A higher standard
Although it’s integral to our technology, there’s nothing standard about the levels of security included with every ConnectKey-enabled device. Our holistic four-point approach to security ensures comprehensive and all-encompassing protection for all system components and points of vulnerability.
Xerox® ConnectKey® Technology runs a comprehensive Firmware Verification test, either at start-up* or when activated by authorized users. This provides alerts if any harmful changes to the printer have been detected. McAfee® Whitelisting** technology constantly monitors for and automatically prevents any malicious malware from running.
ConnectKey Technology utilizes a comprehensive set of capabilities that prevents malicious attacks, the proliferation of malware, and misuse of/unauthorized access to the printer, whether from transmitted data or direct interaction at the device. All possible access points are secure, including the user interface and input ports accessible to walkup users as well as PC, server, mobile devices or cloud connections
Document and Data Protection
Our comprehensive security measures don’t stop with preventing unauthorized access to your printer and securing your information from the inside. ConnectKey Technology provides capabilities to prevent intentional or unintentional transmission of critical data to unauthorized parties. From protecting printed materials by not releasing documents until the right user is at the device, to preventing scanned information reaching beyond its intended recipient, ConnectKey Technology offers the safeguards you need to keep your most critical data assets safe and secure.
Xerox also protects all your stored information, using the highest levels of encryption. You can delete any processed or stored data that is no longer required using National Institute of Standards and Technology (NIST), and U.S. Department of Defense approved data clearing and sanitization algorithms***.
ConnectKey Technology provides extra security standards through our partnership with McAfee®** and Cisco. We measure our performance against international standards with certifications like Common Criteria and FIPS 140-2 to ensure our devices are trusted in even the most secure environments.