied, disrupts into an illegible rough,
a
St
thin line.
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
•
in
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
or
le
ho
w
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
a ke
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
or
le
ho
w
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
a ke
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
•
in
− Are you concerned about maintaining a standard level of security across your HP fleet of devices?
ct
du
− Do you care to know who, what, and when someone prints to your HP device(s)?
ro
•
.R
− What is the likelihood of your devices NOT having a hardening checklist and or standard level of security
policy configured?
ly
on
− What would be the impact of your devices failing to meet a standard level of security and or policy
s
configuration?
er
ld
Source: The 2112 Group, IDC, Gardner Group Inc, Info-Tech Research Group, Cleveland State University, Buyers
ho
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
•
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
ake
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
− Leverages Web Services and SNMP to discover and communicate with devices
w
in
− SOAP overview
ly
− Server ultimately has the ability to configure devices in groups or fleet and provide proactive monitoring
on
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
• Devices are loaded with a collection agent or come built in with one.
ho
•
in
• Web interface is used to access collected SQL data to create hundreds of reporting possibilities.
ro
ep
.R
ly
on
s
er
ld
ho
ake
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
Compliance is about identifying, assessing, and remediating devices to a consistent level of security.
w
•
in
• Policy is created to match the customer’s need in terms of device features and protocols being enabled or
ct
disabled.
du
ro
• Reporting is reviewed to determine which devices fail to meet the policy’s security level.
.R
•
on
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
Server-based solution monitors the network for new devices to come online.
w
•
in
• Devices are automatically assessed and remediated to a defined level of security policy.
n
io
• Reporting can be generated at any time to see policy compliance of the fleet.
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
ake
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
•
in
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
or
le
ho
w
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
a ke
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
• Describe how we have covered the entire HP Jet Advantage portfolio from a risk perspective.
ho
Review that the goal of starting a conversation with the customer is about risk management and not about
w
•
leading with product.
in
n
•
ct
− Identify risks.
du
ro
− Assess risks.
ep
− Prioritize risks.
.R
Review that letting the customer identify the risk simplifies the choice of technologies and, hence, solutions
ly
•
on
As a critical step in the consulting process, having this knowledge and maintaining it is critical to being
er
•
ld
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
or
le
ho
w
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
a ke
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
• Demo guide is a self paced walk through of HP security as it sits in the device today.
ho
•
in
• Not all solutions are available in all regions or to all partner levels.
n
io
• Every risk has a free solution offering for mitigation for partners who want to stay centric to in or around
ct
• Free solutions should be bundled with your own professional services to implement (i.e. HP Web Jetadmin).
ep
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
Talking points:
or
le
• Lead security conversations with risk-based education rather than product / solution focused selling.
ho
•
in
• You can benefit customers with an improved security situation while increasing your hardware, software,
n
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
or
le
ho
w
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
a ke
St
&L
C
P
H
d.
te
i
ib
oh
pr
is
on
si
is
m
er
tp
ou
ith
w
rt
pa
in
or
le
ho
w
in
n
io
ct
du
ro
ep
.R
ly
on
s
er
ld
ho
a ke
St
&L
C
P
H