Passer directement au contenu principalCliquez pour consulter notre Déclaration d'accessibilité, ou contactez-nous pour toute question relative à l'accessibilité.

Xerox Secure Print Features for Printer Security

You might not think of your printer or multifunction printer (MFP) as an access point — or endpoint — to your network, but it is. Printers today are as technologically sophisticated as personal computers. They’re also equally vulnerable to hacks and security breaches. Especially wireless printers and MFPs that can be accessed remotely.

We take printer security very seriously, and that’s why we equip our products with several secure print features — to protect your organization’s most sensitive data.

Our Secure Printers Meet Strict Standards

We strongly endorse the internationally recognized ISO 15408 Common Criteria for Information Technology Security Evaluation, and validate the majority of our products for Common Criteria Certification. We strive to evaluate the entire printer or MFP — and not just individual features — in order to meet our customers’ strictest security requirements.

We also conduct ongoing testing for potential new printer security vulnerabilities, issue software patches and quickly update our manufacturing process to integrate printer security fixes.

Through partnerships with companies like Trellix, we offer benchmark printer security protection with an innovative white listing defense against viruses. This is one part of our four-point approach to comprehensive printer security for select Xerox® ConnectKey® technology-enabled printers and MFPs.

Xerox Secure Printing Features

As your trusted provider of secure printing solutions, we offer many standard and optional secure print features for Xerox printers and MFPs.

  • Xerox® Secure Print. Don’t let your confidential or private documents sit in the output tray, open for viewing, at risk of being taken by someone else. Secure Print allows you to control the print timing of your documents. Enter a pass code to send a job to print. The printer holds the job until you enter the same pass code at the device, releasing it to print.

  • Image Overwrite. Electronically “shred” information stored on a printer’s or MFP’s hard disk as part of routine job processing. Electronic deletion may be performed automatically, on-demand or, on some devices, scheduled. The Xerox® Image Overwrite print security process uses a three-pass algorithm originally specified by the U.S. Department of Defense.

  • Data Encryption. As data moves in and out of a printer or MFP, or is stored within the device, we secure it with several different protocols for encryption, such as Secure Sockets Layer (SSL)/Transport Layer Security (TLS) and Internet Protocol Security (IPSec).

  • Access Control/User Authorization. Specific functions (such as scanning, or accessing customer data) can be restricted by user and by function according to access control limits set by a system administrator. Authorized users may be granted appropriate levels of access once they are logged on or authenticated.

  • Removable Hard Disk Drive Accessory/Kit. Allows a system administrator to quickly and easily remove hard drives and lock them up for a storage, which eliminates risks of unauthorized access when the device is unattended. This is helpful to secure print data that is subject to legal regulations (such as HIPAA or PCI), or might have a customer database containing sensitive information.

  • Network Security. To ensure your device behaves like a good network citizen, many Xerox printers and MFPs include features that protect them from unauthorized remote access. These secure print features protect the confidentiality of data as it moves across your network, to and from the printer. These print security features include IPFiltering, IPSec and SSL/TLS data encryption, digital certificates, network authentication and 802.1x device authentication.

Learn more about the Xerox print security model for products, documents and information.

Get the free “Document and Endpoint Security Management eBook” to reduce data risks associated with documents and the MFPs that produce them.


* Trellix : anciennement McAfee.

Contact Us

Submit a product security question or report a vulnerability

For all other inquiries please contact Xerox Product Support (1-800-821-2797 - United States only).

City skyline at night, reflected on water

Solutions de sécurité pour les documents et l'impression

La sécurité est essentielle à tous les types d'activité, et chez Xerox, nous le prenons très au sérieux.

Articles connexes

  • Print sample by Print Panther from their Iridesse Production Press - a colorful pamphlet

    Créer « Les impressions qui comptent » avec des embellissements numériques

    Les embellissements ne sont pas réservés aux marques de luxe. Découvrez comment Print Panther utilise des embellissements numériques pour créer des « imprimés que les gens ont envie de garder ».

  • Students working at a table

    Cet organisme de formation offre des méthodes d'apprentissage innovantes, rendant les contenus plus accessibles.

    Le personnel de formation de CRC Formation utilise Xerox® Workflow Central pour fournir aux stagiaires de nouvelles méthodes d'apprentissage.

  • people working in office

    Créer un environnement bureautique plus durable

    Découvrez comment Xerox apporte aux entreprises des solutions d’impression plus écoresponsables et des stratégies durables. Solutions écoresponsables, recyclage, et bien plus encore.

  • Man sitting at desk on laptop.

    Étude de cas Bell Law

    Découvrez comment un grand cabinet d'avocats spécialisé dans le droit du travail a surmonté les obstacles liés au traitement et au partage des documents grâce aux solutions innovantes fournies par Xerox® Workflow Central.

  • Children sitting at table with teacher working on computers

    Participation accrue des élèves

    Découvrez comment l'utilisation de la presse jet d'encre Xerox® Baltoro® HF aide l'agence éducative DCMO BOCES à fournir un contenu éducatif plus attrayant tout en réalisant des économies significatives.

  • Woman looking at phone, with security overlay

    3 éléments essentiels de la cybersécurité - Partie 2

    Découvrez comment les technologies Xerox peuvent aider à sécuriser votre imprimante et vos données.

Partager