Virtualized Systems as a Basis for Redundancy

Foundation for Business Continuity, Disaster Recovery, and Managed Failover

Many people seem to know they want or need to virtualize their systems, but far less seem to have a good grasp of why they should do so. Virtualization holds a great deal of promise for redundancy to support business continuity and similar needs; the big question is how much capability comes “out of the box” and how
much other work is required to have a robust solution?

This document will discuss several levels of infrastructure redundancy with a view to accomplishing maximum possible uptime based on various risk factors, and suggest several possible architectures that correspond to different levels of risk mitigation. These will range from internal factors within a given component’s design to large-scale infrastructure designs to mitigate catastrophic failure of a site. Several of these factors are not
unique to a virtualized environment and will be identified. While several different parts of the overall infrastructure will be addressed, areas such as power and Internet Service Provider (ISP) redundancy require a far more extensive investigation and this paper will only touch on the topics needing to be covered.

Types of Redundancy within Individual Components (Server and Storage)

Within a given host computer, it is recommended that you have at least two forms of redundancy, assuming there is no local storage. Local storage, that is disks or RAID arrays installed within a single server, are not available to other servers in case of system failure and are therefore not suitable. In addition, storage that is considered highly available requires some specific design features for redundancy.

  • Power Supply Redundancy allows you to continue full operation in the event of a single power supply component failure, along with the ability to hot-swap a replacement power supply for the failed unit without interrupting production. Within Kodak, any of the Premium Workflow servers come with hot-swappable redundant power supplies by default. If selecting host computers from another vendor, ensure that the systems contains redundant power supplies. This also applies to any server or storage component in the system.

Overcoming Barriers to AP Automation: A Roadmap for Success

 In 1999, the head of a major electronic-invoicing task force predicted that 95 percent of the Fortune 500’s U.S. paper invoices would be transformed into electronic invoices by 2002. Over 10 years later, that prediction has not been fulfilled.

Although there have been significant technological breakthroughs that can help accounts payable dramatically reduce costs and improve cycle times, most AP organizations have been slow to adopt them. Invoice automation is one example.

An annual survey of technology adoption in AP conducted by RECAP Inc. for 10 years from 1998 through 2007 found that adoption of technology takes significantly longer than it should. In follow-up discussions with selected survey participants, it was discovered that many firms repeatedly put off their key automation initiatives despite significant pressures to reduce costs and reduce AP cycle time, the time from receipt of an invoice to payment.

Typically 80 percent of the work done in accounts payable is associated with invoice processing. Over 99.9 percent of all invoices are prepared on computers, yet the vast majority of them are processed by manually keying information from a paper invoice document into an automated system to
process and pay.

Document Scanning in the Office

Advanced Recording Techniques

This white paper explores how document scanning can improve productivity, protect information, and create opportunities to lower operational costs in front office environments. It cites independent research conducted with individuals from 180 organizations representing a cross section of small, medium, and global businesses representing manufacturing, high technology, financial services, retail, health care, transportation, real estate, and professional service industries. In addition, public sector organizations representing utilities, educational institutions, State, local, and federal government agencies also participated in the research. The conclusions summarized in this white paper show that the scanning of documents will accelerate in the front office as paper documents continue to be the lifeblood of everyday work processes.

Executive Summary

Document scanning has evolved from the traditional, monolithic “back-office” production-level systems for capturing documents to the current de-centralized model where information is captured “at the point of need.” Like traditional scanning applications, these de-centralized operations focus mainly on documents whose value has been predetermined to be critical to a particular line of business. However, a new need has emerged where all types of business documents will be scanned regardless of their known value to the organization. The realization that all documents can increase in their value once digitized will drive much of the new market for document scanning. This new frontier for scanning will be focused on “front office” environments where information workers interact with customers, partners, and each other.

The need for digitizing paper documents to enhance productivity, security, compliance and data protection has extended beyond specific line-of-business applications to include every document type, at every level of the organization, across government and industry; in small, medium, and large enterprises.

This white paper is divided into seven sections:

  • Section one provides an introduction to the paper problems facing today’s business professional and an overview of the research conducted in support of this document
  • Sections two through six analyze research findings related to paper filing, storage, and retrieval, the emergence of Adobe PDF as the ideal container for scanned images, security and disaster recovery, and information distribution.
  • Section seven provides a summary and conclusion.

MFP Security Overview


Multifunction Printers (MFPs) are complex network devices that require careful consideration regarding security. Samsung’s printing and networking products include a wide array of security related features. This document discusses those features and provides an overview of their benefits and their implementation.

Any device that is placed on a network must be evaluated with respect to security. How does the device protect itself from unauthorized access? Does the device expose the network to any form of vulnerability? What sort of information does the device process, and what are the security considerations related to that data? These and many other questions are appropriate to ask of any networked device, including networked printers.

Networked printers operate independently on the network and can be focal points for sensitive information. Securing them is sometimes comparable to securing other conventional networked devices such as computers: the need
for controlled network access and the need for secure remote management are largely the same for printers and workstations. In other areas, the security considerations around printers are substantially different: they generally don’t run conventional operating systems, they don’t have network file shares that need to be secured, they probably don’t need or support antivirus software, etc.

Egnyte Security Architecture White Paper


Security, it’s the number one concern of businesses when adopting new technologies involving company data. As businesses move their data digitally, they are faced with increasing risks and costs from data intrusions. With the absence of a company-sponsored file sharing platforms, more employees are seeking unsafe consumer solutions, which can lead to data breaches. To regain control of company data, businesses need a file sharing platform with comprehensive end-to-end data protection. Egnyte offers a unique hybrid cloud solution with enterpriseclass security and privacy; providing businesses with secure file sharing, access, storage and backup. 

