Xerox 7845V/F 7845V_F ユーザーズマニュアル

製品コード
7845V_F
ページ / 8
Powerful Partnerships
The Xerox
®
 ConnectKey
®
 Controller 
includes McAfee technology integration, 
resulting in the industry’s first line up 
of multifunction systems that protect 
themselves from potential outside threats. 
McAfee’s whitelisting technology ensures 
only safe, pre-approved system files run 
on your devices, minimising the need to 
manually update software levels against 
new security threats. Also, seamless 
integration with the Xerox
®
 Managed 
Print Services toolset and McAfee allows 
for easy tracking and monitoring.
Plus, automatic Cisco TrustSec ISE 
integration provides comprehensive 
visibility of all ConnectKey multifunction 
systems’ endpoints to enforce IT-centric 
security policies and compliance.
Unrivalled security for total peace of mind.
Business data is your company’s lifeblood. 
That’s why Xerox engineered the 
WorkCentre™ 7800 series devices with the most complete range of advanced 
features, technologies, and solutions from security-industry leaders that safeguard 
your critical information from all potential points of vulnerability. 
  Protect your confidential information. 
Safeguard all sensitive data with encrypted 
PDF files for scanning; complete hard drive 
encryption, compliant with the 256-bit AES 
FIPS 140-2 standard; and Image Overwrite 
with a 3-pass scrub process to ensure total 
deletion of all data fragments.
  Prevent unauthorised Access. Permit 
only authorised users from accessing the 
device with Xerox user permissions, network 
authentication, IP filtering, and smart card, 
role-based and function-level login.
  Proactive threat management.  
Monitors security clearing houses for  
new vulnerabilities and provides patches 
when necessary, ensuring your equipment 
stays current and your data is kept safe.  
Plus, you can receive up-to-the-minute 
updates via RSS feeds and stay informed  
via 
  Stay compliant with regulations. 
WorkCentre 7800 series devices comply 
with the latest security standards across 
industries, including government, finance 
and healthcare. These include Common 
Criteria, HIPAA, Data Protection Act, COBIT 
and more. These devices can conform to any 
standard, with controls available to match 
your needs.
  Gain complete visibility. Prevent IP theft 
and ensure non-repudiation by having total 
visibility into the device and network. With 
security policy management and tracking of 
all activity on the device with Audit Log, you 
know who accessed what and when.
TITLE: X_26337_W78BR-01EC   LANGUAGE: English   DATE: 1 November 2013 5:56 PM   PLATES: CMYK    PAGE: 5 of 8