Enterprise Samsung Authorized Dealer

(865) 862-0515
Johnson's Office Equipment Samsung X4300LX


Multifunction Printers (MFPs) are complex network devices that require careful consideration regarding security. Samsung’s printing and networking products include a wide array of security related features. This document discusses those features and provides an overview of their benefits and their implementation.

Any device that is placed on a network must be evaluated with respect to security. How does the device protect itself from unauthorized access? Does the device expose the network to any form of vulnerability? What sort of information does the device process, and what are the security considerations related to that data? These and many other questions are appropriate to ask of any networked device, including networked printers.

Networked printers operate independently on the network and can be focal points for sensitive information. Securing them is sometimes comparable to securing other conventional networked devices such as computers: the need for controlled network access and the need for secure remote management are largely the same for printers and workstations. In other areas, the security considerations around printers are substantially different: they generally don’t run conventional operating systems, they don’t have network file shares that need to be secured, they probably don’t need or support antivirus software, etc.

Security Policy

Samsung security policies are based on industry standard requirements set forth by several regulatory organizations. By using the guidelines from these organizations, Samsung has developed a set of security goals that meet the standardized security requirements and the needs of Samsung customers.

The document below will define the major areas of security concerns related to printers, and provide an overview of the Samsung printer security features that allow these devices to be deployed, managed and used in a secure manner.

Regulatory Standards

The following are regulatory standards that are used to provide security guidelines:

  • Common Criteria
  • FIPS 140-2
  • SOX
  • GLBA
  • IEEE Std 2600TM 2008
  • DoD 5200.28-M

Share This