Xerox and Information Security Keeping your data safe and secure so you can focus on what matters most: your business. - PowerPoint PPT Presentation


Title: Xerox and Information Security Keeping your data safe and secure so you can focus on what matters most: your business.


1
Xerox and Information SecurityKeeping your data
safe and secure so you can focus on what matters
most your business.
2
Overview
  • Is security on your mind?
  • Are you worried about your data on devices?
  • Are you worried about the security of your data
    transferred over the network?
  • Are you worried about MFPs being the weak link
    on your network?
  • At Xerox, we help protect your data at every
    potential point of vulnerability so you dont
    have to.
  • We know that by staying focused on what we do
    best, you can stay focused on what you do best.

3
Xerox Security Goals
  • Weve identified five key goals in our quest to
    provide secure solutions to every one of our
    customers

Confidentiality Integrity Availability Accountability Non-Repudiation
No unauthorized disclosure of data during processing, transmission or storage No unauthorized alteration of data System performs as intended, free from unauthorized manipulation System works properly No denial of service for authorized users Protection against unauthorized use of the system Actions of an entity can be traced directly to that entity Mutual assurance that the authenticity and integrity of network communications are maintained
4
Security Vulnerabilities Industry Risks and Costs
  • Businesses of all sizes have sensitive
    information that is valuable to cybercriminals
    and that must be protected. However, the threat
    landscape is changing constantly. Cybercriminals
    continue to focus their attention on small- and
    mid-sized businesses (SMBs), because they are
    easier targets than large, multinational
    corporations.
  • The average total cost of a data breach for the
    participating companies increased 23 over two
    years to 3.79 million.
  • The average cost paid for each lost or stolen
    record containing sensitive and confidential
    information increased from 145 in 2014 to 154
    in 2015.

2015 Cost of Data Breach Study Global
Analysis, IBM and Ponemon Institute, May 2015.
5
Security Vulnerabilities Industry Risks and Costs
  • Whos at risk?

6
Security Vulnerabilities Industry Risks and Costs
  • Healthcare
  • The need to share important medical data and
    patient information electronically makes security
    a major concern.
  • Health Insurance Portability and Accountability
    Act of 1996 (HIPAA)
  • Health Information Technology for Economic and
    Clinical Health (HITECH) Act
  • Government
  • Strict regulations are in place to ensure the
    information being shared is safe and secure.
  • Financial Services
  • Direct deposit, online banking, debit cards and
    other advances in information technology are
    revolutionizing the financial services industry.
    Though more convenient for both customers and
    businesses, this heavy use of technology has its
    own set of security concerns.
  • Education
  • Transcript requests, financial aid applications
    and even class notes can all be found online.
    Because some schools have their own medical
    centers, they also have to store and share
    medical information electronically. This
    interactive environment enhances the student
    experience and improves staff productivity, but
    it also makes schools susceptible to security
    threats.

7
The Xerox Security Model
  • Strategy
  • State-of-the-Art Security Features
  • Xerox offers the broadest range of security
    functionality on the market, including
  • Encryption
  • Authentication
  • Authorization Per User
  • Auditing
  • Certification
  • ISO 15408 Common Criteria for Information
    Technology Security Evaluation

8
The Xerox Security Model (continued)
  • Maintenance
  • Ensuring that software updates are issued on an
    ongoing basis
  • Notification of new security bulletins with RSS
    feeds
  • Responding to identified vulnerabilities
  • Providing secure installation and operation
    guidelines
  • Providing Common Criteria information
  • Making patches available at www.xerox.com/security

9
Unrivaled Security for Total Peace of Mind
Devices Visible to IT
Data on the Network Secure data transmission with
IPsec, HTTPS,SNMPv3, sFTP and encrypted email.
Policy Management with Cisco Complete visibility
into network and policy management includes user
identification, provisioning and audit logs.
Device Access Prevent general access to
restricted devices with user access and internal
firewall on printer.
Data Protection Keep personal and confidential
information safe with encrypted hard disk (AES
256-bit, FIPS 140-2 validated) and image
overwrite.
Auditing and Tracking Track access and attempted
access to the device, including comprehensive
audit logs and confirmation reports.
Malware Protection Protect your data and device
from malicious intrusions with McAfee
whitelisting technology.
Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
10
Keeping the Device and Data Protected
  • Device Access
  • Network Authentication
  • Microsoft Active Directory Services
  • LDAP Authentication
  • SMTP Authentication
  • POP3 Authentication Before SMTP
  • Role Based Access Control (RBAC)
  • Print User Permissions

