Home Magazines BizTimes Milwaukee New software guards against security risks in laser printers

New software guards against security risks in laser printers

Print Command
Innovation: Proprietary security software solution
www.print-command.com

Security is a top priority for companies in today’s technology-driven work environment. Yet, nearly every day a news story emerges about the anonymous work of hackers, security breaches or the failure to protect vital consumer information by some of the biggest brands in business.

The U.S. Government Accountability Office reported 41,776 confirmed cyber-attacks in 2010. That’s a 660-percent increase since 2006, and the problem is only going to continue, according to David Westlake, president at Milwaukee-based Print Command.

“We saw there was a major need for security in this industry,” Westlake said. “And when we couldn’t find the product we were looking for, we decided to build it on our own.”

Cyber-attacks are one of the biggest fears companies today have, Westlake said.

“Yet, almost no one realizes one of the easiest access points to their company information is their laser printer network.”

In 2011, Sony, Epsilon, and Zappos had customer information stolen right from their systems. In February 2012, Marriott Hotels said one hacking incident cost the company more than $1 million.

Westlake and his team of developers from Milwaukee have created a proprietary software solution that comes with layers of redundant U.S. Department of Defense level security, he said.

Print Command remotely monitors corporate networks, secures printers and identifies potential cyber-attacks as well as other employee behavior-related security risks and threats. The company installs a hardware device either directly on the end user product, such as a printer, or in the server room of a business, Westlake said.

“We can implement the software to lay over existing security systems and monitor any end user device including computers, printers or mobile devices for outside attacks and security risk,” he said.

According to Westlake, hackers can get access to any piece of information on a server by entering the system through a laser printer.

“We’ve estimated that more than a half a billion print devices are susceptible to cyber-attacks and most people don’t even realize it,” he said. “Once a hacker breeches the printer’s perimeter, they have access to any and all information stored on the hard drive. This could end up costing companies millions, even billions of dollars.”

Print Command is a mobile cloud solution, Westlake said.

“There’s no system updates or internet downloads needed,” he said. “Whenever we deploy an update we’ll just deploy it on the cloud, our system is completely non-invasive.”

Because the system is cloud-based, Print Command technicians also can monitor client devices in real-time from mobile tablets and other devices, he said.

Westlake founded the company in the fall of 2010 and is currently installing Print Command in Beta form in a few organizations.

“This product is great for any company’s security needs,” Westlake said. “We’re particularly focused on the companies and organizations where there is a lot of personal information and processes. Because that’s where security is even more vital.”

Westlake mentioned medical clinics, hospital systems, law firms, government agencies and educational institutions as some of the vertical markets where Print Command products would be necessary.

One of the company’s largest Beta testers is a governmental agency for a Southern state, he said.

“No other company would even be allowed to work with that organization,” he said. “Our military-grade security system makes that possible.”

Westlake has limited the Beta testing to select companies and has been simultaneously preparing for the official launch of the product. Westlake also said he could hire employees in at least 20 positions when the timing is right.

“We’ve tested this product extensively. We know it works,” he said. “We have a check list of things we want to achieve and hope to have the full solution available in three to four weeks. From there it will just be a matter of timing and growing at a responsible rate.”

www.print-command.com" />

Print Command
Innovation: Proprietary security software solution
www.print-command.com



Security is a top priority for companies in today's technology-driven work environment. Yet, nearly every day a news story emerges about the anonymous work of hackers, security breaches or the failure to protect vital consumer information by some of the biggest brands in business.

The U.S. Government Accountability Office reported 41,776 confirmed cyber-attacks in 2010. That's a 660-percent increase since 2006, and the problem is only going to continue, according to David Westlake, president at Milwaukee-based Print Command.

"We saw there was a major need for security in this industry," Westlake said. "And when we couldn't find the product we were looking for, we decided to build it on our own."

Cyber-attacks are one of the biggest fears companies today have, Westlake said.

"Yet, almost no one realizes one of the easiest access points to their company information is their laser printer network."


In 2011, Sony, Epsilon, and Zappos had customer information stolen right from their systems. In February 2012, Marriott Hotels said one hacking incident cost the company more than $1 million.

Westlake and his team of developers from Milwaukee have created a proprietary software solution that comes with layers of redundant U.S. Department of Defense level security, he said.

Print Command remotely monitors corporate networks, secures printers and identifies potential cyber-attacks as well as other employee behavior-related security risks and threats. The company installs a hardware device either directly on the end user product, such as a printer, or in the server room of a business, Westlake said.

"We can implement the software to lay over existing security systems and monitor any end user device including computers, printers or mobile devices for outside attacks and security risk," he said.

According to Westlake, hackers can get access to any piece of information on a server by entering the system through a laser printer.

"We've estimated that more than a half a billion print devices are susceptible to cyber-attacks and most people don't even realize it," he said. "Once a hacker breeches the printer's perimeter, they have access to any and all information stored on the hard drive. This could end up costing companies millions, even billions of dollars."

Print Command is a mobile cloud solution, Westlake said.

"There's no system updates or internet downloads needed," he said. "Whenever we deploy an update we'll just deploy it on the cloud, our system is completely non-invasive."

Because the system is cloud-based, Print Command technicians also can monitor client devices in real-time from mobile tablets and other devices, he said.

Westlake founded the company in the fall of 2010 and is currently installing Print Command in Beta form in a few organizations.

"This product is great for any company's security needs," Westlake said. "We're particularly focused on the companies and organizations where there is a lot of personal information and processes. Because that's where security is even more vital."

Westlake mentioned medical clinics, hospital systems, law firms, government agencies and educational institutions as some of the vertical markets where Print Command products would be necessary.

One of the company's largest Beta testers is a governmental agency for a Southern state, he said.

"No other company would even be allowed to work with that organization," he said. "Our military-grade security system makes that possible."

Westlake has limited the Beta testing to select companies and has been simultaneously preparing for the official launch of the product. Westlake also said he could hire employees in at least 20 positions when the timing is right.

"We've tested this product extensively. We know it works," he said. "We have a check list of things we want to achieve and hope to have the full solution available in three to four weeks. From there it will just be a matter of timing and growing at a responsible rate."

Stay up-to-date with our free email newsletter

Keep up with the issues, companies and people that matter most to business in the Milwaukee metro area.

By subscribing you agree to our privacy policy.

No, thank you.
Exit mobile version