Recently, we have had many calls and inquiries into copier security following the multiple stories that have been aired on the CBS nightly news. We want to reach out to all of our customers to let you know we hear your security concerns and we would like to share information on our security with you.
Xerox has been the industry leader on security for many years as many of you already know. Many of Xerox’s advanced security features now come standard on most of our current models including:

  • Hard Drive Image Overwrite
  • Encrypted Disk Drive on Hard Drive
  • Analog Fax Line & Network Isolation
  • Password Protected Access for Users & Administrator
  • Network Authentication
  • Secure Print
  • IP Filtering
The Image Over-Write security option electronically shreds information stored on the hard disk of devices as part of routine job processing. Electronic erasure can be performed automatically at job completion or on demand. The Xerox Image Over-Write security process implements a three-pass algorithm originally specified by the U.S. Department of Defense.

  • We have uploaded videos on how to enable Image Overwrite for many of Xerox’s models on www.youtube.com/southernsolutions
  • For detailed information on which security options are available for your Xerox equipment please read Xerox Product Security
  • In the event you would like to keep your hard drive, when trading in a Xerox product, there is a program available to allow for that.
Many of our Xerox products go through the lengthy and extensive Common Criteria testing. Xerox is the only vendor with Common Criteria Security Certification on the entire unit, including all components and functions! The Common Criteria Mutual Recognition Arrangement is comprised of 26 member nations that tests and certify information technology products to common security guidelines. Other vendors have certified only small parts of their products, leaving untested potential vulnerabilities.  

What is the Common Criteria Certification?

The Common Criteria Certification is a required assessment that ensures that all IT Systems and devices that the federal government and related agencies use are highly secure. During rigorous testing, accredited third-party laboratories objectively screen IT products for reliability, quality and trustworthiness.

Xerox: Embracing Security

Xerox is at the forefront of digital document technology and security. Xerox is committed to keeping your most critical asset- your confidential information- safe and secure. For example, one of the most critical security threats is the risk of intruders accessing your network through your multifunction system fax lines. Xerox is the only multifunction device manufacturer that has obtained third party assurance that fax and network lines separated.

Xerox: Solutions that maximize productivity and security.

Embedded Fax

Stops unauthorized access to the device through the fax subsystem because it is internally separated from network functions.

Image Overwrite

Electronically eliminates data processed to the hard disk during print, scan, or e-mail operations by overwriting the data repeatedly.

Secure Print and Device Access Password Protection

Print jobs are held until a Personal Identification Number (PIN) is entered at the device to prevent unauthorized access to documents. Likewise, Settings cannot be viewed or changed without a PIN.

Removable Disk Drive Accessory

The removable hard drive can be physically extracted and stored for the highest level of security.

Network Authentication

Restricts user access to scan functions, e-mail, and network fax features until network user names and passwords have been validated.

IP Address Restriction

Specific IP addresses can be designated to control communications with specific network clients.
Contact us today to learn more about how our security solutions and certifications can help your organization.