Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

Addressing Cloud-Based Printing Services and Security

By Arron Fu
cloud_3-11
April 23, 2014

Printing and the cloud are seemingly at opposite ends of an organization’s infrastructure spectrum. Printing remains one of the last bastions of an organization’s infrastructure that cannot be completely virtualized, since the whole point of printing is to take something virtual and make it physical. The cloud allows businesses to be more efficient, and printing should be one of those business processes, maybe even the most basic business process that could be simplified with the cloud.

The big benefit of cloud printing is that it drastically simplifies intra-organizational printing structures and flattens the complexities of coordinating hardware across a widely distributed system of computers. Of course, not all cloud printing is created equal, and – as with any new technology – the cloud brings with it a slew of new challenges. Among these are the differences between public and private cloud printing and the ease of implementation to achieve these benefits. Figuring out these differences is central to understanding how to successfully implement a cloud-printing solution for your organization.

Cloud printing is particularly useful for large organizations with complicated computer network infrastructures such as government agencies, financial corporations and healthcare organizations. Many of these institutions connect hundreds (if not thousands) of devices and printers, sometimes across multiple locations. As work becomes more mobile, an employee may need to print from multiple locations in different parts of a building or of a country. Struggling with installing different printer drivers each time an employee needs to print from a new printer is not just annoying, but also time-consuming and a drain on productivity.

Public cloud printing services can smooth out some of these snafus. They connect printers to the Web so that they can be accessed from anywhere and at anytime from Web-connected devices. Instead of installing unique drivers for every new printer, you could print from anywhere, as long as both the printer and the device are linked to the cloud printing service. Even more, with cloud printing services, you could print from virtually any device that can connect to the service – including tablets and mobile phones.

However, many times, organizations also have high levels of security concerns that preclude them from using a public cloud.  And, the problem with many third-party cloud printing services is that they use the “public” cloud. While these cloud printing options do simplify the printing process, all the print data must travel through the public cloud as it makes its journey from device to printer. Many organizations such as government agencies, financial corporations or healthcare organizations do not use public cloud services for the expressed reason that it is public. Though some public cloud services have a privacy policy and a guarantee in place, many organizations need greater control and oversight of the sensitive data they handle. Moreover, these organizations are also often large enough to merit their own clouds. As such, they prefer to create in-house private clouds so that they can leverage the advantages of cloud services while also maintaining their own security over sensitive data.

But implementing a private cloud printing solution has its own complications. Consider the infrastructure of government agencies as just one example. Every agency has its own structure for printing, each with active directories, and hundreds of thousands of users dispersed over wide geographic areas. Consolidating printing in this situation requires aligning all the printers, drivers, devices, and users within the system – something that can't be done easily or efficiently. Even more, this system is routinely bogged down with driver updates creating a giant logistical headache. Every device needs to be updated for every driver update for every printer when the updates crop up. For the devices that don't have printer drivers? Those will never be able to print at all.  As such, a great resolution to this organizational hazard is to deploy a universal printer driver solution that can seamlessly connect and manage all printers within complex enterprise environments.

Institutions on the scale of multiple government agencies, whether they're on the local, state or federal level, manage more printers than are easily handled in list form – though, truthfully, in comparison to public cloud printing, private clouds handle far fewer printers, which also makes them a better option for enterprises. Either way, the printers need a structure that ensures users can identify the right printer without extraneous hassle. The structure should require as little effort on the user's part as possible, so this particular iteration of cloud services must keep the location in mind. Printers should automatically connect to whatever network makes the most sense (like the library in a university or the particular building a printer is attached to) so that only a few printers out of all the printers in the cloud get exposed to each user based on localities.

Cloud printing seems like a solution to the headache that is consolidating the vast multiplicity of printers in large and sprawling institutions. However, this solution may create more problems than it solves in its implementation. Instituting cloud printing for many organizations is not as simple as ceding the reins to a public cloud service company. The particular security concerns of government agencies, financial corporations, healthcare providers and other security-sensitive institutions make public cloud solutions impossible. Private cloud solutions, on the other hand, are complex puzzles that are difficult to administer.  The right solution must be implemented to effectively address the complicated infrastructures of institutional printing while also ensuring that user access to printers is as easy and secure as possible. Without that, cloud printing would just replace one problem with another.

KEYWORDS: cloud computing services cloud security printing services

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

As the Vice President of Software Development, Arron Fu oversees the operation of UniPrint, and also presides over its software development function. He is instrumental in steering software developments, including the award-winning UniPrintTM Infinity printing solution, a universal printer driver specifically designed for optimizing printing functionality and simplifying administration in multi-user, server-based computing environments. Arron is an IT industry veteran. Prior to taking up his management role at UniPrint, he spent 15 years in the field of consulting, system installation/integration, and application design and development across business functions, processes and industries. Arron holds a degree in Computer and Electronic Engineering from the University of Manitoba as well as a number of industry standard qualifications.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cloud-idea

    Understanding and Addressing Reliability Challenges with Cloud-Based Security Systems

    See More
  • cloud-security-freepik1170x658v456.jpg

    Strengthening infrastructure services security with cloud technology

    See More
  • cyber_enews

    As Organizations Become Aware of Security Vulnerabilities in Cloud-Based Collaboration Applications, It’s Time to Act

    See More

Related Products

See More Products
  • Hospitality-Security.gif

    Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing