Security
Robust security features let you restrict access,
manage usage and ensure confidentiality.
•
Network Authentication
restricts access
to scan, email and network fax features by
validating user names and passwords prior to
use. With Audit Log capabilities you’ll know
who sent what and when.
•
Secure Print
prevents unauthorized viewing
by holding jobs in the queue until a PIN is
entered, releasing documents to print. Secure
Print job submission utilizes IPsec.
•
Image Overwrite
eradicates data by over-
writing the disk surface with patterns of data.
•
Embedded Fax
prevents unauthorized device
access via the fax subsystem. There is com-
plete separation of the fax telephone line and
the network connection.
•
Device Access Password Protection
ensures
administrative set-up screen and remote
network settings cannot be viewed or altered
without authentication.
•
IP Address Restriction
(IP Filtering) controls
communications with specific network clients.
Operates in IPv4 and IPv6 environments.
•
Secure Scan
transmits files using HTTPS (SSL).
•
Secure Device Administration
with HTTPS is
enabled through CentreWare.
•
802.1x Port Based Network Access Control
ensures that devices that are connected to
the network have the proper authorization.
•
Secure Access Unified ID System
enables
users to log-in at the device with their mag-
netic or proximity ID card for secure access to
functions that need to be tracked for account-
ing or regulatory requirements.
The WorkCentre 7655/7665/7675
multifunction devices incorporate some
of the strongest security features in the industry,
ensuring that your document
production workflow, often overlooked in security checks, is well-protected. We built in
the latest network security features, such as tight integration with email security sys-
tems, embedded fax functionality which isolates the fax system from other network
functions, and detailed remote management and alerts through tools such
as CentreWare Web. IT managers will appreciate the ability to create an authenti-
cation system that not only restricts access to scanning, email and output from the
device, but also provides an audit trail of accountability for all device users.