Xerox 5225 Evaluate Security Capabilities, Integrated Security, Document, Device, Hard Drive

Models: 5225

1 24
Download 24 pages 43.72 Kb
Page 16
Image 16
Evaluate Security Capabilities

Evaluate Security Capabilities

Do the devices under evaluation include the security features required to meet your business needs? Can device access be password protected? Can the device remove latent images from its hard drive? Are features in place to protect confidential documents? Does the vendor participate in testing and certification programs to guarantee data security?

How the WorkCentre 5225 / 5230 MFPs exceed the security requirement

Integrated Security

Security is a critical competency in today’s business environment. The technology you deploy within your organization must include the necessary capabilities to protect sensitive data. The WorkCentre 5225 / 5230 MFPs device deliver security features that safeguard confidential information at all points of document vulnerability:

Document

Password-protected PDF protects scanned files by establishing a PIN access code for viewers.

Secure fax requires entry of a PIN access code before the received fax is printed.

Secure print holds print jobs until released at the device by the job owner.

Device

Audit log tracks printing, scanning and network fax activities by user, time and date

Hide job and user name display hides job names when non–authenticated users view job queue.

Secure Access Unified ID SystemTM magnetic card–based access streamlines authenti- cation and walk-up access to device features.

Network Authentication restricts access to device features and management settings by validating user names and passwords, with SMB, LDAP, LDAP+SSL, and Kerberos integration.

Hard Drive

Encrypted disk drive applies 128-bit encryption to data stored on the device’s hard drive.

Image overwrite electronically “shreds” data stored on the device’s hard drive using an algorithm specified by U.S. Department of Defense Directive 5200.28-M.

Network

Digitally signed documents creates signatures using a variety of methods, including S/MIME, password encryption and device certificates.

Encrypted email encrypts email messages sent by the device to your email server.

Fax and network isolation controller architecture separates the network connection and the fax telephone line to avoid incoming fax-based network attacks.

16 WorkCentre 5225 / 5230 Evaluator Guide

Page 16
Image 16
Xerox 5225 manual Evaluate Security Capabilities, Integrated Security, Document, Device, Hard Drive, Network