Background
- Disk encryption and disk overwrite to protect end user data
- Enablement of encrypted protocols such as Secure Sockets Layer (SSL), Internet Protocol Security*(IPsec), and Simple Network Management Protocol Version 3 (SNMPv3) to protect any data*transmitted to and from the device
- User authentication for most tasks
- Access control through the addition of firewalls and roles based on Active Directory (AD) groups
- Audit logs for traceability
- Security evaluation programs such as Common Criteria Certification
Are the MFPS embedded systems or open systems? Do these multiple function devices need an*additional layer of security? If so, what is the right solution for protecting the servers, desktops, and*networks against current and future threats? This is a question experts in the security communities are*constantly trying to answer.*
Tags:
Xerox
Whitepaper
More...