Fiery Security Whitepaper

<p><a href=""><img title="2010-05-03_222715" style="border-top-width: 0px; display: inline; border-left-width: 0px; border-bottom-width: 0px; margin: 0px 10px 10px 0px; border-right-width: 0px" height="225" alt="2010-05-03_222715" src="" width="174" align="left" border="0" /></a> This document outlines architectural and functional aspects of Fiery Network Controllers with respect to device security. The purpose of this document is to provide a general overview of the Fiery Network Controller so that end users may research security features from which they can benefit and potential vulnerabilities they may encounter. This&#160; document outlines the current System 6, 6e, 5.5, 5.5e, 5.1e, and 5 models of the Fiery Network Controller generally from the perspective of its hardware architecture, software&#160; configuration, security features, and document information flow.</p> <p>1.1 Electronics For Imaging Security Philosophy </p> <p>For end users, Fiery network controllers have brought tremendous value to otherwise standalone devices. EFI recommends installation of network devices such as a Fiery network controller is done in accordance with existing security paradigms. EFI’s goal is to lead the printing industry in the level of security of our devices and their data. To this end, EFI has incorporated security features into its line of Fiery network controllers. To create a more secure network environment, end-users will need to combine the Fiery security features with other security safeguards. </p> <p>EFI places a high priority on producing a product with strong security features. EFI has worked with all our OEM partners to determine the requirements of the digital printing community. EFI has also created a cross-functional team whose primary focus is to deal with present and future security issues. EFI hopes that the end users will be able to independently evaluate the information provided in this overview to develop their own chosen system of security. Only by choosing measures designed to enhance security such as secure password procedures and strong physical security procedures, can the end user realize a system with security features.</p> <!--break--> <div class="wlWriterEditableSmartContent" id="scid:8eb9d37f-1541-4f29-b6f4-1eea890d4876:142e4207-caea-4b46-952c-a53649bc2763" style="padding-right: 0px; display: inline; padding-left: 0px; float: none; padding-bottom: 0px; margin: 0px; padding-top: 0px"><p><div>Download Full Whitepaper: <a href="" target="_self">Fiery Security Whitepaper</a></div></p></div>