Role Based Assess Control (RBAC)
Print User Permissions
Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
11
Keeping the Device and Data Protected (continued)
  • Smart Card Authentication
  • Xerox PrintSafe Software
  • Device User Interface and Remote User Interface
    Access

Smart Card Authentication
Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
12
Keeping the Device and Data Protected (continued)
Xerox PrintSafe Software
Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
13
Keeping the Device and Data Protected (continued)
  • Document Protection
  • Scan Data Encryption
  • Print Stream Encryption
  • Secure Print
  • Encrypted PDF/Password-Protected PDF
  • Fax Forwarding to Email and Network
  • Fax Destination Confirmation
  • Digital Signatures
  • Secure Watermarks
  • User/Time/Date Stamp

Secure Print
Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
14
Keeping the Device and Data Protected (continued)
  • Data Security
  • Image Data Encryption
  • Image Overwrite
  • Volatile and Non-Volatile Memory
  • Secure Fax
  • S/MIME for Scan to Email
  • Scan to Email Encryption
  • Job Log Conceal
  • Hard Drive Retention Offering
  • PostScript Passwords

Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
15
Keeping the Device and Data Protected (continued)
  • Audit Tracking
  • Audit Log

The Audit Log interface is accessed from a System
Administrators workstation using any standard
Web browser.
The log can then be exported into a .txt file,
and then opened in Microsoft Excel.
Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
16
Keeping the Device and Data Protected (continued)
  • Malware Protection
  • Embedded McAfee Embedded Control powered by
    Intel Security
  • McAfee ePolicy Orchestrator (ePO)
  • McAfee Integrity Control

Alerts
  • Email
  • Xerox Management Tools
  • McAfee ePO
  • Normal usage
  • Known users
  • Approved software

Known files and software
Whitelisting technology allows only approved
software to run
  • Attacks
  • Unknown users
  • Malicious acts
  • Polymorphic zero-day attacks

Unknown files and software
Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
17
Keeping Data on the Network Protected
  • Network Security
  • IP Address Filtering
  • Secure Sockets Layer/Transport Layer Security
    (TLS)
  • IPsec Encryption
  • Network Ports Enable/Disable
  • Digital Certificates
  • SNMPv3
  • SNMP Community Name Strings
  • 802.1X Authentication
  • Firewall
  • Fax and Network Separation

IP Address Filtering
Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
18
Keeping Data on the Network Protected (continued)
802.1X Authentication
How It Works 802.1X authentication for wireless
LANs provides centralized, server-based
authentication of end users.
1 A client sends a start message to an access point, which requests the identity of the client. 2 The client replies with a response packet containing an identity, and the access point forwards the packet to an authentication server. 3 The authentication server sends an accept packet to the access point. 4 The access point places the client port in authorized state, and traffic is allowed to proceed.
Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
19
Keeping Data on the Network Protected (continued)
  • Policy Management
  • Policy Management with Cisco TrustSec
  • Protects your printing assets by enforcing
    security policies centrally at the network level
  • Ensures only authorized role-based access to the
    printers
  • Detection of unauthorized printers on
    networkonly allows approved MFPs and printers to
    be deployed
  • Anti-spoofing capabilities by profiling devices

Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
20
Risk Assessment and Mitigation
  • Proactive Security for Emergent Threats
  • Keep a close eye on the latest risks
  • Issue security bulletins
  • Distribute RSS feeds
  • Provide you with a wealth of information
  • Xerox Security Bulletins and Patch Deployment
  • Visit www.xerox.com/security for timely
    information updates and important resources.

Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
21
Regulatory and Policy Compliance
  • Payment Card Industry (PCI) Data Security
    Standards Version 3.0
  • Sarbanes-Oxley
  • Basel II Framework
  • The Health Insurance Portability and
    Accountability Act (HIPAA)
  • E-Privacy Directive (2002/58/EC)
  • Gramm-Leach-Bliley Act
  • Family Educational Rights and Privacy Act
  • The Health Information Technology for Economic
    and Clinical Health Act
  • Dodd-Frank Wall Street Reform and Consumer
    Protection Act
  • ISO-15408 Common Criteria for Information
    Technology Security Evaluation
  • ISO-27001 Information Security Management System
    Standards
  • Control Objectives for Information and Related
    Technology
  • Statement on Auditing Standards No. 70
  • NIST 800-53, adopted by Federal Government and
    DOD in 2014

22
Common Criteria Evaluation
  • Independent, objective validation of the
    reliability, quality and trustworthiness of IT
    products
  • Achieving Common Criteria Certification
  • Rigorous process
  • Product testing by a third-party laboratory that
    has been accredited by the National Voluntary
    Laboratory Accreditation Program (NVLAP)
  • Visit www.xerox.com/information-security/common-cr
    iteria-certified/ to see which Xerox MFPs have
    achieved Common Criteria Certification.

23
Manufacturing and Supplier Security Practices
  • Electronic Industry Citizenship Coalition (EICC)
    Code of Conduct
  • Demonstrates stringent oversight of their
    manufacturing processes.
  • On-Site Audits
  • Ensures integrity of the process all the way down
    to the component level.

24
Manufacturing and Supplier Security Practices
  • U.S. Customs Agency Trade Partnership Against
    Terrorism
  • Within North America, all trailers moving between
    the factory, product distribution centers and
    Carrier Logistics Centers are sealed at the point
    of origin.
  • All trucks have GPS locators installed and are
    continuously monitored.

U.S. Customs Trade Partnership Against Terrorism
25
Hard Drive Retention Offering for Xerox Products
  • Xerox provides a Hard Drive Retention Offering to
    allow customers in the United States, for a fee,
    to retain the hard drive on leased Xerox
    products. This service may be required for
    customers with very sensitive data, perhaps
    classified, or with internal policies or
    regulatory standards that mandate specific
    disposition processes for hard drives.

26
Hard Drive Retention Offering for Xerox Products
(continued)
  • Upon request for this service offering, a Xerox
    service technician will travel to the customer
    location, remove the hard drive and provide it
    as is to a customer representative. At this
    time, Xerox does not provide hard drive
    sanitization, cleansing or destruction services
    onsite at customer locations. Customers will need
    to make arrangements for final disposition of the
    physical hard drive received from the technician.
  • To determine if your Xerox product contains a
    hard drive or review security features available
    to secure data on hard drives, please visit
    www.xerox.com/harddrive.

27
Summary
  • Xerox MFPs lead the industry.
  • Xerox continues to engineer and design all of its
    products to ensure the highest possible level of
    security at all potential points of
    vulnerability.
  • For more information about the many security
    advantages offered by Xerox, visit our security
    website, www.xerox.com/security.
  • At Xerox, we work hard at keeping your data safe
    and secure so you can focus on what matters
    most your business.

28
Security Checklist
  • IP/MAC Address Filtering
  • IPsec Encryption
  • IPv6
  • 802.1X Authentication
  • Secure Print
  • Scan to Email Encryption
  • Encrypted PDF/Password-Protected PDF
  • Digital Signatures
  • 256-bit AES Hard Disk Encryption
  • Image Overwrite
  • Secure Fax
  • Port Blocking
  • Scan to Mailbox Password Protection
  • Hard Drive Retention Offering
  • Print Restrictions
  • Audit Log
  • Role Based Access Control
  • Smart Card Authentication
  • Common Access Card/Personal Identity Verification

Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
29
(No Transcript)
View by Category
About This Presentation
Title:

Xerox and Information Security Keeping your data safe and secure so you can focus on what matters most: your business.

