In this challenging cybersecurity climate, Canon benefits its clients with an on-going commitment to a strong security feature set in our printers and MFP’s. Through our 5 Pillars of Security we can help address risk, improve efficiency and improve incident response in organizations.

Please visit each of our 5 Pillars of Security to see how Canon can help with security in your organization.

The 5 Pillars of Security logo

Canon’s 5 Pillars of Security presents a portfolio of cybersecurity products and services in a thoughtful way that groups solutions in functional areas. Device Security is key component of our 5 Pillar approach.

Can cybercriminals hijack your office equipment?

Yes. Printers, multifunctional devices, and other networked office equipment can be targets for cybercriminals. If they’re connected to the internet, they can be accessed from outside your office walls. That’s why Canon imageRUNNER ADVANCE DX multifunction devices offer extensive security features to harden your defenses.

You can close unused ports, encrypt hard drives, and set up data flow protocols that can help to minimize your exposure to data breaches. Our expert field engineers can help you protect your document workflows without compromising the productivity and efficiency of your workforce.

image of the5 Key Areas of Device Security

Access Control

Access ControlControlling access begins by authenticating users at the printer or multifunction device. This can be done with a PIN code, a password, or a proximity card. Users can be assigned privileges by an administrator, authorizing them to have access to certain features and functions on the device (copying, printing, scanning, faxing, etc.).

uniFLOW Online is designed to help save your organization time and money and provide business and security controls over your entire printer and multifunction printer fleet.

Trellix logo

Secure your devices from malware and tampering.

The Canon imageRUNNER ADVANCE series is designed with security in mind. These devices can prevent tampering by prohibiting the installation or execution of programs without a digital signature applied by Canon. The following program-tampering detection functions are in place to counter unknown attacks.*

System Verification at Startup

Once enabled, the Verify System at Startup function runs a process during startup to verify that tampering of boot code, OS, firmware, and MEAP applications has not occurred. If tampering of one of these areas is detected, the system will restart using a "Golden Master" that is known good . By using the hardware as the “Root of Trust,” enhanced security against software tampering is provided. Furthermore, standard cryptographic technologies (hash, digital signature) are used for verification.

McAfee Embedded Control

Once enabled, McAfee Embedded Control allows only known programs contained in the dynamic whitelist to be executed on the multifunction printer. Any program that is not on the whitelist is considered unauthorized and will not be permitted to execute. This helps prevent worms, viruses, spyware, and other malware from compromising the device. A log of all prevented executions is available in the Audit Log when Runtime Intrusion Detection is enabled.

*Note: These features are only available on third-generation Canon imageRUNNER ADVANCE models and must be enabled. McAfee Embedded Control requires Unified Firmware Platform (UFP) v3.9.

Big Security for Big Printer Fleets

Printer Fleet Cybersecurity as a Service™

Often, many printers on corporate networks are not configured or maintained for cybersecurity. Many cybersecurity plans don’t even mention, let alone address, these elements. Printer fleets can number in the hundreds or thousands with many different makes, models, and ages of devices. Until now, there has been no way to affordably establish and maintain cybersecurity controls in printer fleets. The Answer: Printer Fleet Cybersecurity as a Service.™

Canon has a solution designed to help economically and systematically address gaps in device security. It’s the perfect solution for any organization to tune and manage printer security and firmware updates and treat printers like the important computing devices they are. Even more important, we can help keep any brand of printer in your fleet configured and updated for optimal security, all while reducing the work your IT staff has to do with a concierge approach.

image of the Symphions Graphic Process

Resources

File Name

The True Cost of Cybersecurity

Date

12.26.24

File Size

3.5 MB

File Name

Canon Device Security Overview Brochure

Date

12.26.24

File Size

1.6 MB

File Name

5 Pillars of Security Brochure

Date

12.26.24

File Size

5.9 MB

File Name

EDRM - Infographic

Date

01.06.25

File Size

0.7 MB

File Name

Rapid7 Vulnerability Management Brochure

Date

01.06.25

File Size

1.4 MB

File Name

Cybersecurity Starts with Training Your Team - Infographic

Date

01.06.25

File Size

0.7 MB

File Name

Facing the Risks of Cyberattacks Managed Detection Response

Date

01.06.25

File Size

3.7 MB

File Name

Vera Help Secure Any Data Anywhere - White Paper

Date

01.06.25

File Size

0.4 MB

File Name

Rapid7 MDR Service Brief

Date

01.06.25

File Size

0.2 MB

File Name

Cybersecurity HELP WANTED - Infographic

Date

01.06.25

File Size

1.3 MB

File Name

Cybersecurity: 4 Overlooked Areas

Date

01.06.25

File Size

1.5 MB

File Name

Monitor Detect Respond - Infographic

Date

01.06.25

File Size

0.7 MB

File Name

The Cybersecurity Mirage - eBook

Date

01.06.25

File Size

3.6 MB

File Name

Five Pillars of Security - eBook

Date

01.06.25

File Size

0.6 MB

File Name

Foundational Elements of Security - eBook

Date

01.06.25

File Size

1.5 MB

File Name

FORTRA Secure Collaboration for Vertical Mkts - Brochure

Date

01.06.25

File Size

3.1 MB

File Name

Help Enhance Your Data Security with FORTRA - Flyer

Date

01.06.25

File Size

0.7 MB

File Name

FORTRA Secure Collaboration and Classification - Brochure

Date

01.06.25

File Size

1.1 MB

File Name

Cybersecurity Services for Law Firms Brochure

Date

01.06.25

File Size

2.4 MB

File Name

Security Solutions and Services for Healthcare Brochure

Date

01.06.25

File Size

2.2 MB

File Name

Rapid 7 Security Response Timeline

Date

01.06.25

File Size

1.1 MB

File Name

Securing Your Print Fleet: What To Do - White Paper

Date

01.06.25

File Size

1.4 MB

File Name

Securing Multi-Brand Printer Fleets Can Be Easy - Infographic

Date

01.06.25

File Size

0.7 MB

File Name

Printers are endpoints too - Infographic

Date

01.06.25

File Size

1.1 MB

File Name

Symphion Print Fleet Cybersecurity as a Service Brochure

Date

01.06.25

File Size

0.7 MB

File Name

Is Document Management Part of Your Security Policy

Date

01.06.25

File Size

0.5 MB

File Name

Securing Client Data in a Digital Age Brief

Date

01.06.25

File Size

2 MB

File Name

Big Security Solutions for Your Business - Infographic

Date

01.06.25

File Size

0.6 MB

File Name

Mitigating Risk, Increasing Resilience Cybersecurity Insights for Law Practices

Date

01.07.25

File Size

0.2 MB

File Name

Collaborate Confidently With Integrated Data Security

Date

01.07.25

File Size

0.2 MB

File Name

How to Pick a Printer That's Hard to Hack - Infographic

Date

01.21.25

File Size

0.9 MB

Are you ready to step up your security? Let’s talk.

Many variables can impact the security of a customer’s device and data. Canon does not warrant that the use of services, equipment, or related features detailed herein will eliminate the risk of potential malicious attacks, or misuse of devices or data or other security issues.

GET SUPPORT
Need help with your product? Let us help you find what you need.
Product Support
DOWNLOADS & DRIVERS
Search by product or browse by product type.
Software Support
WHY CANON
Learn what sets Canon apart from our competitors.
Learn more