Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

Are Your Customers’ Printers Protected from a Data Breach?

October 30, 2017

Are Your Customers’ Printers Protected from a Data Breach?

Discover the smart way to sharpen your device, data, and document security by attending the HP IPG breakout sessions at the Fall 2015 Ingram Micro ONE event.

Most IT solution providers know the basics of protecting their customers’ data: Keep antivirus up to date on PCs and mobile devices. Update passwords on a regular basis. Keep up with software and firmware patches on PCs and servers. Use enterprise class firewalls. While these security measures are good and necessary, they all too often overlook a very important kind of network device — printers and imaging devices. These security threats are real, and as printing and imaging devices become increasingly sophisticated, they offer greater opportunities for attackers to compromise the device or the entire network.

According to the “Annual Global IT Security Benchmark Tracking Study,” released by Ponemon Institute earlier this year, 53 percent of IT managers realize printers are vulnerable to cybercrime. Shockingly, the same survey found that 64 percent of IT managers believed their printers were likely infected with malware.

Even a single data breach can be devastating to an organization. After factoring in litigation, loss of licensing, identity theft, and a tarnished brand image or reputation, the average cost is $3.8 million, according to a 2015 study by the Ponemon Institute, up from $3.5 million last year.

Remove Printers from Cyber Criminals’ Cross Hairs

IT solution providers need to deploy the same end-to-end security strategy with networked printers and imaging devices as they use on computers and servers. HP has simplified this process for its partners by embedding security features in HP devices. Through a broad portfolio of HP JetAdvantage solutions and services, HP offers resellers a strategic foundation to assess, manage, and fortify security for:

  • Imaging and printing fleets
  • Data in transit and at rest
  • Printed documents
  • Cloud access
  • Printing from mobile devices

The latest generation of HP Enterprise LaserJet printers are the only printing and imaging devices to offer three key technologies designed to thwart attackers’ efforts and self-heal after an attempted breach. For example, HP JetAdvantage automatically trigger a reboot in the event of an attack or anomaly. After a reboot occurs, HP JetAdvantage Security Manager automatically assesses and, if necessary, remediates device security settings to comply with pre-established company policies — all without IT intervention.

Additionally, IT administrators can be notified via HP management applications such as:

HP Sure Start

HP Sure Start validates the integrity of the BIOS at every boot cycle. If a compromised version is discovered, the device restarts using a safe, “golden copy” of the BIOS.


This feature helps ensure only authentic, known-good HP code (i.e. FutureSmart firmware) that has not been tampered with is loaded into memory. If an anomaly is detected, the device reboots to a secure, offline state. It then sends a notice to IT to reload the firmware.

Run-time Intrusion Detection

This feature checks for anomalies during complex firmware and memory operations. In the event of an intrusion, the device automatically reboots.

To learn more about ways HP keeps printers and imaging devices safe, be sure to attend the HP IPG breakout sessions at the Fall 2015 Ingram Micro ONE event, which is being held at the Gaylord Opryland Resort in Nashville, TN. On Tues., Nov. 17 and Wed., Nov. 18, HP subject matter experts will be highlighting HP’s multilayer strategy for device, data, and document security.