Description:

Title: Slide 1 Author: Xerox Corporation Last modified by: Xerox Corporation Created Date: 3/21/2011 3:52:28 PM Document presentation format: On-screen Show (4:3) – PowerPoint PPT presentation

Number of Views:98
Avg rating:3.0/5.0
Slides: 30
Provided by: Xero66
Learn more at: http://www.office.xerox.com
Category:

less

Write a Comment
User Comments (0)
Transcript and Presenter's Notes

Title: Xerox and Information Security Keeping your data safe and secure so you can focus on what matters most: your business.


1
Xerox and Information SecurityKeeping your data
safe and secure so you can focus on what matters
most your business.
2
Overview
  • Is security on your mind?
  • Are you worried about your data on devices?
  • Are you worried about the security of your data
    transferred over the network?
  • Are you worried about MFPs being the weak link
    on your network?
  • At Xerox, we help protect your data at every
    potential point of vulnerability so you dont
    have to.
  • We know that by staying focused on what we do
    best, you can stay focused on what you do best.

3
Xerox Security Goals
  • Weve identified five key goals in our quest to
    provide secure solutions to every one of our
    customers

Confidentiality Integrity Availability Accountability Non-Repudiation
No unauthorized disclosure of data during processing, transmission or storage No unauthorized alteration of data System performs as intended, free from unauthorized manipulation System works properly No denial of service for authorized users Protection against unauthorized use of the system Actions of an entity can be traced directly to that entity Mutual assurance that the authenticity and integrity of network communications are maintained
4
Security Vulnerabilities Industry Risks and Costs
  • Businesses of all sizes have sensitive
    information that is valuable to cybercriminals
    and that must be protected. However, the threat
    landscape is changing constantly. Cybercriminals
    continue to focus their attention on small- and
    mid-sized businesses (SMBs), because they are
    easier targets than large, multinational
    corporations.
  • The average total cost of a data breach for the
    participating companies increased 23 over two
    years to 3.79 million.
  • The average cost paid for each lost or stolen
    record containing sensitive and confidential
    information increased from 145 in 2014 to 154
    in 2015.

2015 Cost of Data Breach Study Global
Analysis, IBM and Ponemon Institute, May 2015.
5
Security Vulnerabilities Industry Risks and Costs
  • Whos at risk?

6
Security Vulnerabilities Industry Risks and Costs
  • Healthcare
  • The need to share important medical data and
    patient information electronically makes security
    a major concern.
  • Health Insurance Portability and Accountability
    Act of 1996 (HIPAA)
  • Health Information Technology for Economic and
    Clinical Health (HITECH) Act
  • Government
  • Strict regulations are in place to ensure the
    information being shared is safe and secure.
  • Financial Services
  • Direct deposit, online banking, debit cards and
    other advances in information technology are
    revolutionizing the financial services industry.
    Though more convenient for both customers and
    businesses, this heavy use of technology has its
    own set of security concerns.
  • Education
  • Transcript requests, financial aid applications
    and even class notes can all be found online.
    Because some schools have their own medical
    centers, they also have to store and share
    medical information electronically. This
    interactive environment enhances the student
    experience and improves staff productivity, but
    it also makes schools susceptible to security
    threats.

7
The Xerox Security Model
  • Strategy
  • State-of-the-Art Security Features
  • Xerox offers the broadest range of security
    functionality on the market, including
  • Encryption
  • Authentication
  • Authorization Per User
  • Auditing
  • Certification
  • ISO 15408 Common Criteria for Information
    Technology Security Evaluation

8
The Xerox Security Model (continued)
  • Maintenance
  • Ensuring that software updates are issued on an
    ongoing basis
  • Notification of new security bulletins with RSS
    feeds
  • Responding to identified vulnerabilities
  • Providing secure installation and operation
    guidelines
  • Providing Common Criteria information
  • Making patches available at www.xerox.com/security

