A Comprehensive Approach to State-of-the-Art
Printer and Data Security
Your first and most obvious vulnerability is the user interface and maintaining control over who has physical access to your printer and its features. Xerox security measures start with intrusion prevention through User Authentication to ensure only authorized staff have access. Once in, Role-Based Access Control ensures each team member only sees the features you want them to see. Every action by each user is also logged, offering a full Audit Trail.
Then we tackle less obvious points of intrusion—what is sent to the printer and how. Xerox® ConnectKey® Technology will intercept attacks from corrupted files and malicious software. Our system software is Digitally Signed: any attempts to install infected, non-signed versions will result in the file being automatically rejected. Print files will also get deleted if any part is not recognized as legitimate.
In the unlikely event that your data and network defenses are bypassed, Xerox® ConnectKey® Technology will run a comprehensive Firmware Verification test, either at start-up or when activated by authorized users. This alerts you if any harmful changes to your printer have been detected. Our most advanced built-in solutions use McAfee® Whitelisting technology, which constantly monitors for and automatically prevents any malicious malware from running. Integration with Cisco® Identity Services Engine (ISE) auto-detects Xerox® devices on the network and classifies them as printers for security policy implementation and compliance. By interacting with the market-leading McAfee® DXL and Cisco® pxGrid platforms, Xerox® Multifunction Printers (MFPs) employ an orchestrated response that neutralizes threats at their source the moment they occur.
Document & Data Protection
At Xerox, we drill down deeper. Our comprehensive security solutions also protect your printed and scanned documents from unauthorized disclosure or modification. Xerox® ConnectKey Technology helps to block the deliberate or accidental transfer of key data to those not authorized to see it.
We protect print output using a PIN Code or Card Release system. We restrict scan information from reaching those who should not receive it, using digitally signed, encrypted and password-protected file formats. ConnectKey Technology enabled printers also let you lock down ‘to/cc/bcc’ email fields, limiting scan destinations to internal addresses.
Xerox also protects all your stored information using the highest levels of encryption. We delete any processed or stored data that is no longer required using National Institute of Standards and Technology (NIST) and U.S. Department of Defense approved data clearing and sanitization algorithms.
We work with compliance testing organizations and security industry leaders such as McAfee and Cisco to wrap their overarching standards and know-how around ours.
For third-party independent proof that we achieve top levels of compliance, certification bodies like Common Criteria (ISO / IEC 15408) and FIPS 140-2 measure our performance against international standards. They recognize us for our comprehensive approach to printer security.