Canon Group
Close Close
Menu Menu Close Close Search

UniFLOW Online for Zero Trust environments

Think of your Zero Trust journey as your game plan to combat cybersecurity. Regardless of where your organisation is at today within this journey, uniFLOW Online can be adapted to whatever works best for your network environment.

 

Organisations today are considering a security model that adapts more effectively to the complexities of the modern environment. This model embraces the hybrid workplace and protects people, devices, apps and data - wherever they’re located. The concept of Zero Trust networking is the assumption that no user, device or service can be trusted.

Understanding the Zero Trust concept
Zero Trust isn’t a product or any type of software. Zero Trust is a security principle for organisations to adhere to so that information security is guaranteed. Instead of assuming everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originates from an open network. Though there is no universal definition for Zero Trust, UniFLOW Online follows three key principles as defined by industry leaders such as Microsoft.
  • Verify Explicitly

    Always authenticate and authorise based on all available data points, including user identity, location, data classification and more.

  • Use Least Privileged Access

    Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection.

  • Assume Breach

    Minimise blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defences.

96% of security decision-makers state that Zero Trust is critical to their business’ success, with 76% already adopting Zero Trust security measures.

Microsoft – Zero Trust adoption report, how does your organisation compare?
Truly Zero Trust ready print environment
uniFLOW Online is hosted within the Microsoft Azure™ data centre in Melbourne, Australia. It’s able to leverage the benefits of the Microsoft Azure™ cloud computing service operated by Microsoft®, which ensures an incredibly robust, resilient and scalable platform. uniFLOW Online was developed in accordance with foundational Zero Trust principles.
  • Assign mulitple levels of access

    Multiple levels of privileged access are available so different users can only access the parts of uniFLOW Online applicable to their role e.g. maintenance staff have no insight into user data, neither do budget managers have access to the rest of the system.

  • Authenticate all users

    All users connect to uniFLOW Online using their existing login credentials such as Azure AD, Google Workspace™ or OKTA. This includes full support for multi-factor authentication and other policies defined by the IT department.

  • Secure communications

    All communications and the print path can be made via the internet. No lateral connections between PCs and printers are required on the internal network. All communication and print traffic is encrypted.

How it works

In the traditional office, PCs and printers are typically all on the same network or split into different virtual networks (VLANs) with a print server bridging the gap. However, in a Zero Trust model, as part of the 'assume breach' principle, the 'blast radius' of a potential breach is reduced by isolating each network endpoint as much as possible from all other network points. This can also mean that internet access is only available from the internal network, i.e. no other communication routes are allowed. Should one PC become infected or compromised, it cannot spread because it cannot 'talk' to anyone else.

With a full Zero Trust micro-segmented network, companies are not only securing their business-critical data, but they’re also able to remove their local on-premise infrastructure to free capital tied up in server hardware, maintenance and IT services.

Zero-Trust Network Micro Segmentation.

Printing in Zero Trust environments

Product features
  • 100% Serverless

    Remove all local print servers, without compromising performance or security. No need for local infrastructure, such as clients, Edge mesh, Edge nodes, servers, boxes, VPNs, or hubs.

  • Secure print queues

    Secure printing, using personal secure print queues and restrict device access to authorised personnel only, is fully compliant with Zero Trust.

After being successful in 2019, 2020, 2021, and 2022 uniFLOW Online impressed again in this year's Buyers Lab (BLI) Pick Awards from Keypoint Intelligence, winning a 2023 Pick Award as an Outstanding Cloud Output Management Platform – for the fifth year in a row. Keypoint Intelligence recognises a wide range of potent scanning functions in addition to the sophisticated secure and mobile/email printing functionalities. These enable users to scan documents straight to a number of cloud destinations, such as Box, Dropbox, Google Drive, Microsoft Exchange Online, Microsoft OneDrive for Business, Microsoft Teams, and Microsoft SharePoint Online, as well as their email or desktop computer. Automatic background image processing options, such as picture cleanup, compression, conversion, and automatic cropping of receipts, are advantageous to users. Additionally, users can quickly fill in document file names and information by scanning batches of repetitious documents with the special text-block OCR option.

2023 BLI pick award outstanding Cloud Output Management platform
Frequently Asked Questions
  • What is Zero Trust?

    Zero Trust is a security framework requiring all users, whether in or outside the organisation's network, to be authenticated, authorised, and continuously validated for security configuration and posture before being granted or keeping access to applications and data.

    To ensure that any potential vulnerabilities do not affect the network, it is necessary to verify and authorise every connection and segregate devices and data.

  • Why is Zero Trust important?

    As the world increasingly shifts towards remote and hybrid workforces, it's crucial for companies to adapt their security measures to effectively protect themselves. With the constant threat of hackers and the growing value of data, relying solely on outdated systems such as VPNs, on premise servers, and single authentication points can prove to be expensive, inefficient, and ultimately leave your organisation vulnerable to a wide range of potential threats.

  • What types of business should implement Zero Trust principles?

    As work environments continue to evolve and companies face ongoing threats to their users and data, there is a growing need for every organisation to adopt a Zero Trust approach to security. According to a study by Okta, 78% of companies worldwide have recognised the increased importance of Zero Trust in their security strategies. This comes as no surprise, given the ever-increasing diversity of workforces and the constant need for robust protection against a range of security threats.

  • Can Zero Trust be applied to print environments?

    Absolutely! Zero Trust Printing is an extension of the Zero Trust Network Architecture philosophy, which enables you to maintain data security even during typically vulnerable actions. uniFLOW Online can work seamlessly in this customer environment; all secure print jobs are stored in the cloud. The Canon devices then pull the jobs down directly once a user has identified and selected which jobs they want to release.