Information Security Articles and White Papers
Multinational FreeFlow Core 40 Security Guides
(zip archive 1.6M)November 05, 2014
These Guides cover:
France (and Canada/French)
Netherlands, Belgium (Dutch)
UnZIP the file and choose the desired language.
User Guide For FFPS Software Update Manager Oct 2014 v1.0
(PDF 941.5K)November 04, 2014
Shellshock Security Patch for X86
Guide for Using the FFPS Update Manager
On Sept 25th, media sources announced security vulnerabilities in the Bash shell software (aka Shellshock). Understandably, Xerox customers are concerned about these vulnerabilities.
Unix and Unix-derived systems like Linux and Mac OS X are vulnerable to these attacks since they use Bash as the default command shell. The FreeFlow Print Server (FFPS) includes the Solaris Operating System, which is potentially affected since it includes the Bash shell.
A document addressing this vulnerability and describing a tool for updating FreeFlow Print Server has been posted to the URL www.xerox.com/security.
Xerox Remote Services Security White Paper v1.0.10
(PDF 841.4K)July 08, 2014
NOTE: This updated document describes the system components, interoperability, and features available for securing Xerox Remote Services within Xerox products. It is intended to serve as a guide for deploying Xerox Remote Services within a network environment.
Microsoft Windows XP End of Support: What You Need to Know V1.0
(PDF 90.6K)April 04, 2014
IMPORTANT SUPPORT INFORMATION
This document details the Xerox Products affected by both the End Of Life of Microsoft Windows XP on standalone Digital Front Ends (EFI FIERY AND CREO) and Microsoft Windows XPe (XP embedded) controllers on CF devices.
Xerox Remote Control User Interface Security White PaperJuly 10, 2013
This document describes the Remote User Interface use and Security Features available on the new Xerox ConnectKey devices. The latest edition may always be viewed here
Xerox and Cisco Partnership Frequently Asked QuestionsMarch 05, 2012
Xerox has received questions about the partnership between Xerox and Cisco and the security features this will add to Xerox products. We have compiled these questions and answers into a document. It can be accessed here
ISO 27001 Security Certification
(PDF 2.4M)December 13, 2011
Xerox ISO 27001 Security Certifications
This document will detail the Xerox commitment to the ISO 27001 Security Certification, what it is, and the certification Plan-Do-Check-Act Process Model.
Xerox and Information Security
(PDF 3.3M)November 29, 2011
Information Security with Xerox Products
Protecting your data so you can focus on what matters: the success of your business or organization.
Xerox Secure Print
(PDF 582K)April 05, 2011
Do you avoid printing private or confidential documents on workgroup devices? Now you can use Xerox® Secure Print to control the print timing of any document, without worrying about security.
Internal Hard Drive File Security for Phaser Printer Models
(PDF 1.3M)June 23, 2010
This document details the types of data stored on the internal hard disk and describes how to use both the Secure File Overwrite feature and the Automatic File Deletion feature. It also contains instructions on setting security features. This document applies to a variety of Phaser models. For a complete list, see inside the document.
Xerox Secure Access Unified ID System
(PDF 2.2M)April 16, 2010
This brochure describes how Xerox devices can use your existing access control magnetic or proximity cards to allow access to Print, Copy, Scan, and Fax. Gain flexibility with Follow-You printing while also saving user time. See how your unique ID card may be able to open more than the front door.
Xerox and the P2600 Security Working Group
(PDF 359K)April 16, 2010
This document describes how Xerox has been working with the IEEE from the start to help author and comply with the P2600 Security specification. Now that the standards are written, see how this benefits our customers.
Use of CA-signed Digital Certificates for Better Security
(PDF 38.6K)March 16, 2009
This document describes a solution to prevent exploit of a vulnerability in the MD5 algorithm that can affect WorkCentre® and WorkCentre Pro® devices. This vulnerability could allow attackers to create forged X.509 certificates to use in phishing attacks or impersonating legitimate sites.