contact us     help    login  

 search 


Multi-Clients

Studies In Progress

Completed Studies


Download TOC

Download Brochure

 


Secured Office Printing & Document Workflow: A Multi-Client Report


Publication Date: December 2009
Service: Market Research Department

Introduction

Legislation such as Sarbanes-Oxley, Gramm Leach Bliley, and HIPPA have greatly increased the potentially liability for security breaches, thus, putting security concerns at the forefront of IT department initiatives. A security breach can cost an organization anywhere from $167,0001 to $4.8 million2. Add this to the intangible costs of a loss in customer confidence, and the message is clear – securing every device that touches the network is critical, and this includes printers, copiers and scanners.

However, security of the imaging and printing environment has been given insufficient attention, and sometimes has even been ignored, by IT departments. Printers, copiers and scanners are considered appliances, posing none of the same risks as employee computers, network servers, and web facing applications. In fact, their likely connection to the Internet, their almost certain connection to the company’s servers, and the increasing presence of hard drives and programs opens up many dangerous avenues for security breaches. Recent news of hacker groups infiltrating networked printers has raised awareness of the vulnerabilities these devices present, but as is usually the case employees are an even greater source of breaches, more often through negligence than intent. Too many organizations do not take even the rudimentary step of adequate password protection. A recently indicted fraudster obtained millions of dollars in fraudulent financing in part by entering the offices of large financial institutions and sending faxes from their equipment, usually succeeding even with password-protected devices by entering “password”. These organizations were not merely embarrassed; they are being sued by the duped lenders. For all these reasons, a new focus is now being placed on securing ALL office equipment technology.

For providers of secure printing technologies, the heightened concern for data integrity and security represents new business opportunities. Secure printing solutions can be used as a competitive differentiator and a value-added option. For those looking to capitalize on this emerging opportunity a thorough understanding of the market drivers and customer behavior is necessary. InfoTrends is pleased to announce the release of a new multi-client study entitled “Secured Office Printing & Document Workflow: A Multi-Client Report,” which will examine the market opportunity and provide insight and advice to vendors and document solutions providers looking to tap into the secured printing opportunity.

Project Objectives

The overall goal of this new multi-client study is to help clients understand the status and prospect of secured printing, copying and scanning devices and related software for the office environment. The study will focus specifically on the hardware and software approaches, which are the keys to the effective control of printing, copying and scanning. With these considerations in mind, the study will:

  • Define ‘secure printing’
     - What separates secure from insecure printing?
     - What are the major categories of documents or data that need to be secured from unauthorized printing?
     - In which departments in companies do they typically reside (i.e. horizontal opportunities)?
     - Are there particular industries with greater or particular secure-printing requirements (i.e. vertical opportunities)?
  • Estimate and forecast the size of the U.S. secure printing market
     - Secured versus unsecured print/copy/scan devices
         o Segment by level of security
     - Secured versus unsecured print volumes

Analysis & Project Deliverables

InfoTrends will conduct extensive analysis of the desk research, in-depth interviews and structured surveys to develop a comprehensive understanding of the opportunities and issues for equipment vendors and service providers. Clients will receive a combination of report, presentation material, and research data for senior management, product managers and planners, and sales and marketing executives. The material will include:

  • A detailed (100+ pages) report of the survey’s findings and recommendations
    - Executive summary
    - Summary of all in-depth interviews with vendors and practitioners
    - Charts of web-based survey results with explanatory text
    - Market estimate and forecast for 2008-2013
    - Profiles of key vendors
  • Tabulations of results for all questions in the web-based survey
  • A set of PowerPoint slides for subscribers’ internal use
  • An optional on-site presentation

Getting Started

For more information on the study or to sign up as a participant, contact Scott Phinney at +1 ext. 123 or via e-mail at . Early subscriber discounts are available until July 31, 2009.

 

1 2006 CSI/FBI Computer Crime and Security Survey
2 "Ponemon Report Shows Sharp Rise in the Cost of Data Breaches,” Ponemon Institute, October 23, 2006

Home

About Us

Help

Contact Us

Privacy Policy

Terms of Use

© 2011 InfoTrends