Xerox CopyCentre 275 Руководство для оценщиков - Страница 18

Просмотреть онлайн или скачать pdf Руководство для оценщиков для Принтер "все в одном Xerox CopyCentre 275. Xerox CopyCentre 275 27 страниц. Tab creation
Также для Xerox CopyCentre 275: Справочное руководство (27 страниц), Дополнительное руководство (20 страниц), Краткое руководство (21 страниц)

Xerox CopyCentre 275 Руководство для оценщиков
2.
Availability/Password protection
MEETS EXCEEDS
• Xerox equipment protects your investment with Device Access Password Protection.
Administrative device setup screens and remote network settings cannot be viewed or
altered without a PIN and an internal auditron to control usage and access to device features.
• Network Authentication restricts access to scan, email and fax features by validating
network user names and passwords prior to the use of these network features. It allows
identification of user with their scan – no anonymous sending. This is especially important
when you need to be compliant with government privacy regulations, such as HIPAA.
• Integrated support for LDAP allows this series of MFPs to communicate with Active
Directory enabling easy integration with your Global Address Book. Securing LDAP with
the Secure Sockets Layer (SSL) protocol encrypts transmitted data and keeps user
information confidential.
• IP Filtering - limits access by IP address or range and IP Restrictions on Web Pages.
Allows access to administrative web pages to be restricted to authorized IP addresses.
• Enable Secure Workflows (Secure Scan to file transmission using HTTPS (SSL), Secure Print
submission utilizing IPsec and Secure Device Administration via web pages utilizing IPsec.
• Administrators can gray out the "@" key, ensuring email destinations are limited to
internal contacts.
• Configurable Network Services – Blocks unwanted connections to secure networked
devices - allowing enablement/disablement of specific device and print protocols.
3.
Confidentiality
MEETS EXCEEDS
• Image Overwrite Security feature option electronically erases data that has been processed
to the hard disk in print, copy, scan, Internet Fax and Server Fax modes. This option
eliminates data as a part of routine job processing implementing a 3-Pass algorithm
specified in the US Dept of Defense Directive 5200.28-M. Administrators have three
options for running Image Overwrite – on demand, automatically after each job, or at
scheduled times.
• Vulnerability hardening of TCP/IP stack.
• Unlimited Secure Print (holds jobs at the device until their owner releases them with the
ability to release all jobs with only one PIN entry); with SA delete, Secure Print jobs can
be deleted by SA that are clogging the print queue.
• Secure Protocols include support for HTTPS and IPsec.
• Support for the 802.1x protocol makes MFPs accessing networks over wired and wireless
connections more secure.
• Secure Embedded Fax – controller architecture isolates the fax telephone line and the
network to foil any attack. Faxes can be automatically routed to a password-protected fax
mailbox or stored at the device until an authorized user releases them for printing.
• Hide print job names in the job queue preserves the confidentiality of your jobs, while
leaving the user ID and time stamp visible.
17
E VAL U AT O R G UID E