Recently, we have had many calls and inquiries into copier security following the multiple stories that have been aired on the CBS nightly news. We want to reach out to all of our customers to let you know we hear your security concerns and we would like to share information on our security with you.
Xerox has been the industry leader on security for many years as many of you already know. Many of Xerox’s advanced security features now come standard on most of our current models including:
- Hard Drive Image Overwrite
- Encrypted Disk Drive on Hard Drive
- Analog Fax Line & Network Isolation
- Password Protected Access for Users & Administrator
- Network Authentication
- Secure Print
- IP Filtering
- We have uploaded videos on how to enable Image Overwrite for many of Xerox’s models on www.youtube.com/southernsolutions
- For detailed information on which security options are available for your Xerox equipment please read Xerox Product Security
- In the event you would like to keep your hard drive, when trading in a Xerox product, there is a program available to allow for that.
What is the Common Criteria Certification?
The Common Criteria Certification is a required assessment that ensures that all IT Systems and devices that the federal government and related agencies use are highly secure. During rigorous testing, accredited third-party laboratories objectively screen IT products for reliability, quality and trustworthiness.
Xerox: Embracing Security
Xerox is at the forefront of digital document technology and security. Xerox is committed to keeping your most critical asset- your confidential information- safe and secure. For example, one of the most critical security threats is the risk of intruders accessing your network through your multifunction system fax lines. Xerox is the only multifunction device manufacturer that has obtained third party assurance that fax and network lines separated.
Xerox: Solutions that maximize productivity and security.
Embedded Fax
Stops unauthorized access to the device through the fax subsystem because it is internally separated from network functions.
Image Overwrite
Electronically eliminates data processed to the hard disk during print, scan, or e-mail operations by overwriting the data repeatedly.
Secure Print and Device Access Password Protection
Print jobs are held until a Personal Identification Number (PIN) is entered at the device to prevent unauthorized access to documents. Likewise, Settings cannot be viewed or changed without a PIN.
Removable Disk Drive Accessory
The removable hard drive can be physically extracted and stored for the highest level of security.
Network Authentication
Restricts user access to scan functions, e-mail, and network fax features until network user names and passwords have been validated.
IP Address Restriction
Specific IP addresses can be designated to control communications with specific network clients.
Contact us today to learn more about how our security solutions and certifications can help your organization.