Skip to main contentClick to view our Accessibility Statement or contact us with accessibility-related questions.
 The word "security" with a padlock icon

Comprehensive Approach to Printer Security

Supporting Zero Trust Security to Protect Printers and Data

Security for People Who Aren't Wired for Constant Data Protection YouTube Video

Security is a top priority for us, and we know it is for your business, too. That’s why every Xerox® ConnectKey® Technology-enabled device is armed with our holistic four-point approach to security, ensuring comprehensive, all-encompassing protection for all system components and points of vulnerability.

Security Features

1. Prevent

A comprehensive set of capabilities prevents malicious attacks, proliferation of malware, and misuse of unauthorized access to the printer. Whether from transmitted data or directly at the MFP, all access points are protected through user authentication and access controls.

2. Detect

A comprehensive Firmware Verification test, either at start-up* or when activated by authorized users, provides alerts if any harmful changes to the printer have been detected. Trellix Whitelisting** technology constantly monitors for and automatically prevents any malicious malware from running. Integration with Cisco® Identity Services Engine (ISE) auto-detects Xerox® devices on the network and classifies them as printers for security policy implementation and compliance. By interacting with the market-leading Trellix DXL and Cisco® pxGrid platforms, Xerox multifunction printers (MFPs) employ an orchestrated response that neutralizes threats at their source the moment they occur.

*VersaLink devices **AltaLink, VersaLink 7100 Series, EC7800/8000 Series, and iSeries MFPs

3. Protect

Capabilities prevent intentional or unintentional transmission of critical data to unauthorized parties. Documents are not released until the right user is at the device and scanned information is protected from unauthorized users. Xerox also protects stored information, using the highest levels of encryption. Processed or stored data that is no longer required can be deleted using National Institute of Standards and Technology (NIST) and U.S. Department of Defense approved data clearing and sanitization algorithms.

4. External partnerships

ConnectKey Technology provides extra security standards through our partnerships with Trellix* and Cisco®. We measure our performance against international standards with certifications like Common Criteria and FIPS 140-2 to ensure our devices are trusted in even the most secure environments.

*AltaLink devices


* Trellix was formerly known as McAfee

City skyline at night, reflected on water

Product and Data Security Solutions at Xerox

Security is critical to every business, and we take it seriously at Xerox.

Fingers typing on a keyboard, overlaid with security lock icons

Zero Trust Security for Printers

Cybercrime has reached unprecedented levels globally, and is expected to continue growing. Organizations need new strategies and best practices to defend against these threats.

ConnectKey in Action

Man in a business suit using a tablet, with a suitcase behind him. Overlaid with an icon of a printer, smartphone and cloud.

Print from the cloud

See how Robert downloads, scans, prints, shares, and translates docs from his mobile device to the MFP.

Finger typing on the ConnectKey user interface, overlaid with an icon indicating a touchscreen

Use apps for tasks

See how a bank replaces time-intensive manual tasks with custom apps that speed processes.

Nurse using a tablet

Creating E-Documents

Read about how a hospital converts hard-copy records to digital and accesses them from the cloud.

ConnectKey Technology

Icon representing a tablet
Icon representing a cycle of printer, smartphone, cloud
Benchmark printer security - padlock icon
Managed Print Services icon showing a stack of papers, phone, and wifi signal
Icon representing apps on a smart device

Share