Ricoh Aficio MP C2050SPF Features Guide - Page 22

Closed Network, Confidential Transmission/Reception, IP-fax, ITU-T Sub-address Routing, Memory Lock

Page 22 highlights

Ricoh Aficio Common Security Features Guide After you allay your customer's concerns about potential fax network threats, you can speak to a number of security features that are designed to improve basic faxing security in commercial fax environments. The following features apply to Ricoh stand-alone fax machines, network fax systems, and also to any MFP device that offers a Ricoh-engineered Super G3 Fax option. Closed Network With Closed Networks, the ID codes of the communicating machines are checked. If they are not identical, the communication is terminated, thus preventing possibly confidential documents from being transmitted intentionally or accidentally to the wrong location(s), i.e., outside the network. (Note: Closed Network requires all fax systems be Ricoh systems with closed network capability.) Confidential Transmission/Reception This feature enables the user to transmit/receive faxes to a mailbox that is passcode-protected. Messages are only printed after the recipient enters the proper passcode, providing an enhanced level of security when communicating between machines. IP-fax When the NIC FAX Unit is installed Ricoh facsimile systems support secure T.38 real-time IP-fax over a corporate Intranet. This not only bypasses costly phone lines, but also operates behind the firewall for secure point-to-point transmissions. ITU-T Sub-address Routing Using a Sub-address appended to a fax number (think of it like an extension on a business phone number), it is possible to route a fax directly to the recipient's PC via their e-mail address. When received directly to a PC, confidentiality is enhanced as the recipient can view the message and print a copy at their convenience. Memory Lock Similar to the Secure Print feature on a printer or MFP, when this feature is enabled documents from identified senders or all senders are retained in memory. Only after the Memory Lock ID is entered at the control panel will the documents stored in memory be printed, preventing transmissions from sitting unattended on a reception tray for passers-by to read until collected. Restricted Access Restricted Access allows customers to track and trace machine usage and deter casual passers-by from using the fax. Authorized users must enter a code before they can use the machine. Activity reports document the time and destination of every call. Further, this function can be linked to the Night Timer feature so that Restricted Access is activated during desired times to prevent after-hours access. Security PIN Code Protection To prevent accidental exposure of a PIN Code or Personal ID, any character after a certain position in the destination's dial number will be concealed both in the LCD panel and activity report. 19

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27

Ricoh Aficio Common Security Features Guide
19
After you allay your customer’s concerns about potential fax network threats, you can speak to a number
of security features that are designed to improve basic faxing security in commercial fax environments.
The following features apply to Ricoh stand-alone fax machines, network fax systems, and also to any
MFP device that offers a Ricoh-engineered Super G3 Fax option.
Closed Network
With Closed Networks, the ID codes of the communicating machines are checked. If they are not
identical, the communication is terminated, thus preventing possibly confidential documents from being
transmitted intentionally or accidentally to the wrong location(s), i.e., outside the network. (Note: Closed
Network requires all fax systems be Ricoh systems with closed network capability.)
Confidential Transmission/Reception
This feature enables the user to transmit/receive faxes to a mailbox that is passcode-protected.
Messages are only printed after the recipient enters the proper passcode, providing an enhanced level
of security when communicating between machines.
IP-fax
When the NIC FAX Unit is installed Ricoh facsimile systems support secure T.38 real-time IP-fax over a
corporate Intranet. This not only bypasses costly phone lines, but also operates behind the firewall for
secure point-to-point transmissions.
ITU-T Sub-address Routing
Using a Sub-address appended to a fax number (think of it like an extension on a business phone
number), it is possible to route a fax directly to the recipient’s PC via their e-mail address. When
received directly to a PC, confidentiality is enhanced as the recipient can view the message and print a
copy at their convenience.
Memory Lock
Similar to the Secure Print feature on a printer or MFP, when this feature is enabled documents from
identified senders or all senders are retained in memory. Only after the Memory Lock ID is entered at
the control panel will the documents stored in memory be printed, preventing transmissions from sitting
unattended on a reception tray for passers-by to read until collected.
Restricted Access
Restricted Access allows customers to track and trace machine usage and deter casual passers-by from
using the fax. Authorized users must enter a code before they can use the machine. Activity reports
document the time and destination of every call. Further, this function can be linked to the Night Timer
feature so that Restricted Access is activated during desired times to prevent after-hours access.
Security PIN Code Protection
To prevent accidental exposure of a PIN Code or Personal ID, any character after a certain position in
the destination’s dial number will be concealed both in the LCD panel and activity report.