Restrict who and what they can do with your devices
Does your organization require a log in to access a network print device?
Surprisingly, many don't. Secure access features in Lexmark products ensure that only authenticated and authorized users can work with sensitive, valuable and protected information. It’s easy to configure confirmation of user identity through active directory integration, network or badge login, or even two-factor authentication. Taking advantage of such built-in technologies simplifies both deployment and enforcement of predefined user access controls.
Lexmark devices can be configured to validate user credentials and restrict device functions. They use Active Directory and other directory server platforms, including internal accounts, NTLM, Kerberos 5, LDAP, LDAP+GSSAPI, password, and PIN.
Control local and remote access to specific menus, functions and workflows on each device. Entirely disable functions like copy, print, fax, scan to email, FTP, held jobs and address book. Over 50 access controls are available, providing greater flexibility for your unique environment.
Lexmark laser printers and MFPs include support for USB devices which may cause concern in environments where security is critical. Designed with security in mind, USB host ports have various mechanisms in place to keep them from being used in a malicious manner.
When a user authenticates in order to scan a document to email, the email address of the sender is automatically looked up and inserted into the “From” field. This lets the recipient clearly see that the email was generated by that individual, not anonymously or from the MFP.
Lexmark devices can be configured to hold rather than print incoming faxes during scheduled times. Incoming faxes are held securely on the hard disk until the proper credentials have been entered on the Lexmark device. Examples of credentials include a PIN, password, and user network ID and password.
You can prevent unauthorized use of a device by restricting the number of consecutive failed logins—and track such events through integrated auditing. When this limit is exceeded, the device is locked for a predetermined amount of time specified by the administrator.
VIDEO
[MP4 03:31]
Lexmark authentication solution helps secure patient information
Analyst Reports
IDC MarketScape report names Lexmark a leader in Security Solutions and Services Hardcopy
This site uses cookies for various purposes including enhancing your experience, analytics, and ads. By continuing to browse this site or by clicking "Accept and close", you agree to our use of cookies. For more information, read our Cookies page.