Ricoh close-up of woman typing on a keyboard

Device, Data and Document Security Solution for Federal

Protect your data — wherever it is

140+%: Number of incidents reported involving personally identifiable information from 2009 to 2013.*

Merge information mobility and information security with our Device, Data and Document Security Solution for Federal Government. After assessment and workflow consulting, we implement and support a suite of security capabilities so you can protect data in motion, in use and at rest.

Watch over data in motion

Boost your network security to prevent opportunistic or targeted threats.

The news is full of security incidents involving personally identifiable information (PII). Whether the threats are internal or external, they put your data, files and passwords at risk — but securing data that's on the move can be daunting.

Our Device, Data and Document Security solution makes it much easier. We can help you protect data in motion with integrated software and hardware capabilities such as:

  • 128-bit encryption

  • Recipient rights for viewing, editing, deleting, etc., that document creators can assign to help safeguard information that's being shared

  • Web Image Monitor software to block or restrict unauthorized IP access and DDoS attacks

  • Secure Socket Layer (SSL) transmission to prevent data interceptions

  • Two-Person Control/Two-Person Integrity, which does not allow a system to be operated by fewer than two separately authenticated individuals

Help protect data in use

Keep the right information in the right hands.

Data is vulnerable when workers are accessing and using information ― the bulk of their day-to-day tasks. This includes copying and pasting information from one application to another, sending files to printers, transferring data or documents to an external drive and more.

Our data protection solution helps you reduce the risk of internal threats with capabilities such as:

  • Controlling worker access through authentication provided by Common Access Card/Personal Identity Verification

  • Centralizing audit capabilities with Web Image Monitor software

  • Managing digital rights by setting policies to block printing of sensitive information or to require watermarks

  • Analyzing print streams for personally identifiable information and replacing it with generic letters like "XXX"

Help safeguard data at rest

Keep data out of sight but not out of mind.

The classified, confidential or sensitive information your workers use every day can be housed in content management systems and on printers, PCs and other devices. Regardless of the length of time the information is stored, you need to be sure that it's done so in a secure manner.

Our government data protection solutions can provide:

  • Hard-drive and address-book encryption

  • DataOverwriteSystem Security (DOSS) to overwrite or delete latent information on MFP hard drives

  • Secure delete technology printers, like the InfoPrint 4100 and InfoPrint 5000 families, which erase data remnants on the blade servers

  • Integration with content management systems to help you identify specific types of information and track where each type is stored

Case study

See how we helped a large government agency roll out a department-wide print migration initiative.

Learn more

eDiscovery

Identify critical information efficiently with our latest technology, paired with experienced staff and proven processes.

See how
  1. *Government Accounting Office (GAO) analysis of US-CERT data for fiscal years 2009-2013 in Federal Agencies Need to Enhance Responses to Data Breaches, April 2014