Ricoh 2020D Features Guide - Page 2

Table Of Contents - reviews

Page 2 highlights

Ricoh Aficio Common Security Features Guide TABLE OF CONTENTS Introduction...1 Information is an Asset ...1 Risk Levels...4 Ricoh Aficio Security Solutions Compatibility Chart ...4 Ricoh Security Solutions Review...6 Network Protection...6 Web Image Monitor...6 SmartDeviceMonitor...6 Network Protocol ON/OFF ...7 Device Access...7 Administrator Authentication...7 User Authentication...8 Common Access Card (CAC) Authentication...9 IP Address Filtering ...9 Job Logs / Access Logs ...9 User Account Registration ...10 Wi-Fi Protect Access (WPA) Support...10 Kerberos ...10 802.1x Wired Authentication...10 Data Encryption ...11 128-bit Secure Socket Layer (SSL) Support ...11 Address Book Encryption ...12 Encrypted PDF Transmission ...12 Driver Encryption Key ...13 PDF Password Encryption...13 SNMP v3 Encrypted Communication...13 S/MIME for Scan to E-mail ...13 IPsec Communication ...13 Hard Disk (HDD) Encryption...14 Document Protection...14 Hard Disk Drive Data Protection (DOSS) ...14 Locked Print/Secure Print ...15 Locked Print Password Encryption...15 Enhanced Locked Print...15 SmartDeviceMonitor (for Admin) ...16 Password Protection of Stored Documents...16 RAM-based Security ...17 Removable Hard Disk Drive ...17 Unauthorized Copy Control/Masked Type ...17 Commercial Facsimile Security Solutions ...18 Closed Network...19 Confidential Transmission/Reception ...19 IP-fax...19 ITU-T Sub-address Routing...19 Memory Lock ...19 Restricted Access...19 Security PIN Code Protection...19 Server Domain Authentication...20 Wrong Connection Prevention...20 Fax Security Compatibility Table...20 Security Solution Compatibility Tables...21-24

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27

Ricoh Aficio Common Security Features Guide
Introduction
.............................................................................................................................................................................
1
Information is an Asset
.....................................................................................................................................................
1
Risk Levels
........................................................................................................................................................................
4
Ricoh Aficio Security Solutions Compatibility Chart
...........................................................................................................
4
Ricoh Security Solutions Review
..............................................................................................................................................
6
Network Protection
............................................................................................................................................................
6
Web Image Monitor
...................................................................................................................................................
6
SmartDeviceMonitor
..................................................................................................................................................
6
Network Protocol ON/OFF
.........................................................................................................................................
7
Device Access
...................................................................................................................................................................
7
Administrator Authentication
.....................................................................................................................................
7
User Authentication
...................................................................................................................................................
8
Common Access Card (CAC) Authentication
..............................................................................................................
9
IP Address Filtering
...................................................................................................................................................
9
Job Logs / Access Logs
............................................................................................................................................
9
User Account Registration
.......................................................................................................................................
10
Wi-Fi Protect Access (WPA) Support
........................................................................................................................
10
Kerberos
.................................................................................................................................................................
10
802.1x Wired Authentication
...................................................................................................................................
10
Data Encryption
..............................................................................................................................................................
11
128-bit Secure Socket Layer (SSL) Support
............................................................................................................
11
Address Book Encryption
........................................................................................................................................
12
Encrypted PDF Transmission
...................................................................................................................................
12
Driver Encryption Key
..............................................................................................................................................
13
PDF Password Encryption
........................................................................................................................................
13
SNMP v3 Encrypted Communication
.......................................................................................................................
13
S/MIME for Scan to E-mail
.....................................................................................................................................
13
IPsec Communication
.............................................................................................................................................
13
Hard Disk (HDD) Encryption
....................................................................................................................................
14
Document Protection
.......................................................................................................................................................
14
Hard Disk Drive Data Protection (DOSS)
.................................................................................................................
14
Locked Print/Secure Print
.......................................................................................................................................
15
Locked Print Password Encryption
...........................................................................................................................
15
Enhanced Locked Print
............................................................................................................................................
15
SmartDeviceMonitor (for Admin)
.............................................................................................................................
16
Password Protection of Stored Documents
..............................................................................................................
16
RAM-based Security
................................................................................................................................................
17
Removable Hard Disk Drive
.....................................................................................................................................
17
Unauthorized Copy Control/Masked Type
................................................................................................................
17
Commercial Facsimile Security Solutions
........................................................................................................................
18
Closed Network
.......................................................................................................................................................
19
Confidential Transmission/Reception
......................................................................................................................
19
IP-fax
.......................................................................................................................................................................
19
ITU-T Sub-address Routing
.......................................................................................................................................
19
Memory Lock
..........................................................................................................................................................
19
Restricted Access
....................................................................................................................................................
19
Security PIN Code Protection
...................................................................................................................................
19
Server Domain Authentication
.........................................................................................................................
20
Wrong Connection Prevention
..........................................................................................................................
20
Fax Security Compatibility Table
..............................................................................................................................
20
Security Solution Compatibility Tables
................................................................................................................
21-24
TABLE OF CONTENTS