Ricoh Aficio Common Security Features Guide
Introduction
.............................................................................................................................................................................
1
Information is an Asset
.....................................................................................................................................................
1
Risk Levels
........................................................................................................................................................................
4
Ricoh Aficio Security Solutions Compatibility Chart
...........................................................................................................
4
Ricoh Security Solutions Review
..............................................................................................................................................
6
Network Protection
............................................................................................................................................................
6
Web Image Monitor
...................................................................................................................................................
6
SmartDeviceMonitor
..................................................................................................................................................
6
Network Protocol ON/OFF
.........................................................................................................................................
7
Device Access
...................................................................................................................................................................
7
Administrator Authentication
.....................................................................................................................................
7
User Authentication
...................................................................................................................................................
8
Common Access Card (CAC) Authentication
..............................................................................................................
9
IP Address Filtering
...................................................................................................................................................
9
Job Logs / Access Logs
............................................................................................................................................
9
User Account Registration
.......................................................................................................................................
10
Wi-Fi Protect Access (WPA) Support
........................................................................................................................
10
Kerberos
.................................................................................................................................................................
10
802.1x Wired Authentication
...................................................................................................................................
10
Data Encryption
..............................................................................................................................................................
11
128-bit Secure Socket Layer (SSL) Support
............................................................................................................
11
Address Book Encryption
........................................................................................................................................
12
Encrypted PDF Transmission
...................................................................................................................................
12
Driver Encryption Key
..............................................................................................................................................
13
PDF Password Encryption
........................................................................................................................................
13
SNMP v3 Encrypted Communication
.......................................................................................................................
13
S/MIME for Scan to E-mail
.....................................................................................................................................
13
IPsec Communication
.............................................................................................................................................
13
Hard Disk (HDD) Encryption
....................................................................................................................................
14
Document Protection
.......................................................................................................................................................
14
Hard Disk Drive Data Protection (DOSS)
.................................................................................................................
14
Locked Print/Secure Print
.......................................................................................................................................
15
Locked Print Password Encryption
...........................................................................................................................
15
Enhanced Locked Print
............................................................................................................................................
15
SmartDeviceMonitor (for Admin)
.............................................................................................................................
16
Password Protection of Stored Documents
..............................................................................................................
16
RAM-based Security
................................................................................................................................................
17
Removable Hard Disk Drive
.....................................................................................................................................
17
Unauthorized Copy Control/Masked Type
................................................................................................................
17
Commercial Facsimile Security Solutions
........................................................................................................................
18
Closed Network
.......................................................................................................................................................
19
Confidential Transmission/Reception
......................................................................................................................
19
IP-fax
.......................................................................................................................................................................
19
ITU-T Sub-address Routing
.......................................................................................................................................
19
Memory Lock
..........................................................................................................................................................
19
Restricted Access
....................................................................................................................................................
19
Security PIN Code Protection
...................................................................................................................................
19
Server Domain Authentication
.........................................................................................................................
20
Wrong Connection Prevention
..........................................................................................................................
20
Fax Security Compatibility Table
..............................................................................................................................
20
Security Solution Compatibility Tables
................................................................................................................
21-24
TABLE OF CONTENTS