Having strong support matters. Canon serves as a trusted supplier in security, collaborating with leading third-party organizations to help deliver a comprehensive range of security-focused products and services to your organization.
Our printers and multifunction devices are designed with advanced security features to help protect your sensitive information. Through Canon’s innovative 5 Pillars of Security approach, we empower organizations to mitigate risk, enhance efficiency, and strengthen incident response strategies.
Explore each of our 5 Pillars of Security to see how we can help your organization prepare for the unexpected.

Canon’s 5 Pillars of Security presents a portfolio of security products and services in a logical way that groups solutions in functional areas. Device Security is a key component of our 5 Pillar approach.
Can cybercriminals hijack your office equipment?
Yes. Printers, multifunctional devices, and other networked office equipment can be targets for cybercriminals. If they’re connected to the internet, they can be accessed from outside your office walls. That’s why Canon imageRUNNER ADVANCE DX and imageFORCE series multifunction devices offer extensive security features to help harden your defenses.
Golden rule: Close unused ports, encrypt hard drives, and set up data flow protocols to help minimize your exposure to data breaches. With the support of expert field engineers, you can help protect your document workflows without compromising the productivity and efficiency of your workforce.

Access Control
Controlling access begins by authenticating users at the printer or multifunction device. This can be done with a PIN code, a password, or a proximity card. Using the principle of least privilege, users can be assigned privileges by an administrator, authorizing them to have access to certain features and functions on the device (copying, printing, scanning, faxing, etc.).
uniFLOW Online is designed to help save your organization time and money and provide business and security controls over your entire printer and multifunction printer fleet.

Secure your devices from malware and tampering.
The Canon imageRUNNER ADVANCE and imageFORCE series of multifunctional devices are designed with security in mind. These devices can help prevent tampering by prohibiting the installation or execution of programs without a digital signature applied by Canon. The following program-tampering detection functions are in place to counter unknown attacks.*
System Verification at Startup
Once enabled, the Verify System at Startup function runs a process during startup to verify that tampering of boot code, OS, firmware, and MEAP applications has not occurred. If tampering of one of these areas is detected, the system will restart using a "Golden Master" that is known good. By using the hardware as the “Root of Trust,” enhanced security against software tampering is provided. Furthermore, standard cryptographic technologies (hash, digital signature) are used for verification.
McAfee Embedded Control
Once enabled, Trellix Embedded Control allows only known programs contained in the dynamic whitelist to be executed on the multifunction printer. Any program that is not on the whitelist is considered unauthorized and will not be permitted to execute. This helps prevent worms, viruses, spyware, and other malware from compromising the device. A log of all prevented executions is available in the Audit Log when Runtime Intrusion Detection is enabled.
*Note: These features are only available on third-generation Canon imageRUNNER ADVANCE models and must be enabled. Trellix Embedded Control requires Unified Firmware Platform (UFP) v3.9.
Full-scale Security for Your Printer Fleets
Printer Fleet Cybersecurity as a Service™
Often, many printers on corporate networks are not configured or maintained for cybersecurity. Many cybersecurity plans don’t even mention, let alone address, these elements. Printer fleets can number in the hundreds or thousands with many different makes, models, and ages of devices. Until now, there has been no way to affordably establish and maintain cybersecurity controls in printer fleets. The Solution: Printer Fleet Cybersecurity as a Service.™
Canon aligns with a trusted provider to offer a solution designed to help economically and systematically address gaps in device security. It’s the perfect solution for any organization to tune and manage printer security and firmware updates and treat printers like the important computing devices they are. Even more important, this solution can help keep any brand of printer in your fleet configured and updated for optimal security, all while functioning to reduce the work your IT staff has to do. Printer Fleet Cyber Security uses a concierge approach.

Are you ready to step up your security? Let’s talk.
Many variables can impact the security of a customer’s device and data. Canon does not warrant that the use of services, equipment, or related features detailed herein will eliminate the risk of potential malicious attacks, or misuse of devices or data or other security issues.