Skip to main content Click to view our Accessibility Statement or contact us with accessibility-related questions.
Laptop screen showing AltaLink user interface

Lock Down Printers With McAfee Embedded Control Technology

Xerox-McAfee solutions provide unrivaled security

Botnets. Advanced persistent threats (APTs). Zero-day attacks. Today’s security threats are sophisticated. That’s why you need advanced, innovative technology to protect your organization’s IT network. Printers and MFPs – complex embedded systems – are as vulnerable as any other endpoint.

Xerox print devices have been engineered with security in mind. Think disk encryption and overwrite, encrypted protocols like SSL and IPsec, audit logs and user authentication. But we’ve raised the bar even higher by partnering with McAfee, one of the world’s leading cybersecurity companies.

Xerox’s AltaLink®, iSeries and WorkCentre® EC7836/EC7856 multifunction printers come bundled with McAfee Embedded Control software, so you can rest easy knowing that your MFPs, and any data associated with them, are safe and secure.

By augmenting our embedded security technologies with the market-leading McAfee® Data Exchange Layer (DXL) and Cisco® Platform Exchange Grid (pxGrid) platforms, Xerox® MFPs* can provide insight into access and threats, implement enterprise security policies and address threats in real time.

Whitelisting. Traditional security technologies, such as antivirus, offer limited protection against today’s breed of threats. With whitelisting, Xerox predefines a list of trusted applications and functions that can run on an MFP; nothing else is allowed to execute. The whitelisting software constantly monitors for and detects change attempts in real time, preventing corruption of a device’s existing software or installation of malware. Thanks to McAfee Embedded Control whitelisting technology, your security risk goes down and system availability increases.

Alerts and audit logs. With McAfee Embedded Control, you’ll never be left in the dark. Any attempt to change applications or perform a blocked activity triggers an e-mail alert to the system administrator. What’s more, tracking those attempts is easy. Audit logs provide information about who used a device, as well as when and how they used it. Administrators can also see which files the whitelisting technology prevented from executing.

Easy Management. Xerox-McAfee security solutions give you flexibility and simplicity when it comes to managing your print devices. Xerox CentreWare Web, an HTTP server application that resides on the printer, allows administrators to modify device settings from their computers. With Xerox CentreWare Web and Xerox Device Manager, admins can install, configure, manage, monitor and report on both networked and locally connected print devices, regardless of device brand.

And Xerox is the only printer manufacturer with an extension for McAfee’s ePolicy Orchestrator (ePO), which allows IT admins to unify security management across networks, endpoints, data, and compliance solutions from McAfee and third parties. McAfee ePO is easy to use, with drag-and-drop dashboards, and lets organizations leverage their existing IT infrastructures.

Read more about McAfee Embedded Control technology: Xerox® Next Generation Security: Partnering with McAfee®

Don’t put your printer network at risk. Deploy security solutions from Xerox and McAfee today.

OEM Innovator of the Year 2018

McAfee logo: McAfee - Together is power.

Xerox was named OEM Innovator of the Year at the McAfee Americas Partner Summit.

xerox security summit video mcafee

Automating information security is a quandary many organizations face.

Candace Worley from McAfee explains why organizations should embrace automation for information security.

 The word "security" with a padlock icon

State-of-the-Art Printer and Data Security

Trust ConnectKey comprehensive security to protect your confidential data and documents. 

comprehensive security management image

Comprehensive Security Management Must Include Multifunction Printers

One challenge of comprehensive, unified security is the complexity of it. The true value comes from unified security management across endpoints, networks and data.