First level navigation Menu
Ricoh close-up of woman typing on a keyboard

Device, Data and Document Security Solution for Government

Protect your data wherever it is


Reported incidents involving PII increased 140+% (2009 to 2013).*

Ricoh - Infovisual - courthouse security of important documents

Merge information mobility and information security with our Device, Data & Document Security Solution for Government. After assessment and workflow consulting, we implement and support a suite of security capabilities so you can protect data in motion, in use and at rest. 

Watch over data in motion

Boost your network security to prevent opportunistic or targeted threats. 

Ricoh - Woman at her office desk with two monitors. One is displaying a security lock

The news is full of security incidents involving personally identifiable information (PII). Whether the threats are internal or external, they put your data, files and passwords at risk — but securing data that's on the move can be daunting.

Our Device, Data & Document Security solution makes it much easier. We can help you protect data in motion with capabilities such as: 


  • 128-bit encryption.
  • Recipient rights.
  • Web Image Monitor software to block or restrict unauthorized IP access and DDoS attacks.
  • Secure Socket Layer (SSL) transmission to prevent data interceptions.
  • Two-Person Control/Two-Person Integrity, which does not allow a system to be operated by fewer than two separately authenticated individuals.

Help protect data in use

Keep the right information in the right hands. 

Data is vulnerable when workers are accessing and using information ― the bulk of their day-to-day tasks. This includes copying and pasting information from one application to another, sending files to printers, transferring data or documents to an external drive, and more.

Our data protection solution helps you reduce the risk of internal threats with capabilities such as: 

  • Controlling worker access through authentication.
  • Centralizing audit capabilities.
  • Managing digital rights by setting policies to block printing of sensitive information or to require watermarks.
  • Analyzing print streams for personally identifiable information and replacing it with "XXX".
Ricoh - Two professional males in office at a desk discussing information on a laptop

Help safeguard data at rest 

 Keep data out of sight but not out of mind. 

Ricoh Close-up of an individual working on a computer with a security lock.

The classified, confidential or sensitive information your workers use every day can be housed in content management systems and on printers, PCs and other devices. Regardless of the length of time the information is stored, you need to be sure that it's done so in a secure manner. Equally important is the ability to identify specific types of information and track where each type is stored.

Our government data protection solutions can provide:

  • Hard-drive and address-book encryption.
  • DataOverwriteSystem Security (DOSS) to overwrite or delete latent information on MFP hard drives.
  • Secure delete technology printers, which erase data remnants on the blade servers.

The Federal Government processes vast quantities of classified, personal, confidential or otherwise sensitive documents – from embassy floor plans to medical records, personnel reviews or mission critical details. Given the growth in BYOD and mobility plus the surge in security related requirements, organizations face significant challenges in safeguarding information whether it’s in motion, in use or at rest.

  • Experts in Electronic Discovery

    Find out how Commonwealth Legal, a division of Ricoh Canada, specializes in providing secure, cloud-based legal document management solutions.

    View the solution

    1 / 2
  • Case Study: Madera County

    Read how digital document conversion is projected to save Madera County, CA more than $200,000 in the first year.           

    Read the study

    2 / 2
*Source: Government Accounting Office (GAO) analysis of US-CERT data for fiscal years 2009-2013 in Federal Agencies Need to Enhance Responses to Data Breaches, April 2014