A SERVICE OF

logo

14
WORKCENTRE 7346 EVALUATOR GUIDE
EVALUATE SECURITY CAPABILITIES
Whattypesofsecurity requirementsarecriticaltoyourofce?Doesthedevicehavethesecurity features
tomeetthesedemands?Candeviceaccessbepassword protected?Doesthesystemremove latent
imagesonitsharddrive?Doesthesystemhavefeaturesinplacetoprotect condential documents?
INTEGRATED SECURITY
Intoday’sbusinessenvironment,securityisacriticalcompetency.Thetechnologyyoudeployinto
yourorganizationmusthaveacompletesetofcapabilitiestohelpkeepyourcondentialinformation
safe.TheWorkCentre7346multifunctionprinterdeliverssecurityfeaturesthatprotectyourcon-
dentialinformationatallpointsofdocumentvulnerability:
 Document—
•Password-protectedPDF—protectsscannedlesbyestablishingaPINaccesscodeforviewers
•Securefax—protectsfaxeddocumentsbyrequiringaPINaccesscodebeforethereceived
fax is printed
•Secureprint—holdsprintjobsattheMFPbeforetheyareprinted
 Device—
•Auditlog—tracksprinting,scanningandnetworkfaxactivitiesbyuser,timeanddate
•Restrictjobdetaildisplay—hidesjobnameswhennonauthenticatedusersviewjobqueue
•SecureAccessUniedIDSystem
TM
—magneticcard-basedaccesseasesauthenticationand
accesstodevicefeatures
•UserAuthentication—restrictsaccesstodevicefeaturesandmanagementsettingsbyvali-
datingusernamesandpasswords,withSMB,LDAP,LDAP+SSL,andKerberosintegration
HardDrive—
•Encrypteddiskdrive—applies128-bitencryptiontodatastoredontheMFPharddrive
•Imageoverwrite—electronically“shreds”datastoredontheMFPharddriveusingan
algorithmspeciedbyU.S.DepartmentofDefenseDirective5200.28-M
Network—
•Digitallysigneddocuments—createssignaturesusingavarietyofmethods,includingS/
MIME,passwordencryptionanddevicecerticates
•Encryptedemail—encryptsemailmessagessentbytheMFPtoyouremailserver
•Faxandnetworkisolation—controllerarchitectureseparatesthenetworkconnectionand
thefaxtelephonelinetoavoidincomingfax-basednetworkattacks
•Firewall—restrictsaccessviaIPaddressltering,domainlteringandportblocking
•IEEE802.1xprotocol—ensuresdevicesconnectedtothenetworkareproperlyauthenticated
•IPSec—encryptsprintjobssenttotheMFPutilizingIPSec
•IPv6support—built-insupportfornetworksutilizingtheIPv6standard
•Securedataprotocols—securesnetworkcommunicationswithindustrystandards,including
HTTPS(SSL),SNMPv3.0,andIPSecEVALUATE SECURITY CAPABILITIES (CONTIN-
UED)
HOW THE WORKCENTRE 7346 MFP EXCEEDS THE SECURITY REQUIREMENT: