Ricoh Pro C700EX Series Functies Handleiding - Pagina 8

Blader online of download pdf Functies Handleiding voor {categorie_naam} Ricoh Pro C700EX Series. Ricoh Pro C700EX Series 27 pagina's. Security features guide
Ook voor Ricoh Pro C700EX Series: Brochure & specificaties (6 pagina's)

Ricoh Aficio Common Security Features Guide
No matter how light or severe each customer regards company security requirements, their areas of
concern and your solutions with respect to installing office equipment on their network generally fall into
four categories.
Network protection. How can the company safeguard its overall information infrastructure? Can you
be sure the new device won't be used as a gateway for hackers? How can you help alleviate the
installation and monitoring burden on IT personnel?
Local device access and user authentication. How can you ensure only authorized people can
access the device? What measures are in place to protect system settings, passwords, and
documents stored in device memory?
Data and document encryption. As files and passwords travel over the network, what is to stop
them from being intercepted, especially in wireless environments?
Document protection. Once data is stored at the device, how is it kept secure, and once deleted, is
it gone forever? How can your customers be sure? What if the device is to be relocated elsewhere in
the company, or returned at end-of-lease?
To address these and other concerns, Ricoh equips its products with an array of standard and optional
features to limit device access, track usage, and protect confidential information stored in memory.
Some are very basic, like the Locked/Secure Print mode available on most drivers. Some are optional
based on device type (MFP versus printer via the control panel functionality inherent in each device);
others are enabled only on color versus monochrome devices. Web SmartDeviceMonitor allows some
security-related features like IP Address Filtering to be applied to all devices on the network simultane-
ously. There is even one feature that provides security through the absence of a capability. RAM-based
Security is a term that applies to systems that do not have a hard disk drive or have one as an option.
All data processing is executed by RAM, and when the power is turned off, all data is immediately
erased. Without a means to permanently store data, the security threat is eliminated. If you think that
this is a meaningless "feature by default," consider that a large customer recently purchased several
thousand low-volume Ricoh digital MFPs expressly because they did not have a hard disk.
On the following pages you will find reviews of the various Ricoh security-related features and software
utilities available for use with Aficio MFPs, printers, and faxes. A Ricoh Aficio Security Solution
Compatibility Chart is included at the end of the section for at-a-glance convenience. Use this
information to position your Ricoh solutions as devices that help protect vital intellectual property
against both internal and external threats, and maintain compliance with rigorous security requirements
and legislation.
5