9
Unrivaled Security for Total Peace of Mind
Devices Visible to IT
Data on the Network Secure data transmission with
IPsec, HTTPS,SNMPv3, sFTP and encrypted email.
Policy Management with Cisco Complete visibility
into network and policy management includes user
identification, provisioning and audit logs.
Device Access Prevent general access to
restricted devices with user access and internal
firewall on printer.
Data Protection Keep personal and confidential
information safe with encrypted hard disk (AES
256-bit, FIPS 140-2 validated) and image
overwrite.
Auditing and Tracking Track access and attempted
access to the device, including comprehensive
audit logs and confirmation reports.
Malware Protection Protect your data and device
from malicious intrusions with McAfee
whitelisting technology.
Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
10
Keeping the Device and Data Protected
  • Device Access
  • Network Authentication
  • Microsoft Active Directory Services
  • LDAP Authentication
  • SMTP Authentication
  • POP3 Authentication Before SMTP
  • Role Based Access Control (RBAC)
  • Print User Permissions

Role Based Assess Control (RBAC)
Print User Permissions
Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
11
Keeping the Device and Data Protected (continued)
  • Smart Card Authentication
  • Xerox PrintSafe Software
  • Device User Interface and Remote User Interface
    Access

Smart Card Authentication
Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
12
Keeping the Device and Data Protected (continued)
Xerox PrintSafe Software
Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
13
Keeping the Device and Data Protected (continued)
  • Document Protection
  • Scan Data Encryption
  • Print Stream Encryption
  • Secure Print
  • Encrypted PDF/Password-Protected PDF
  • Fax Forwarding to Email and Network
  • Fax Destination Confirmation
  • Digital Signatures
  • Secure Watermarks
  • User/Time/Date Stamp

Secure Print
Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
14
Keeping the Device and Data Protected (continued)
  • Data Security
  • Image Data Encryption
  • Image Overwrite
  • Volatile and Non-Volatile Memory
  • Secure Fax
  • S/MIME for Scan to Email
  • Scan to Email Encryption
  • Job Log Conceal
  • Hard Drive Retention Offering
  • PostScript Passwords

Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
15
Keeping the Device and Data Protected (continued)
  • Audit Tracking
  • Audit Log

The Audit Log interface is accessed from a System
Administrators workstation using any standard
Web browser.
The log can then be exported into a .txt file,
and then opened in Microsoft Excel.
Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
16
Keeping the Device and Data Protected (continued)
  • Malware Protection
  • Embedded McAfee Embedded Control powered by
    Intel Security
  • McAfee ePolicy Orchestrator (ePO)
  • McAfee Integrity Control

Alerts
  • Email
  • Xerox Management Tools
  • McAfee ePO
  • Normal usage
  • Known users
  • Approved software

Known files and software
Whitelisting technology allows only approved
software to run
  • Attacks
  • Unknown users
  • Malicious acts
  • Polymorphic zero-day attacks

Unknown files and software
Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
17
Keeping Data on the Network Protected
  • Network Security
  • IP Address Filtering
  • Secure Sockets Layer/Transport Layer Security
    (TLS)
  • IPsec Encryption
  • Network Ports Enable/Disable
  • Digital Certificates
  • SNMPv3
  • SNMP Community Name Strings
  • 802.1X Authentication
  • Firewall
  • Fax and Network Separation

IP Address Filtering
Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
18
Keeping Data on the Network Protected (continued)
802.1X Authentication
How It Works 802.1X authentication for wireless
LANs provides centralized, server-based
authentication of end users.
1 A client sends a start message to an access point, which requests the identity of the client. 2 The client replies with a response packet containing an identity, and the access point forwards the packet to an authentication server. 3 The authentication server sends an accept packet to the access point. 4 The access point places the client port in authorized state, and traffic is allowed to proceed.
Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
19
Keeping Data on the Network Protected (continued)
  • Policy Management
  • Policy Management with Cisco TrustSec
  • Protects your printing assets by enforcing
    security policies centrally at the network level
  • Ensures only authorized role-based access to the
    printers
  • Detection of unauthorized printers on
    networkonly allows approved MFPs and printers to
    be deployed
  • Anti-spoofing capabilities by profiling devices

Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
20
Risk Assessment and Mitigation
  • Proactive Security for Emergent Threats
  • Keep a close eye on the latest risks
  • Issue security bulletins
  • Distribute RSS feeds
  • Provide you with a wealth of information
  • Xerox Security Bulletins and Patch Deployment
  • Visit www.xerox.com/security for timely
    information updates and important resources.

Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
21
Regulatory and Policy Compliance
  • Payment Card Industry (PCI) Data Security
    Standards Version 3.0
  • Sarbanes-Oxley
  • Basel II Framework
  • The Health Insurance Portability and
    Accountability Act (HIPAA)
  • E-Privacy Directive (2002/58/EC)
  • Gramm-Leach-Bliley Act
  • Family Educational Rights and Privacy Act
  • The Health Information Technology for Economic
    and Clinical Health Act
  • Dodd-Frank Wall Street Reform and Consumer
    Protection Act
  • ISO-15408 Common Criteria for Information
    Technology Security Evaluation
  • ISO-27001 Information Security Management System
    Standards
  • Control Objectives for Information and Related
    Technology
  • Statement on Auditing Standards No. 70
  • NIST 800-53, adopted by Federal Government and
    DOD in 2014

22
Common Criteria Evaluation
  • Independent, objective validation of the
    reliability, quality and trustworthiness of IT
    products
  • Achieving Common Criteria Certification
  • Rigorous process
  • Product testing by a third-party laboratory that
    has been accredited by the National Voluntary
    Laboratory Accreditation Program (NVLAP)
  • Visit www.xerox.com/information-security/common-cr
    iteria-certified/ to see which Xerox MFPs have
    achieved Common Criteria Certification.

23
Manufacturing and Supplier Security Practices
  • Electronic Industry Citizenship Coalition (EICC)
    Code of Conduct
  • Demonstrates stringent oversight of their
    manufacturing processes.
  • On-Site Audits
  • Ensures integrity of the process all the way down
    to the component level.

24
Manufacturing and Supplier Security Practices
  • U.S. Customs Agency Trade Partnership Against
    Terrorism
  • Within North America, all trailers moving between
    the factory, product distribution centers and
    Carrier Logistics Centers are sealed at the point
    of origin.
  • All trucks have GPS locators installed and are
    continuously monitored.

U.S. Customs Trade Partnership Against Terrorism
25
Hard Drive Retention Offering for Xerox Products
  • Xerox provides a Hard Drive Retention Offering to
    allow customers in the United States, for a fee,
    to retain the hard drive on leased Xerox
    products. This service may be required for
    customers with very sensitive data, perhaps
    classified, or with internal policies or
    regulatory standards that mandate specific
    disposition processes for hard drives.

26
Hard Drive Retention Offering for Xerox Products
(continued)
  • Upon request for this service offering, a Xerox
    service technician will travel to the customer
    location, remove the hard drive and provide it
    as is to a customer representative. At this
    time, Xerox does not provide hard drive
    sanitization, cleansing or destruction services
    onsite at customer locations. Customers will need
    to make arrangements for final disposition of the
    physical hard drive received from the technician.
  • To determine if your Xerox product contains a
    hard drive or review security features available
    to secure data on hard drives, please visit
    www.xerox.com/harddrive.

27
Summary
  • Xerox MFPs lead the industry.
  • Xerox continues to engineer and design all of its
    products to ensure the highest possible level of
    security at all potential points of
    vulnerability.
  • For more information about the many security
    advantages offered by Xerox, visit our security
    website, www.xerox.com/security.
  • At Xerox, we work hard at keeping your data safe
    and secure so you can focus on what matters
    most your business.

28
Security Checklist
  • IP/MAC Address Filtering
  • IPsec Encryption
  • IPv6
  • 802.1X Authentication
  • Secure Print
  • Scan to Email Encryption
  • Encrypted PDF/Password-Protected PDF
  • Digital Signatures
  • 256-bit AES Hard Disk Encryption
  • Image Overwrite
  • Secure Fax
  • Port Blocking
  • Scan to Mailbox Password Protection
  • Hard Drive Retention Offering
  • Print Restrictions
  • Audit Log
  • Role Based Access Control
  • Smart Card Authentication
  • Common Access Card/Personal Identity Verification

Not all security features are available on all
Xerox products. To find the security information
for your product, visit www.xerox.com/security.
29
(No Transcript)
About PowerShow.com