Epson America, a worldwide leader in inkjet printing solutions, today announced Keypoint Intelligence has presented the Epson WorkForce® Enterprise portfolio of MFP line head printers with a Buyers Lab (BLI) Security Validation seal for Device Penetration. Recognized for device security strength, the WF-C21000, WF-C20750, WF-C20600, and WF-M21000 firmware were subjected to a challenging test conducted by a third-party white-hat hacker and passed the rigorous evaluation.
“Our pen testing is designed to probe the device’s firmware and OS to determine if there are vulnerabilities a bad actor could exploit to access the MFP and wider network,” explained Jamie Bsales, director, Office Workflow and Security Analysis, Keypoint Intelligence. “The Epson WorkForce Enterprise series firmware joins a select group that has proven to us that, when properly configured, the devices present a low risk of attack.”
Keypoint Intelligence created the neutral, third-party security testing benchmark program that standardizes the requirements for output device and office IoT (Internet of Things) security. Its Device Penetration test consists of a combination of automated tools and manual exploitation attempts by certified security experts to probe for potential vulnerabilities in the device firmware/OS, ports, print protocols, embedded web page, connectivity avenues, and more.
Also Read : Top Five Strategies for Boosting Data Security and Privacy
“In today’s digital age, device security is top-of-mind for both end users who want to make sure their operations are as safe as possible and partners who own the responsibility of recommending and servicing solutions,” said Dan Misilewich, product manager, Business Imaging, Epson America. “The Security Validation Seal is an important milestone for the WorkForce Enterprise solutions, ensuring partners and customers that Epson not only prioritizes reliability, flexibility and productivity features but also security features that businesses can count on.”
For more such updates follow us on Google News ITsecuritywire News. Please subscribe to our Newsletter for more updates.