Lexmark C4342 Security White Paper - Page 47

Secure Data, confidence

Page 47 highlights

Secure Data 47 Details One of the most forgotten parts of a secure-device strategy is to protect assets from physical theft. Most IT departments inventory and apply asset tags to their hard copy devices, but rarely do these same departments lock down their hard copy devices with physical locks. Some of these devices contain hard disk drives that buffer printing- and scanning-related data. In addition to buffering data, hard disk drives (and optional flash memory) can be used to store fonts, forms, fax data, and so on. Lexmark devices can protect this data with wiping and encryption technologies. Adding a physical lock to a device gives the device administrator added confidence, knowing that the devices' critical components are protected so that only authorized individuals have access to these components.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64

Details
One of the most forgotten parts of a secure-device strategy is to protect assets from physical theft. Most IT
departments inventory and apply asset tags to their hard copy devices, but rarely do these same departments
lock down their hard copy devices with physical locks. Some of these devices contain hard disk drives that
buffer printing- and scanning-related data. In addition to buffering data, hard disk drives (and optional flash
memory) can be used to store fonts, forms, fax data, and so on. Lexmark devices can protect this data with
wiping and encryption technologies. Adding a physical lock to a device gives the device administrator added
confidence, knowing that the devices’ critical components are protected so that only authorized individuals
have access to these components.
Secure Data
47