beautypg.com

Xerox – Xerox C2636 User Manual

Page 12

background image

10

E VA L U AT O R G U I D E F O R C O P Y C E N T R E C 2 1 2 8 • C 2 6 3 6 • C 3 5 4 5 / W O R K C E N T R E P R O C 2 1 2 8 • C 2 6 3 6 • C 3 5 4 5

What type of security requirements does your office require? Does the device have the

security features

to meet this demand? Can the device access be

protected by a password?

Does the device

remove latent

images

on disk drives and in memory? Does the service provider have

bonded service personal?

Both CopyCentre C2128/C2636/C3545 and WorkCentre C2128/C2636/C3545 protect your investment
with device access passwords and an internal auditron to control usage and access to device features.

Network Authentication restricts access to scan, e-mail and fax features by validating network user
names and passwords prior to the use of these network features. It allows identification of user with
their scan, no anonymous sending.

With the optional WorkCentre Pro Network Accounting feature, you control access and track usage
on a centralized basis. You can get up-to-date information on how the WorkCentre Pro device is being
used by account and user, including time and date of the activity. This solution requires integration
with an accounting server available through one of the Xerox Partners.

Confidentiality of your sensitive business information is maintained with an optional image overwrite
security feature that electronically erases data that had been processed to the hard disk in print, copy,
scan, internet fax and server fax modes. This option eliminates data as a part of routine job processing.

The Foreign Device Interface Kit controls device access and accounting via magnetic card readers,
coin devices, and third-party accounting solutions.

HOW XEROX COPYCENTRE C2128/C2636/C3545 AND WORKCENTRE
PRO C2128/C2636/C3545 EXCEED THE SECURITY REQUIREMENT

EVALUATE SECURITY CAPABILITIES

EVALUATE

ADVANTAGE

XEROX

This manual is related to the following products: