Product Data Sheet / Brochure
HP Color LaserJet Enterprise M652, M653 series 13
Appendix A:
Security
features
Resources
HP JetAdvantage Security Solutions:
• Web site: hp.com/go/printsecurity
• Solution brief:
http://h20195.www2.hp.com/V2/GetPDF.asp
x/4AA3-1295ENW.pdf
• Video:
http://hp.brightcovegallery.com/products/det
ail/video/4270905124001/
HP JetAdvantage Security Manager:
6
• Web site: hp.com/go/securitymanager
• Brochure:
http://h20195.www2.hp.com/V2/GetPDF.asp
x/4AA3-9275ENW.pdf
• Video:
http://hp.brightcovegallery.com/products/det
ail/video/4270837770001/
The world’s most secure printing
1
The HP Color LaserJet Enterprise M652/M653 series is designed to work together with security
solutions to help reduce risk, improve compliance, and protect your network from end to end.
Protect your device, data, and documents with built-in and optional security features.
2
Protect your device
As capabilities expand and devices become more integrated into your work, device security
becomes increasingly important. These features help protect the M652/M653 series:
• Embedded protection: Multi-level, built-in features help protect your printer against complex
security threats from boot up to shut down. For details, see hp.com/go/PrintersThatProtect.
– HP Sure Start helps the device BIOS to boot up properly every time with unaltered HP genuine
code and without corruption. If an anomaly is detected, the device can repair itself by
rebooting.
– Whitelisting helps the device firmware to load properly with HP genuine code—without
corruption—every time.
– Run-time intrusion detection guards against malware, by continually monitoring activity to
detect and stop attacks. If an anomaly is detected, the device automatically reboots.
• Encrypted storage with secure erase: The printer comes with built-in encryption to protect data.
When stored data is no longer needed, use built-in device capabilities to securely overwrite data
and safely remove sensitive information. HP offers multiple mechanisms to erase stored data,
including functionality that is designed to conform to U.S. National Institute of Science and
Technology (NIST) Special Publication 800-88.
• Ports and protocols: FTP and Telnet are closed by default to help prevent unsecure protocols
from being used. Unused physical ports (such as host USB ports or network ports) can be
disabled to prevent unauthorized use.
• Administrator access control for device: You can set administrator passwords so only IT staff or
other authorized personnel can set up and configure device settings.
• Common Criteria Certification: HP Enterprise devices are certified as compliant with
internationally recognized security standards, such as Common Criteria Certification (CCC) and
FIPS 140.
Protect your data
Your printer harbors sensitive information—make sure it’s not at risk.
• Network protection: 802.1x or IPsec encrypted network standards can help protect data
travelling over the network between the device and management tools such as HP Web
Jetadmin
5
or the Embedded Web Server.
• Encrypt data in transit:
– Protect print jobs traveling to the device with encryption such as Internet Print Protocol over
TLS (IPPS). Or, Secure Encrypted Print with HP Universal Print Driver
37
provides true symmetric
AES256 print job encryption and decryption from the client to the page based on a
user-defined password using FIPS 140 validated cryptographic libraries from Microsoft.
– Use CipherSuite Encryption Strength to select encryption strength to prevent the use of legacy
or insecure protocols for data in transit.
• Encrypt data at rest:
– The optional HP High-Performance Secure Hard Disk provides full 256-bit AES hardware
encryption to protect sensitive business information, such as print jobs or passwords.
– Add the optional HP Trusted Platform Module (TPM) accessory to strengthen protection of
encrypted credentials and data by automatically sealing device encryption keys to the TPM. It
provides secure device identity by generating and protecting certificate private keys.
4
• Firewall: Prevent malware and viruses from entering your network by limiting printer access to
computing devices in network.