Egnyte is focused on complete end-to-end data protection through the five stages of security: Physical, Network, Transmission, Access, and Data. In addition to providing maximum security under each category, Egnyte continually maintains state-of-the-art technology and performs ongoing threat management.

Physical Security

Data Center
End-to-end security starts with the ability to physically protect the servers where data resides. Egnyte provides this first line of defense by housing file servers in industry-leading Tier II, SSAE 16 compliant colocation facilities that feature 24-hour manned security, biometric access control, and video surveillance. All servers reside in private cages that require physical keys to open. All data centers hosting these servers are audited annually for potential  risks and limitations.

Egnyte Security Architecture White Paper

HP Secure Erase for Imaging and Printing

1 Introduction

To meet the needs for higher levels of print and imaging security, Hewlett-Packard created HP Secure Erase technology for Imaging and Printing. This capability allows the adm inistrator to select how data is erased from storage devices, including print, scan, fax, and copy jobs. Several levels of erase security are provided. The capability is provided as a standard feature on supported HP multifunction peripherals (MFPs), digital copiers, and printers when used with HP’s Web Jetadmin (available separately).

HP Secure Erase technology provides a choice of three different modes of erase security, each of which can be configured by an administrator and may be protected from unauthorized changes with a password. The three erase security modes are:

  • Secure Sanitizing Erase mode: Conforms to the U.S. Department of Defense 5220-22.M specification for deleting magnetically stored data. Secure Sanitizing Erase uses multiple data overwrites to eliminate trace magnetic data and also prevents subsequent analysis of the hard disk drive’s physical platters for the retrieval of data. For an explanation of the erase algorithm implemented, see Section 4, Specifications.
  • Secure Fast Erase mode: This mode completes the erasure faster than Secure Sanitize mode. Secure Fast Erase mode overwrites the existing data once, and prevents software-based “undelete” operations on the data.
  • Non-secure Fast Erase mode: The quickest of the three erasing modes, , Non-secure Fast Erase mode marks the print job data as deleted, and allows the MFP’s operating system to reclaim and subsequently overwrite the data when needed.

Integrated Workflow in the New Business of Printing™

Printers today are challenged by a fierce competitive climate, the impact of electronic media, and changing customer needs and expectations. Workflow is central to meeting these challenges, not only because workflow automation drives efficiencies, but because workflow can be extended out to customers and suppliers, enabling closer more enduring relationships. 

Changing customer expectations and needs has forced many printers to reposition, refine, or fundamentally alter their services. Doing so dictates a serious reexamination of workflow. In evaluating workflow solutions, printers should detail their specific requirements and ask the following questions:

  • Will the workflow investment support a business growing into full-color digital printing?
  • Are workflow products fully integrated?
  • How many discreet products will be required to support end-to-end production, including the design, preparation, printing, and fulfillment of a job?
  • Does the workflow support flexible file formats which facilitate editing and storage?
  • Does the workflow provide a framework to support all required application environments, such as on-demand publishing and transactional processing?
  • Can the workflow integrate with existing production processes, such as digital and offset printing to avoid parallel, redundant tools and processes?
  • Can the workflow integrate with other technologies and systems to provide a complete end-to-end architecture to support the business?

imageRUNNER Security White Paper AFD Response


This paper is a response to the Canon White Paper: Canon imageRUNNER/imagePRESS
Security. This is a response from ANTS on what we are doing today and what we feel we need to investigate more.

When a setting is applicable to network printers it will be noted. It should be noted that some of the features cannot be accessed from the RUI (Remote User Interface) and must be done at the printer console.

Canon Security Recommendations Quick Reference

On page 19 of the white paper Canon Recommends the following.

The following actions are recommended by Canon as appropriate first steps in securing the Canon imageRUNNER or imagePRESS device for most environments. While these suggestions assist in enhancing device security, internal company security policies should ultimately dictate which security measures are appropriate for implementation within a specific environment.

  1. Set the system administrator ID and password
  2. Disable unused ports and applications (e.g. FTP, RUI)
  3. Set passwords for MailBoxes
  4. Restrict printing and RUI access to specific IP or MAC addresses
  5. Set passwords for Address Book management
  6. Change the SNMP community strings
  7. Disable the USB port if unused
  8. Utilize Optional Hard Disk Drive Erase Kit or Hard Disk Drive Encryption Kit to ensure integrity of data stored on internal imageRUNNER/imagePRESS Hard Disk Drives
  9. Enable and configure Department ID to manage user device access permissionson a departmental or user level
  10. Monitor the devices using imageWARE EMC

Integrating Paper Documents into Digital Workflows

Document and content management systems now handle a wide variety of information assets, including electronic documents, audio, video, etc., and make them available to anyone with appropriate access rights, regardless of their physical location. Largely missing from this picture, however, is the ability to share paper-based information.Except for specific vertical applications (forms processing, records management, etc.), knowledge that exists on paper tends to stay on paper.

As network connected digital copiers- also known as multifunction peripherals or MFPs- become the workplace standard for department copying/printing/scanning, it is fast becoming a business requirement for MFP’s to offer the additional functionality necessary to integrate with
existing business applications. By offering this functionality, 3rd parties (VARs, system integrators, and office equipment dealers) are able to provide their customers a solution which links their paper documents with their enterprise applications and resulting digital processes.

Regardless of the economic climate, successful companies are continually looking for ways to leverage their existing infrastructure and applications to save money. Today, MFP “Connectors” are available to greatly enhance
your current business processes by integrating paper-based information with your workflow. Using software developer kits (SDKs) 3rd parties and in-house IT departments can:

  • Dynamically link digital copiers and scannersto existing applications via eCopy technology
  • Save paper documents directly into application databases
  • Provide native integration
  • Validate users at the MFP, providing audit trails forregulatory compliance


Subscribe to RSS - Whitepaper