Datasheet

Don’t risk your sensitive information.
Working at peak performance means nothing if the data that’s critical
to the success of your business isn’t fully safeguarded. That’s why the
WorkCentre™ 5865/5875/5890 boasts the most complete range of advanced
features, technologies, and solutions from security-industry leaders that ensure
comprehensive, 24/7 protection.
Powerful Partnerships
The Xerox
®
ConnectKey™ Controller
includes McAfee
®
technology integration,
resulting in the industry’s first line up
of multifunction systems that protect
themselves from potential outside threats.
McAfee’s whitelisting technology ensures
only safe, pre-approved system files run
on your devices, minimising the need to
manually update software levels against
new security threats. Also, seamless
integration with the Xerox
®
Managed Print
Services toolset and McAfee allows for easy
tracking and monitoring.
Plus, automatic Cisco
®
TrustSec ISE
integration provides comprehensive
visibility of all ConnectKey multifunction
systems’endpoints to enforce IT-centric
security policies and compliance.
Protect your confidential information.
Safeguard all sensitive data with encrypted
PDF les for scanning; hard drive encryption,
compliant with the 256-bit AES FIPS 140-2
standard; and Image Overwrite with a
3-pass scrub process to ensure total deletion
of all data fragments.
Prevent unauthorised Access. Permit
only authorised users to access the device
with Xerox
®
user permissions, network
authentication, IP ltering, and smart card,
role-based and function-level login.
Proactive threat management.
Monitors security clearing houses for
new vulnerabilities and provides patches
when necessary, ensuring your equipment
stays current and your data is kept safe.
Plus, you can receive up-to-the-minute
updates via RSS feeds and stay informed
via www.xerox.com/security.
Stay compliant with regulations.
WorkCentre 5865/5875/5890 devices
comply with the latest security standards
across industries, including government,
finance and healthcare. These include
Common Criteria (pending), HIPAA, Data
Protection Act, COBIT and more. These
devices can conform to any standard, with
controls available to match your needs.
Gain complete visibility. Prevent IP theft
and ensure non-repudiation by having total
visibility into the device and network. With
security policy management and tracking of
all activity on the device with Audit Log, you
know who accessed what and when.
TITLE: X_25588_W5ZBR-01EB
LANGUAGE: English DATE: 2 April 2013 12:23 PM PLATES: CMYK PAGE: 5 of 8