Lexmark Range Brochure 2020

Lexmark Security as—credentials, names, e-mail addresses and fax numbers—is encrypted. AuthenticationandAuthorisation: Youcan restrict device functions so that users must authenticate prior to accessing them. You can also configure the device to authenticate and authorise users against internal accounts, passwords and/or PINs—and against a corporate directory via NTLM, Kerberos 5, LDAP and/or LDAP+GSSAPI. These authentication methods are secure over an SSL channel and are compatible with Active Directory and other directory-server platforms. Active Directory: Support for Active Directory can be found on many of our easy-to-use touch screens, allowing you to manage efficiently your security loads on a device. Your Active Directory authentication is provided by Kerberos and authorisation is provided by LDAP+GSSAPI. Auto-Insertion of Sender’s Email Address: No more anonymous emails—recipients can now validate the sender. When a user authenticates in order to scan a document to email, the email address of the sender is automatically identified and inserted into the From field. Security Templates: As a device administrator, you can use security templates to help restrict access. The templates appear in the Access Control drop- down menu, providing more control over important security settings. AccessControls: Withmorethan50AccessControls, choose from a list of available security templates to control local and remote access to specific menus, functions and workflows, even disable functions entirely. Login Restrictions: You can prevent unauthorised use of a device by restricting the number of consecutive failed logins. Operator Panel Lock: The Operator Panel Lock feature allows a device to be locked so that the operator panel cannot be accessed for operations or configuration. If the device has a hard disk, incoming print and fax jobs are stored on the hard disk instead of being printed. When you enter an authorised user’s credentials, the device unlocks and normal operation resumes, printing any held jobs. Confidential Print: Print jobs are held in RAM or on the hard disk until the intended recipient enters the appropriate PIN and releases the job for printing. You can set held jobs to expire after an elapsed time—from one hour to one week. Plus, you can limit the number of times a PIN can be entered incorrectly before the job is purged. PrintCryption Card: The Lexmark PrintCryption™ Application Solution brings strengthened security to your corporate environment by protecting sensitive information as it is printed via encryption and decryption capabilities on your network devices. This level of printing security is ideal for businesses handling highly confidential, personnel, financial, medical, technical or proprietary business information. Incoming Fax Holding: Lexmark devices can be configured to hold, rather than print, incoming faxes during scheduled times. Incoming faxes are held securely on the hard disk until the proper credentials have been entered on the Lexmark device. LexmarkContactandContactlessAuthentication Device: it provides enhanced control access to network printers and MFP’s with secure authentication at print release. 97

RkJQdWJsaXNoZXIy MjA0NzY=