About Us

Canon Solutions America and Symphion formed Partnership to Provide Comprehensive Print Fleet Cyber Hardening

Canon Solutions America, Inc., a subsidiary of Canon U.S.A., Inc., announced the addition of Symphion’s Printer Fleet Cybersecurity as a ServiceTM to its wide set of security solutions, as part of a strategic collaboration with Symphion, Inc., a leading security configuration management software and services firm. This relationship represents a significant commitment to providing Canon Solutions America clients with a fully inclusive solution that covers entire print fleets—including all makes, models, and ages—beyond the company’s security feature-rich printers and device management software.

Business executives are recognising the risk that Internet of Things (IoT) devices, such as printers, pose to their cybersecurity, as well as the severe financial repercussions of inaction. Printers have significant onboard security features, including up to 300 configurable security settings, but these configurations are frequently not used on networks due to cost and technical constraints, leaving these vulnerable devices entirely unsecured is truly the biggest network security risk in recent years.

There wasn’t a real vendor-agnostic solution to address this problem until Symphion. The fact is that large print fleets have hundreds to thousands of devices, each with its own set of makes, models, types, and ages, and no common configuration management system. Printer Fleet Cybersecurity as a Service provides full print fleet cyber hardening solutions as a turnkey service, without involving any customer personnel or contractors to solve this gap and cyber harden all print equipment in big print fleets.

“We’re proud to add industry leader Canon Solutions America as a Symphion partner. With Symphion, they’re clearly taking a leadership position by addressing the global cybersecurity gap that customers face,” said Jim LaRoe, chief executive officer, Symphion, Inc.

“We are excited to build on the success of our Canon Solutions America 5 Pillars of Security offerings with the addition of Symphion’s Printer Fleet Cybersecurity as a Service solution to our portfolio. We continue to develop relationships like this to support our commitment to providing best-in-class cybersecurity services to help our customers keep their proprietary data safe. We look forward to collaborating with Symphion on emerging, innovative security solutions,” said Peter P. Kowalczuk, president, Canon Solutions America.

Security Orchestration, Automation and Response (SOAR) – Everything you need to know

Security Orchestration, Automation and Response is a system that collects data about security threats using integrated software solutions to analyze and respond to security threats using automated machine learning to provide assistance to human analysts.

The 3 Factors of SOAR are –

Security Orchestration – It is the process of incorporating various technological solutions, both security-related and non-security-related, in order for them to work together in a way that facilitates collaboration. These different tools gather information from multiple sources into a centralized system, which increases the accuracy and makes system more secure.

Automation – This concept empowers technical tools with the help of machine learning to perform security operations task without assistance of human beings. It saves the security analyst’s time by reducing the amount of time they spend on basic, routine tasks by automating them. Security analysts can utilize their time for more creative and challenging tasks. Automation is not an option for replacement of human analysts.

Response – Once a threat is identified, ‘Security Response’ offers security analysts a single centralized overview for tracking, planning, handling, and reporting measures taken. SOAR tools cover post-incident events including case management modules. These modules aid in the communication of lessons learned and the delivery of faster proactive response time to potential attacks.

SOAR vs. SIEM – SOAR and SIEM (Security Information and Event Management) are not the same, even though they gather data from different sources, spot anomalies, and generate alerts. SOAR systems give an additional option of automation to provide automated responses to attacks, while SIEM systems only have functionality of generating alerts to security analysts of a potential incident.

Benefits of SOAR for Organizations

1) Security Teams – Staffing shortages are a frequent occurrence in an Enterprise’s Security Operations Center. It’s a delicate balancing act to ensure an organization has the requisite personnel and it is making optimum use of human resource. SOAR solves this problem by enhancing the process, applying required degree of automation and orchestration by ensuring reliable, defensive response to threats so as to protect organization’s sensitive information. This includes automating repetitive tasks and provides structured incident handling responses. It also gives company the access to industry-leading machine learning algorithms, allowing them to react even faster to security incidents as they occur.

2) SOAR’s scalability and customization – There are default integrations available with every SOAR solution, but some companies’ security applications will not support them. As a result, the SOAR solution is made customizable enough to build integrations from both sides as per customer’s needs. An effective SOAR solution is flexible and customizable enough to work on top of various security tools.

3) Vendors – Normally, companies have a single vendor solution or software to manage the security operation center. Even if company uses more vendors there are complexities involved in it. But SOAR integrates a variety of security solutions into a centralized orchestration system that can be implemented in any cloud-based system. A SOAR solution is efficient enough to implement responses of various teams like SOC (Security Operations center) and CSIRT (Computer Security Incident Response Team). Soar gives a centralized overview and control across the enterprise. This integration reduces security operations procedures by using case management, incident lifecycle and extends life of existing resources, maximizing the return on investment.

4) Data Enrichment – Data collected from a software is useful, but it is limited. SOAR tools overcome this limitation by collaborating multiple software solutions. This is a huge advantage, since data collected about security is rich and makes security system of an enterprise firm updated and robust.

Security Orchestration, Automation and Response (SOAR) is introduced by one of the leading research firm is in initial phase of development in the market. With innovation and evolving market SOAR Solutions will be adapted by many organizations.