Sharp MX-B402 User Manual Page 21

  • Download
  • Add to my manuals
  • Print
  • Page
    / 50
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 20
SECURITY
Data and Information Security
Standard MFP security coupled with the optional Data Security Kit (DSK) protects and controls the major MFP
systems and subsystems (print, copy, scan, fax jobs, network settings, memory components, local user interface).
The Sharp data encryption method uses the Advanced Encryption Standard (AES) algorithm 256* bit on all data
before it is written to RAM and the hard disk drive. It also provides overwriting routines for deleted data to ensure
that all information is virtually irretrievable by unauthorized users.
Access Control Security
To limit unwanted access to each device, Sharp MFPs can utilize account codes, user/group proles, passwords,
or external user accounts contained in the local device address book or global user directory. All user credentials
are transferred using a proven combination of Kerberos, Secure Socket Layer (SSL) or Digest-MD5 encryption to
help avoid interception.
Network Security
Sharp MFPs feature an intelligent network interface that can limit access to specic computers on a network
by IP or MAC address, and selectively enable or disable any protocol or service port on each device. All
communications to and from the MFP can utilize SSL for secure transmission over the network, and most devices
also support SMB, IPv6, IPSec, 802.1x and SNMPv3.
Fax Security
The architecture of Sharp MFPs provides a logical separation between the fax telephone line and LAN. It is,
therefore, virtually impossible for attackers to gain access to the internal systems of the MFP or the local network.
Additional security features are incorporated such as disabling broadcasting, allowing and rejecting reception
from specic numbers, user authentication and more.
Document Security
Protection for sensitive documents can be assured through Sharp encrypted Adobe PDF les for scanning and
printing, or access control and encryption using SSL protocols for scanning, printing, E-mail and setup.
Audit Trail Security
Sharp’s granular audit trail and job log feature provides comprehensive auditing of all user activity. Certain
federal regulations parameters, such as “to”, “from”, “when” and “le name” can be logged, reviewed and
archived for conformance. In addition, various centralized audit trail solutions are available through Sharp
Partner Program members.
* Encryption level is varies per model.
Sharp
Security Suite
19
Page view 20
1 2 ... 16 17 18 19 20 21 22 23 24 25 26 ... 49 50

Comments to this Manuals

No comments