Canon IMAGE RUNNER 5050 Bedienungsanleitung Seite 9

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 12
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 8
D
ocument Security
> Encrypted Secured Print
> Watermark/Secure Watermark
> Copy Set Numbering
> Encrypted PDF
> FAX Forwarding
> FAX Destination Confirmation
M
ail Server Security
> POP Authentication before SMTP
> SMTP Authentication
N
etwork Security
> MAC Address Filtering
> IP Address Filtering
> SSL Encryption
> Network Application On/Off
> USB Block
> Destination Restriction
HDD Security
>
HDD Data Erase
>
HDD Data Encryption
>
HDD Format
>
Mail Box Password
Protection
>
Job Log Conceal
Device Access Security
> Department ID (up to 1000 IDs)
> User Authentication (SDL/SSO)
> Access Management System
> Control Card/Card Reader system
> Smart Card Authentication
Device Management
> DIDF (Device Information Delivery Function)
> imageWARE Enterprise Management
Internet
Digital Signature PDF
D
ata Security
Protect your imageRUNNER 5050N device with advanced
features that guard against unauthorized data access. To protect
your stored, scanned, and printed data, the HDD Data Erase
Kit automatically overwrites previously stored data. The HDD
Data Encryption option provides additional security by
encrypting data before it’s written to the hard disk drive and
has achieved EAL3 Common Criteria (CC) certification.
N
etwork Security
The imageRUNNER 5050N model includes powerful features
to help guard against unauthorized access to the device
through network ports or IP/MAC address and range restrictions.
In addition, the device supports IPv6 for enhanced network
infrastructure management.
Document Security
Prevent impersonation or interception of
information with Digital Device Signature and
Digital User Signature options, which verify
a document’s source and its sender.
Documents also can be password-protected
with 128-bit AES encryption using the
Encrypted PDF option and securely printed
over the network through the Encrypted
Secured Print option. You can even embed
secure watermarks that appear when
unauthorized copies are made to help
prevent leaks of confidential information.
Protect Critical Information
Powerful Security Features
Device Management
and Security Overview
Seitenansicht 8
1 2 3 4 5 6 7 8 9 10 11 12

Kommentare zu diesen Handbüchern

Keine Kommentare