Datasheet

Don’t risk your sensitive information.
Working at peak performance means nothing if the data that’s critical to
the success of your business isn’t fully safeguarded. That’s why the Xerox
®
WorkCentre™ 5865/5875/5890 boasts the most complete range of advanced
features, technologies and solutions from security-industry leaders that ensure
comprehensive 24/7 protection.
Powerful Partnerships
The WorkCentre 5865/5875/5890
include McAfee
®
technology integration,
resulting in the industry’s first line up
of multifunction printers that protect
themselves from potential outside threats.
McAfee’s whitelisting technology ensures
only safe, pre-approved system files run
on your devices, minimising the need to
manually update software levels against
new security threats. Also, seamless
integration with the Xerox
®
Managed Print
Services toolset and McAfee allows for easy
tracking and monitoring.
Plus, automatic Cisco
®
TrustSec Identity
Services Engine (ISE) integration
provides comprehensive visibility of all
ConnectKey
®
-enabled multifunction
printers’ endpoints to enforce IT-centric
security policies and compliance.
Protect your confidential information.
Safeguard all sensitive data with encrypted
PDF files for scanning; hard drive encryption,
compliant with the 256-bit AES FIPS 140-2
standard; and Image Overwrite with a
3-pass scrub process to ensure total deletion
of all data fragments.
Prevent unauthorised access.
Prevent unauthorised access to the device
by using network authentication with or
without convenience authentication via
Magstripe, proximity and Smart card
(CAC/PIV/.Net) readers, Xerox
®
user
permissions role-based and function-level
login and IP Filtering.
Proactive threat management.
Monitors security clearing houses for
new vulnerabilities and provides patches
when necessary, ensuring your equipment
stays current and your data is kept safe.
Plus, you can receive up-to-the-minute
updates via RSS feeds and stay informed
via www.xerox.com/security.
Stay compliant with regulations.
WorkCentre 5865/5875/5890 devices
comply with the latest security standards
across industries, including government,
finance and healthcare. These include
Common Criteria, HIPAA, Data Protection
Act, COBIT and more. These devices can
conform to any standard, with controls
available to match your needs.
Gain complete visibility. Prevent IP theft
and ensure non-repudiation by having total
visibility into the device and network. With
security policy management and tracking of
all activity on the device with Audit Log, you
know who accessed what and when.
TITLE: X_27189_W5ZBR-01ED
LANGUAGE: English DATE: 15 July 2014 2:24 PM PLATES: CMYK PAGE: 5 of 8
5