Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

Addressing Cloud-Based Printing Services and Security

By Arron Fu
April 23, 2014

Printing and the cloud are seemingly at opposite ends of an organization’s infrastructure spectrum. Printing remains one of the last bastions of an organization’s infrastructure that cannot be completely virtualized, since the whole point of printing is to take something virtual and make it physical. The cloud allows businesses to be more efficient, and printing should be one of those business processes, maybe even the most basic business process that could be simplified with the cloud.

The big benefit of cloud printing is that it drastically simplifies intra-organizational printing structures and flattens the complexities of coordinating hardware across a widely distributed system of computers. Of course, not all cloud printing is created equal, and – as with any new technology – the cloud brings with it a slew of new challenges. Among these are the differences between public and private cloud printing and the ease of implementation to achieve these benefits. Figuring out these differences is central to understanding how to successfully implement a cloud-printing solution for your organization.

Cloud printing is particularly useful for large organizations with complicated computer network infrastructures such as government agencies, financial corporations and healthcare organizations. Many of these institutions connect hundreds (if not thousands) of devices and printers, sometimes across multiple locations. As work becomes more mobile, an employee may need to print from multiple locations in different parts of a building or of a country. Struggling with installing different printer drivers each time an employee needs to print from a new printer is not just annoying, but also time-consuming and a drain on productivity.

Public cloud printing services can smooth out some of these snafus. They connect printers to the Web so that they can be accessed from anywhere and at anytime from Web-connected devices. Instead of installing unique drivers for every new printer, you could print from anywhere, as long as both the printer and the device are linked to the cloud printing service. Even more, with cloud printing services, you could print from virtually any device that can connect to the service – including tablets and mobile phones.

However, many times, organizations also have high levels of security concerns that preclude them from using a public cloud.  And, the problem with many third-party cloud printing services is that they use the “public” cloud. While these cloud printing options do simplify the printing process, all the print data must travel through the public cloud as it makes its journey from device to printer. Many organizations such as government agencies, financial corporations or healthcare organizations do not use public cloud services for the expressed reason that it is public. Though some public cloud services have a privacy policy and a guarantee in place, many organizations need greater control and oversight of the sensitive data they handle. Moreover, these organizations are also often large enough to merit their own clouds. As such, they prefer to create in-house private clouds so that they can leverage the advantages of cloud services while also maintaining their own security over sensitive data.

But implementing a private cloud printing solution has its own complications. Consider the infrastructure of government agencies as just one example. Every agency has its own structure for printing, each with active directories, and hundreds of thousands of users dispersed over wide geographic areas. Consolidating printing in this situation requires aligning all the printers, drivers, devices, and users within the system – something that can't be done easily or efficiently. Even more, this system is routinely bogged down with driver updates creating a giant logistical headache. Every device needs to be updated for every driver update for every printer when the updates crop up. For the devices that don't have printer drivers? Those will never be able to print at all.  As such, a great resolution to this organizational hazard is to deploy a universal printer driver solution that can seamlessly connect and manage all printers within complex enterprise environments.

Institutions on the scale of multiple government agencies, whether they're on the local, state or federal level, manage more printers than are easily handled in list form – though, truthfully, in comparison to public cloud printing, private clouds handle far fewer printers, which also makes them a better option for enterprises. Either way, the printers need a structure that ensures users can identify the right printer without extraneous hassle. The structure should require as little effort on the user's part as possible, so this particular iteration of cloud services must keep the location in mind. Printers should automatically connect to whatever network makes the most sense (like the library in a university or the particular building a printer is attached to) so that only a few printers out of all the printers in the cloud get exposed to each user based on localities.

Cloud printing seems like a solution to the headache that is consolidating the vast multiplicity of printers in large and sprawling institutions. However, this solution may create more problems than it solves in its implementation. Instituting cloud printing for many organizations is not as simple as ceding the reins to a public cloud service company. The particular security concerns of government agencies, financial corporations, healthcare providers and other security-sensitive institutions make public cloud solutions impossible. Private cloud solutions, on the other hand, are complex puzzles that are difficult to administer.  The right solution must be implemented to effectively address the complicated infrastructures of institutional printing while also ensuring that user access to printers is as easy and secure as possible. Without that, cloud printing would just replace one problem with another.

KEYWORDS: cloud computing services cloud security printing services

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

As the Vice President of Software Development, Arron Fu oversees the operation of UniPrint, and also presides over its software development function. He is instrumental in steering software developments, including the award-winning UniPrintTM Infinity printing solution, a universal printer driver specifically designed for optimizing printing functionality and simplifying administration in multi-user, server-based computing environments. Arron is an IT industry veteran. Prior to taking up his management role at UniPrint, he spent 15 years in the field of consulting, system installation/integration, and application design and development across business functions, processes and industries. Arron holds a degree in Computer and Electronic Engineering from the University of Manitoba as well as a number of industry standard qualifications.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Iran on map

Iran Conflict and Cybersecurity: What to Expect in the Next 30 Days

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Woman in suit

Can the Industry Do More for Women in Security?

Cyber tech background

Security’s Top Cybersecurity Leaders 2026

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • cloud-idea

    Understanding and Addressing Reliability Challenges with Cloud-Based Security Systems

    See More
  • cloud-security-freepik1170x658v456.jpg

    Strengthening infrastructure services security with cloud technology

    See More
  • cyber_enews

    As Organizations Become Aware of Security Vulnerabilities in Cloud-Based Collaboration Applications, It’s Time to Act

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing