Print Security (Part 3 of 3)

by Tobias Habermann

Tobias Habermann

Protection of company data is taking on an ever greater role, and more resources than ever are being given over to ensuring their security. In this three-part series on our blog, you’ll learn many things about dangerous situations in printing, as well as the ways to prevent them. Today I’ll show you how you can make your print processes more secure.

Read more

Secure Printing (Part 2 of 3)

by Tobias Habermann

Tobias Habermann

The protection of data has taken on an increasingly important role for businesses. More resources than ever before are being given over to ensuring this security. In this three-part series on our blog, I’ll show you typical dangers in printing and general ways that they can be prevented. In this part, after human error and organizational deficiencies  I’ll introduce you to two further risk factors in the printing process.

Read more

Secure Printing (Part 1 of 3)

by Tobias Habermann

Tobias Habermann

The protection of data has taken on an increasingly important role for businesses. More resources than ever before are being given over to ensuring this security. When it comes to protecting your data, most IT security strategies will concentrate on data centers and internal networks, often neglecting to look at printer technologies. This raises the question of what good the best security strategies and encryption mechanisms are, if sensitive company documents are printed after decryption and accessible to “everyone”. In this three-part series on our blog, I’ll introduce you to common dangers with printing and show you general ways to prevent them from happening.

Read more

New White Paper: Security of digital Data

by Dr. Uwe Wächter

Dr. Uwe Wächter

The know-how of an enterprise is not only in the heads of the employees, but is also kept in numerous documents. These files are stored in file of application management directories or systems, like DMS, PLM or ECM. Here the authorization and access concepts are essential for the protection of the know-how. But what happens, if documents with important product information get into the wrong hands? How can isolated data be protected against unauthorized access.

Read more
  • Blog Categories

  • Next Events

    1. Siemens PLM Connection

      4. July 2017 - 5. July 2017
    2. SAP for Utilities

      10. September 2017 - 14. September 2017
    3. TechEd

      25. September 2017 - 29. September 2017
    4. DSAG Congress

      26. September 2017 - 28. September 2017
  • Testimonial

    Complete assemblies printed with just one click! Perfect!