Canon Solutions America can help customers develop, implement and maintain an effective corporate data privacy compliance strategy by offering select solutions and services in our portfolio.

 
Data Usage | Data Storage & Data Intake | Data Maintenance & Data Disposal | Endpoint Protection | Security Solutions

DATA USAGE

VERA

The Vera platform is structured to enable businesses of all sizes to protect any kind of data, and then track, audit, and manage the policies securing files in real time, no matter how far they travel. Vera helps to secure confidential data no matter what device, person, cloud, or application it travels to.

Vera makes it virtually effortless to securely collaborate with anyone, no matter which tools they choose to use - email, Box, Dropbox, or file shares.

  • Encrypt, view, and share files from any device, desktop, or mobile.
  • Consistent experience on Windows, Mac®, iOS®, and Android™.
  • Invisible client, with no browser or plugin support required.
  • Zero friction; works with any storage or any service, and is built on modern technology.

DATA STORAGE & DATA INTAKE

Therefore

Managing information securely is a fundamental aspect of Therefore™ software. Therefore™ helps ensure that personal data is only available to authorized users and that all information is securely backed up. Therefore™ is regularly subjected to penetration testing, and its architecture aligns with industry accepted security standards1.

  • System permissions can restrict unauthorized access to the repository
  • Fully customizable access permissions for specific content and data
  • Anti-tamper measures help ensure document authenticity
  • Automatic document back-up for disaster recovery
  • Audit Trail tracks user and document activity
  • Conformation with security standards, regular penetration testing
 
Box

An alternative to todays distributed content chaos, organizations can help increase security by centralizing control of their content in the cloud. Though not obvious to all, organizations can carefully extend existing controls into a security-conscious cloud service such as Box and help improve their overall security.

Addressing the Security Challenges of Distributed Computing

  • Centralized Control over Information
  • Secure File sharing & Collaboration
  • Data Loss Prevention
  • eDiscovery Support
  • Reduced Data Risk Associated with Lost Mobile Devices

1Therefore™ software has passed a rigorous data protection audit by the consulting firm Ebner Stolz, one of the largest independent mid-sized consultancies in Germany.

uniFLOW

Scanning paper documents in the digital world is common practice. uniFLOW provides a powerful scanning and workflow engine to safely digitalize your documents. With digitalization comes distribution, often to external organizations across unfamiliar networks. While uniFLOW can scan documents to many different file formats, PDF is universally recognized as the ‘Portable’ file format of choice. uniFLOW supports several PDF versions and standards. It can also produce encrypted PDFs with optional password-protection against viewing, editing or printing.

Secure Scan Destinations:

  • For cloud service end-points 0Auth identity providers are supported.
  • User identities and credentials are stored securely with AES-256 encryption.
  • Access Control Lists ensure scan destinations are available to authorized users only.

Secure Document Scanning:

  • Security for PDF output is granted through password protection and certificate-based signing.
  • For PDF output meta-data support allows tracking for author and ownership.
  • All user scanning can be tracked, traced and reported.
 
imageRUNNER ADVANCE

Scan and Send Security

On devices that have Scan and Send enabled, certain information such as fax numbers and e-mail addresses may be considered confidential and sensitive. For these devices, there are additional security features to prevent confidential information from being accessed.

Other data intake security features include:

  • Address book password protection
  • Access code for address books
  • Destination restriction

DATA MAINTENANCE & DATA DISPOSAL

Therefore

Managing information securely is a fundamental aspect of Therefore™ software. Therefore™ helps ensure that personal data is only available to authorized users and that all information is securely backed up. Therefore™ is regularly subjected to penetration testing, and its architecture aligns with industry accepted security standards1.

  • System permissions can restrict unauthorized access to the repository
  • Fully customizable access permissions for specific content and data
  • Anti-tamper measures help ensure document authenticity
  • Automatic document back-up for disaster recovery
  • Audit Trail tracks user and document activity
  • Conformation with security standards, regular penetration testing
 
VERA

The Vera platform is structured to enable businesses of all sizes to protect any kind of data, and then track, audit, and manage the policies securing files in real time, no matter how far they travel. Vera helps to secure confidential data no matter what device, person, cloud, or application it travels to.

Vera makes it virtually effortless to securely collaborate with anyone, no matter which tools they choose to use - email, Box, Dropbox, or file shares.

  • Encrypt, view, and share files from any device, desktop, or mobile.
  • Consistent experience on Windows, Mac®, iOS®, and Android™.
  • Invisible client, with no browser or plugin support required.
  • Zero friction; works with any storage or any service, and is built on modern technology.
imageRUNNER ADVANCE

Canon’s imageRUNNER ADVANCE MFD systems offer several options to help manage and also purge unwanted data or documents processed by the system. These can be routinely scheduled or can be executed manually. Features are as follows:

  • TPM (Trusted Platform Module) – encryption for data processing
  • Hard Drive Password Lock
  • Hard Drive Data Format (EOL)
  • Hard Drive Data Erase
  • Hard Drive Data Erase Scheduler MEAP
  • Hard Drive Data Encryption
  • Removable Hard Drive Kit
 
 

1Therefore™ software has passed a rigorous data protection audit by the consulting firm Ebner Stolz, one of the largest independent mid-sized consultancies in Germany.

ENDPOINT PROTECTION

Endpoint protection is table stakes for any organization.

For cyber criminals printers, multifunctional devices and any other office equipment having contact with the outside is the low hanging fruit and can become the first target for exploitation in the pursuit of breaching a company's perimeter. The good news is that Canon imageRUNNER ADVANCE multifunctional devices include extensive security features to help an organization "harden" their print fleet.

SECURITY SOLUTIONS

CORPORATE DATA PRIVACY COMPLIANCE STRATEGY STARTS WITH SERVICES

Maintaining privacy and securing data subjects' personally identifiable information starts with establishing a well-planned security posture and can play a pivotal role strategy. Risk management and threat mitigation are just two of many strategic elements of any effective security framework.

ACS

Our cybersecurity services provider, Agile Cybersecurity Solutions (ACS) can help organizations of all types and sizes through consultative collaboration when addressing risk assessment, vulnerability assessment, penetration testing, awareness, and training for all stakeholders. ACS is available to respond to an incident should the unfortunate need arise. For smaller organizations who don’t maintain a security staff, Agile Cybersecurity Solutions can provide a virtual chief information security officer (vCISO) as needed on a subscription basis.

Located in Washington, D.C. and established in 2012, ACS has become a trusted leader in cybersecurity. Their unique combination of proven methodologies and multi-disciplined cyber expertise form a proactive, end-to-end cybersecurity solution.

The ACS Cyber SEAL Program is designed to attract the best and brightest talent in the cybersecurity space. These cybersecurity practitioners integrate seamlessly with existing teams and act as a catalyst for quick and decisive action, critical to next gen cybersecurity services and solutions.