Datasheet
Comprehensive security for complete data protection.
For the success of your business it’s critical that sensitive information stays
protected. That’s why we deploy the most complete set of features, technologies,
and solutions from security-industry leaders that minimise risk by protecting
vulnerable access points and critical business information.
Powerful Partnerships
The Xerox
®
ConnectKey™ Controller
includes McAfee technology integration,
resulting in the industry’s fi rst line up
of multifunction systems that protect
themselves from potential outside threats.
McAfee’s whitelisting technology ensures
only safe, pre-approved system fi les run
on your devices, minimising the need to
manually update software levels against
new security threats. Also, seamless
integration with the Xerox
®
Managed
Print Services toolset and McAfee allows
for easy tracking and monitoring.
Plus, automatic Cisco TrustSec ISE
integration provides comprehensive
visibility of all ConnectKey multifunction
systems’ endpoints to enforce IT-centric
security policies and compliance.
• Protect your confi dential information.
Safeguard all sensitive data with encrypted
PDF fi les for scanning; complete hard drive
encryption, compliant with the 256-bit AES
FIPS 140-2 standard; and Image Overwrite
with a 3-pass scrub process to ensure total
deletion of all data fragments.
• Prevent unauthorised access. Permit
only authorised users to access the device
with Xerox
®
user permissions, network
authentication, IP fi ltering, and smart card,
role-based and function-level login.
• Proactive threat management.
Monitors security clearing houses for
new vulnerabilities and provides patches
when necessary, ensuring your equipment
stays current and your data is kept safe.
Plus, you can receive up-to-the-minute
updates via RSS feeds and stay informed
via
xerox.com/security.
• Stay compliant with regulations.
ColorQube 9300 series devices comply
with the latest security standards across
industries, including government, fi nance
and healthcare. These include Common
Criteria (pending), HIPAA, Data Protection
Act, COBIT and more. These devices can
conform to any standard, with controls
available to match your needs.
• Gain complete visibility. Prevent IP theft
and ensure non-repudiation by having total
visibility into the device and network. With
security policy management and tracking of
all activity on the device with Audit Log, you
know who accessed what and when.








