Who Thinks of HP for End-Point Security?

By Jeff Man on November, 7 2018

Get latest articles directly in your inbox, stay up to date

Back to main Blog
Jeff Man

Respected Information Security advocate, advisor, evangelist, international speaker, keynoter, former host of Security & Compliance Weekly, co-host on Paul's Security Weekly, Tribe of Hackers, TOH Red Team, TOH Security Leaders, TOH Blue Team, and currently serving in a Consulting/Advisory role for Online Business Systems. Nearly 40 years of experience working in all aspects of computer, network, and information security, including cryptography, risk management, vulnerability analysis, compliance assessment, forensic analysis and penetration testing. Certified NSA Cryptanalyst. Previously held security research, management and product development roles with the National Security Agency, the DoD and private-sector enterprises and was part of the first penetration testing "red team" at NSA. For the past twenty-five years has been a pen tester, security architect, consultant, QSA, and PCI SME, providing consulting and advisory services to many of the nation's best known companies. Credentials: NSA Cryptanalyst, Hacker, QSA

Honestly, that was my first thought when I started looking at the marketing material HP had put together for Black Hat 2018 this year.

HP has been promoting its efforts to provide security to its enterprise printers for the past couple of years and has done a great job at offering secure solution. They have even involved the security research community by introducing a first-of-its kind enterprise printer bug bounty program. 

But end-point security? HP makes printers. What do they know about protecting end-points like desktops or laptops?

Oh Yeah, I Forgot About That

Determined to keep an open mind about this, I joined several HP printer security advisors at a private luncheon during the BlackHat Conference. One of the HP advisors was introduced as a Senior Security Researcher at HP Labs. “HP has security researchers?” I thought, as I began to engage in some small talk with the gentleman. One of the first things I learned was that he had been working as a Security Researcher since the mid-90’s where he had focused mostly on hardware and motherboard security for HP PCs.

That piqued my interest as I got involved heavily in computer and “Internet Security” (that’s what we called it back in the 90s anyways). We talked about the early days of Internet Security and how although much the technology has changed; many of the same vulnerabilities and issues still persist.

As the conversation progressed it occurred to me, “Oh yeah, HP used to make personal computers” (they still do, in fact). While I had been caught up in all the discussion about enterprise printer security, I had forgotten the fact that HP has a lot of experience in end points, being a long-time manufacturer of all kinds of desktops and personal computers. I learned that the Security Research Division of HP Labs has been around since 1985 conducting research on HP systems to assure they are providing secure devices. Turns out that much of the security features and capabilities that HP has developed for its enterprise printers are based on technologies that were first developed for their PCs.

What I figured out from this conversation was that while HP has only been promoting Printer Security for the past couple years, HP has been heavily engaged in providing secure systems and devices for quite a while.

The efforts of the Security Research Lab (which has been operating in Bristol UK for over 30 years) have not only helped HP produce secure PCs but also has extended into its efforts to produce secure enterprise printers.

The dedication and commitment of the researchers at the HP Security Lab is consistent with HPs overall commitment to preserve its legacy and reputation as pioneers in the world of technology. By the end of the conversation I realized that it made complete sense for HP to discuss end-point security, considering they’ve been involved in end-point security for over four decades!

What Qualifies as an End-Point Device?

“End-point devices now include all printers – home, commercial, and 3D – as well as interactive displays and sensor-equipped devices that are part of the Internet of Things,” says Simon Shiu, head of HP’s Security Lab. “And more and more we’re seeing threats aimed directly at these network edge points where people are creating, consuming, and sharing information.”

HP has focused its efforts on securing these enterprise network printers on several key areas. First and foremost is the security of data that gets passed to the printer for, well, printing. The files sent are often stored in a queue in memory which much be protected not only from theft but also from being altered in any way.

This is largely accomplished by the security settings for the printers being preset at the factory so the devices start out secure when added to the enterprise network. The HP JetAdvantage Security Manager provides inspection of security settings to make sure they have not been altered and will restore any setting that is found to be incorrect which keeps the printers secure.


Printers are also network end-points that can be the targets of attack via insecure network services, web interfaces, or through malicious malware.

HP printers have a Connection Inspector that will detect and block any attempted connections from
a compromised system to a command and control center. Perhaps the coolest and most significant aspect of HP Printer Security is the introduction of a self-healing BIOS that has been adapted to protect the printers themselves. HP Sure Start will detect any changes to the printer BIOS and repairs the printer by forcing a reboot from a trusted, centralized BIOS – all done transparently to any users. Pretty intuitive.

The Next Episode

My takeaway from the luncheon that day at BlackHat was that HP has a long and impressive history of conducting security research and developing smart and innovative tools that may have started with desktops and laptops, but also extends into the realm of enterprise printers. HP’s commitment to providing secure printers for the enterprise is impressive.

To help spread the word about the threats to enterprise printers and how HP can help defend against all sorts of attacks, HP continues an extensive marketing campaign that revolves around a continuing series of dramatic short stories featuring a dubious character played by Christian Slater (Mr. Robot). The latest installment introduces a new and enigmatic character dubbed “The Fixer” played by the often-villainous character actor, Jonathan Banks (Beverly Hills Cop, Breaking Bad, Better Call Saul).

To see the latest installment of the HP series and to learn more about printer security check out: “The Wolf: True Alpha”. #reinventsecurity

 

Did you know that blog author Jeff Man is an original National Security Agency (NSA) Red Teamer and Department of Defense (DoD) cryptographer? If you have questions about this blog or a related topic:

Contact Jeff Man



 

 

 

Submit a Comment

Get latest articles directly in your inbox, stay up to date