Lexmark XC9325 Security White Paper - Page 3

Secure Data, Solutions, Security Standards

Page 3 highlights

Contents 3 Secure LDAP...31 Auto-insertion of Sender's E-mail Address 31 Login Restrictions...32 Control Panel Lock...32 Confidential Print...33 Secure Internet Printing Protocol...34 Incoming Fax Holding...34 Secure Start Process and Operating System Protections 35 eSF Application Security...36 Protected USB Ports...37 Secure Data 41 Hard Disk Encryption...41 Non volatile Memory Wipe...42 Trusted Platform Module...43 Hard Disk File Wiping...43 Complete Hard Disk Erasure ...45 Out of Service Wiping ...46 Physical Lock Support ...46 Solutions...48 Intelligent Storage Drive...48 Print Release Application...50 Automated Certificate Management...51 Native Held Jobs Application...52 Contactless Card Authentication Support 53 CAC/PIV and SIPRNet Card (Authentication 54 Lexmark Contact Authentication Device...55 Lexmark Contactless Authentication Device 56 Lexmark Secure Document Monitor...57 Information sent to Lexmark...58 Security Standards 59 Common Criteria (NIAP/CCEVS Certification, ISO 15408 59 Federal Information Processing Standards (FIPS 59 ISO 27001 - Information Security Management System Certification 60 ISO 20243 - Supply Chain Certification...60

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64

Secure LDAP
........................................................................................................................................................
31
Auto-insertion of Sender’s E-mail Address
..................................................................................................
31
Login Restrictions
..............................................................................................................................................
32
Control Panel Lock
............................................................................................................................................
32
Confidential Print
...............................................................................................................................................
33
Secure Internet Printing Protocol
..................................................................................................................
34
Incoming Fax Holding
......................................................................................................................................
34
Secure Start Process and Operating System Protections
......................................................................
35
eSF Application Security
.................................................................................................................................
36
Protected USB Ports
.........................................................................................................................................
37
Secure Data
..................................................................................................
41
Hard Disk Encryption
.........................................................................................................................................
41
Non volatile Memory Wipe
..............................................................................................................................
42
Trusted Platform Module
.................................................................................................................................
43
Hard Disk File Wiping
.......................................................................................................................................
43
Complete Hard Disk Erasure
.........................................................................................................................
45
Out of Service Wiping
.....................................................................................................................................
46
Physical Lock Support
.....................................................................................................................................
46
Solutions
......................................................................................................
48
Intelligent Storage Drive
..................................................................................................................................
48
Print Release Application
................................................................................................................................
50
Automated Certificate Management
.............................................................................................................
51
Native Held Jobs Application
.........................................................................................................................
52
Contactless Card Authentication Support
..................................................................................................
53
CAC/PIV and SIPRNet Card (Authentication)
.............................................................................................
54
Lexmark Contact Authentication Device
....................................................................................................
55
Lexmark Contactless Authentication Device
.............................................................................................
56
Lexmark Secure Document Monitor
.............................................................................................................
57
Information sent to Lexmark
...........................................................................................................................
58
Security Standards
.....................................................................................
59
Common Criteria (NIAP/CCEVS Certification, ISO 15408)
......................................................................
59
Federal Information Processing Standards (FIPS)
....................................................................................
59
ISO 27001 – Information Security Management System Certification
................................................
60
ISO 20243 – Supply Chain Certification
.....................................................................................................
60
Contents
3