Xerox 55 Protect your investment, Maintain confidentiality, is real, Safe, threats, Maximize

Models: 40 Color C35 35 C40 Color M45 M35 32 Color C45 55 C32 Color M55 C55

1 2
Download 2 pages 33.31 Kb
Page 2
Image 2
threat

The

threat

Xerox provides the keys to greater security.

Security Overview

is real.

If your critical information falls into the wrong hands, it can create serious financial

and legal burdens.

Protect your investment.

With Device Access Password Protection, you hold the key to safeguarding your investment. Administrative device set-up screens and remote network settings cannot be viewed or altered without a Personal Identification Number (PIN).

Configurable Network Services let you secure your networked devices by allowing enablement/disablement of specific device and print protocols.

Provide access, secure data, control and track usage.

Network Authentication restricts access to scan, e-mail and fax features by validating network user names and passwords prior to use of these features.

Regulatory compliance and privacy protection is available on a WorkCentre Pro using Omtool’s GenidocsTM, a Xerox Premier Business Partner solution. A press of a button encrypts outbound documents,

Secure Embedded Fax prevents unauthorized control of the device via the

Minimize

.

 

threats

Maximize

 

.

ty

securi

 

The

digital connection.

In today’s networked office, digital devices can print, copy, scan to network destinations, send an e-mail attachment, or send faxes. And if everyone has access to your digital device, that means just about anyone can pick up documents left in the output tray, or distribute hard-copy documents over the network.

That’s why Xerox provides security solutions that allow you to restrict access, track usage, and protect confidential data that flows through CopyCentredigital copiers, WorkCentre® copier-printers and WorkCentre® Pro advanced multifunction systems.

Keep your enterprise information safe with a powerful suite of Xerox digital security solutions designed to limit risk and vulnerability.

CopyCentre, WorkCentre and WorkCentre Pro products help ensure the confidentiality of mission-critical information.

Our advanced architectural design isolates print, copy, scan and fax operations so your data stays tightly controlled.

Xerox products adhere to industry standards so you can implement security via well-established methodologies.

Robust security features can be customized to meet your specific needs.

Integrating WorkCentre Pro’s capa- bilities with solutions from Xerox Business Partners lets you extend your protective shield even further.

Maintain confidentiality.

How do you prevent unauthorized viewing of important documents you have sent to the printer? How can you make sure they won’t walk away? Xerox Secure Print holds jobs at the device until the owner enters a PIN to release them. They aren’t printed until you’re on the scene.

The Image Overwrite Security option electronically erases data processed to the hard disk in print, copy, scan, Internet fax and server fax modes. This eliminates data stored as part of routine job processing. Depending on customer environments, electronic erasing can be performed imme- diately after every job or on demand at your convenience. (The Xerox Image Overwrite Security process implements a 3-pass algorithm specified in the U.S. Department of Defense Directive 5200.28-M.)

The Removable Disk Drive Accessory lets you remove and store hard drives, virtually eliminating the risk of unauthorized access to classified data.

which are automatically decrypted upon receipt, enabling compliance with govern- ment privacy regulations such as HIPAA.

The Internal Auditron prevents unauthorized users from using walk-up copy features. You can limit the number of copies available for each user, track usage at an account or department level, and download data to a PC to generate audit reports.

The optional Foreign Interface Device enables external access and accounting via magnetic card readers, coin devices and third-party accounting solutions.

In addition, with optional WorkCentre Pro Network Accounting enablement, you control access and track usage on a centralized basis. You get up-to-the-minute data on how WorkCentre Pro is being used by account and/or user number, the type of service (print, copy, scan, fax) and even the time and date of completion. This solution requires integration with a Xerox Business Partner accounting solution, such as those provided by Equitrac and Control Systems.

fax subsystem (internally separated from network functions). Faxes can be automati- cally routed to a password-protected fax mailbox or stored at the device until an authorized user releases them for printing. Other robust security features such as auto/manual answer mode, dial directory set-up, and fax reports can be customized to meet your individual needs.

Secure support is part of your Xerox service agreement.

We’ve developed a range of service support solutions to help make sure your data

will not be compromised. The portable workstation used to service your machine is never connected to your data. We also provide diagnostic maintenance software for customer PCs that must remain on site. And Xerox technicians with government security clearances are on call in select areas.

Safe.

Secure. Protected.

www.xerox.com/security

Page 2
Image 2
Xerox 55 Protect your investment, Maintain confidentiality, threat, is real, Safe, Secure. Protected, digital connection