Download presentation
Presentation is loading. Please wait.
Published byAmberlynn Lloyd Modified over 9 years ago
1
Secure Your Documents. Protect Your Data. Lexmark Security for Solutions-Capable Printers and MFPs
2
Protect your data and safeguard your information. When you secure your devices you can…. ►Prevent network intrusion ►Retain control over your network infrastructure ►Restrict access by unauthorised users Ask for a robust range of high-end features that protect your data and documents. ©2012 Lexmark International, Inc. 2
3
Get enterprise-level security in every Lexmark device. To help protect your networked devices, we provide comprehensive security in four areas: Secure Remote Management Secure Network Interfaces Secure Access Secure Data ©2012 Lexmark International, Inc. 3
4
Take advantage of security features that make device remote management easier and more secure: ►Digital signed firmware updates ►Secure Password Reset ►HTTPS ►IPv6 ►Audit Logging ►Certificate Management ►SNMPv3 ►Secure IPP Secure Remote Management: Manage your devices efficiently. ©2012 Lexmark International, Inc. 4
5
Lock down network interfaces using our built-in standard protocols and security mechanisms: ►TCP Connection Filtering ►Port Filtering ►Fax/Network Separation ►802.1x ►IPSec ►Secure NTP Stronger Device Hardening features. Secure Network Interfaces: Protect devices from hackers and viruses. ©2012 Lexmark International, Inc. 5
6
Prevent unauthorised use with standard security features that include: ►Confidential Print ►Protected USB Ports ►Secure LDAP ►Auto-Insertion of Sender’s Email Address ►PrintCryption Card (optional) ►Authentication & Authorisation ►Active Directory ►Access Controls ►Login Restrictions ►Operator Panel Lock ►Incoming Fax Holding ►LDAP Address Book Lookup Secure Access: Make everyday operations simple and safe. ©2012 Lexmark International, Inc. 6 Improved joining process with Active Directory enrollment.
7
Protect confidential information buffered or utilised by your device with our embedded controls, including: ►Physical Lock Support ►Non-Volatile Memory Wipe ►Hard Disk Encryption ►Secure Hard Disk Wiping ►Out-of-Service Disk Wipe Support for Single-Pass and Multi-Pass Disk Wiping. Secure Data: Encrypt, wipe and physically defend stored data. ©2012 Lexmark International, Inc. 7
8
Take advantage of embedded security features located right on your device: Start using secure solutions such as Scan to Network. ©2012 Lexmark International, Inc. 8 AdvantageSecurity Feature Monitor device settings changes in an efficient manner Audit Logs Secure the network traffic so it can’t be sniffed, stolen or abused IPSec Limit user accessAuthentication/ Authorisation Secure scanned data when scanned and remove after use Hard Disk encryption/ Wiping
9
Lexmark designs devices with your security in mind. See how we build in security right from the start: Security Focus Security is central to our development philosophy Security is central to our development philosophy ©2012 Lexmark International, Inc. 9
10
►Secure your network devices to keep sensitive information safe and protect your data ►Empower your employees with secure access mechanisms and remote management tools ►Reduce your output costs with no add-ons to buy or additional data security kits to purchase ►Wipe hard drives to cleanly remove residual job data without pre-scheduling or impacting performance Security solutions that help you work smarter…not harder. By working with Lexmark, you can: ©2012 Lexmark International, Inc. 10
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.