Xerox C3545 Copier User Manual


 
10
EVALUATOR GUIDE FOR COPYCENTRE C2128 • C2636 • C3545 / WORKCENTRE PRO C2128 • C2636 • C3545
What type of security requirements does your office require? Does the device have the security features
to meet this demand? Can the device access be protected by a password? Does the device remove latent
images
on disk drives and in memory? Does the service provider have bonded service personal?
Both CopyCentre C2128/C2636/C3545 and WorkCentre C2128/C2636/C3545 protect your investment
with device access passwords and an internal auditron to control usage and access to device features.
Network Authentication restricts access to scan, e-mail and fax features by validating network user
names and passwords prior to the use of these network features. It allows identification of user with
their scan, no anonymous sending.
With the optional WorkCentre Pro Network Accounting feature, you control access and track usage
on a centralized basis. You can get up-to-date information on how the WorkCentre Pro device is being
used by account and user, including time and date of the activity. This solution requires integration
with an accounting server available through one of the Xerox Partners.
Confidentiality of your sensitive business information is maintained with an optional image overwrite
security feature that electronically erases data that had been processed to the hard disk in print, copy,
scan, internet fax and server fax modes. This option eliminates data as a part of routine job processing.
The Foreign Device Interface Kit controls device access and accounting via magnetic card readers,
coin devices, and third-party accounting solutions.
HOW XEROX COPYCENTRE C2128/C2636/C3545 AND WORKCENTRE
PRO C2128/C2636/C3545 EXCEED THE SECURITY REQUIREMENT
EVALUATE SECURITY CAPABILITIES
EVALUATE
ADVA NTA GE
XEROX