Skip to main content Click to view our Accessibility Statement or contact us with accessibility-related questions.
 The word "security" with a padlock icon

State-of-the-Art Printer and Data Security

Exceeds industry standards for security features and technologies

Xerox ConnectKey Technology – A Comprehensive Approach to Printer Security YouTube Video

Security is a top priority for us, and we know it is for your business, too. That’s why every Xerox® ConnectKey® Technology-enabled device is armed with our holistic four-point approach to security, ensuring comprehensive, all-encompassing protection for all system components and points of vulnerability.

Security Features

1. Prevent

A comprehensive set of capabilities prevents malicious attacks, proliferation of malware, and misuse of unauthorised access to the printer. Whether from transmitted data or directly at the MFP, all access points are protected through user authentication and access controls.

2. Detect

A comprehensive Firmware Verification test, either at start-up* or when activated by authorized users, provides alerts if any harmful changes to the printer have been detected. McAfee® Whitelisting** technology constantly monitors for and automatically prevents any malicious malware from running. Integration with Cisco® Identity Services Engine (ISE) auto-detects Xerox® devices on the network and classifies them as printers for security policy implementation and compliance. By interacting with the market-leading McAfee® DXL and Cisco® pxGrid platforms, Xerox multifunction printers (MFPs) employ an orchestrated response that neutralizes threats at their source the moment they occur.

*VersaLink devices **AltaLink and iSeries

3. Protect

Capabilities prevent intentional or unintentional transmission of critical data to unauthorised parties. Documents are not released until the right user is at the device and scanned information is protected from unauthorised users. Xerox also protects stored information, using the highest levels of encryption. Processed or stored data that is no longer required can be deleted using National Institute of Standards and Technology (NIST) and U.S. Department of Defense approved data clearing and sanitisation algorithms.

4. External partnerships

ConnectKey Technology provides extra security standards through our partnerships with McAfee®* and Cisco®. We measure our performance against international standards with certifications like Common Criteria and FIPS 140-2 to ensure our devices are trusted in even the most secure environments.

*AltaLink devices

ConnectKey Technology

Mobile and cloud ready

Mobile and Cloud Ready

Benchmark printer security
Managed Print Services

Managed Print Services

Customized Apps

Customised Apps

Product and Data Security Solutions at Xerox

Security is critical to every business, and we take it seriously at Xerox. 

VersaLink C405 user interface

VersaLink® C405

Work the way you want, from any device, with multilevel security and connectivity to and from both the cloud and network-based locations.

ConnectKey in Action

Man in a business suit using a tablet, with a suitcase behind him. Overlaid with an icon of a printer, smartphone and cloud.

Print from the cloud

See how Robert downloads, scans, prints, shares, and translates docs from his mobile device to the MFP.

Finger typing on the ConnectKey user interface, overlaid with an icon indicating a touchscreen

Use apps for tasks

See how a bank replaces time-intensive manual tasks with custom apps that speed processes.

Nurse using a tablet

Create electronic documents

Read about how a hospital converts hard-copy records to digital and accesses them from the cloud.

Share