Ricoh Aficio SP C231N Features Manual

Security features guide
Hide thumbs Also See for Aficio SP C231N:

Advertisement

Ricoh Aficio Common Security Features Guide
SECURITY SOLUTIONS
Color Multifunction Devices
Black & White Multifunction Devices

Color Printers

Black & White Printers
Super G3 Facsimiles
Maintaining data security in
networked environments for
ultimate customer peace of mind
Version 11

Advertisement

Table of Contents
loading

Summary of Contents for Ricoh Aficio SP C231N

  • Page 1: Color Printers

    Ricoh Aficio Common Security Features Guide SECURITY SOLUTIONS Color Multifunction Devices Black & White Multifunction Devices Color Printers Black & White Printers Super G3 Facsimiles Maintaining data security in networked environments for ultimate customer peace of mind Version 11...
  • Page 2: Table Of Contents

    T A B L E O F C O N T E N T S Introduction.....................................1 Information is an Asset ..............................1 Risk Levels..................................4 Ricoh Aficio Security Solutions Compatibility Chart ......................4 Ricoh Security Solutions Review..............................6 Network Protection................................6 Web Image Monitor..............................6 SmartDeviceMonitor..............................6 Network Protocol ON/OFF ............................7...
  • Page 3 Specifications subject to change without notice. ©2009, Ricoh Americas Corporation. This guide is intended solely for the use and information of Ricoh Americas Corporation, its designated agents, and their employees. The information in this guide was obtained from several different sources that are deemed reliable by all industry standards.
  • Page 4: Introduction

    Ricoh Aficio Common Security Features Guide I N T R O D U C T I O N Information is an Asset Did you know that 90% of all corporate espionage is conducted by someone within the organization, a trusted employee in or near a position of power with seemingly impeccable credentials? Motives range from monetary gain to emotional revenge but the result is the same: information a company deems classified or personal is used against it in an effort to disrupt business.
  • Page 5 Perhaps you’ve read the John Grisham novel The Firm, or have seen the movie by the same title. In it, the trusted attorney turns against his employers. He circumvents the modest document security features by having an assistant copy legal files after hours by means of stolen magnetic swipe cards that are used to track and bill clients for chargeback purposes.
  • Page 6 As you can see the need to protect data is not just for personal or even business interests, it's the law. As you'll learn, the entire family of Ricoh office solutions is equipped with a mix of features and capabilities that assist in compliance with...
  • Page 7: Risk Levels

    Risk Levels Every company is different and their exposure to all types of security threats will vary based on the nature of their business and the sensitivity of the information that is processed. Further, the location and configuration of a specific device will also impact the appropriate level of security. Non-networked devices, for example, may only require local (internal) user authentication whereas networked peripherals will demand more robust login (external) controls.
  • Page 8 How can your customers be sure? What if the device is to be relocated elsewhere in the company, or returned at end-of-lease? To address these and other concerns, Ricoh equips its products with an array of standard and optional features to limit device access, track usage, and protect confidential information stored in memory.
  • Page 9: Ricoh Security Solutions Review

    Web Image Monitor and SmartDeviceMonitor, the two installation and monitoring utilities that ship standard with every Ricoh Aficio device. Much of the functionality of these utilities is covered in the Ricoh Aficio Common Features Guide: Solution Selection Guide. However, their security-related features are reviewed here.
  • Page 10: Network Protocol On/Off

    Tool. This activates a menu for review of the peripherals authorized for use by User Code and User Name. All Ricoh-supported peripherals on the network are listed, and a simple click on the device accesses a menu that restricts or enables access to the device for individual users. In this way adminis- trators can block Marketing users from accessing the Human Resources MFP hard drive, for example.
  • Page 11: User Authentication

    No one without a valid user name/password can access the machine. ■ User Code Authentication: Utilizes Ricoh’s standard User Code system to authenticate the user. The opera- tor simply enters their User Code, which is compared to the registered data in the device’s address book.
  • Page 12: Common Access Card (Cac) Authentication

    Directive requires that all federal employees and contractors enhance security efficiently by reducing identity fraud through increased protection of personal privacy. The only customers for Ricoh’s CAC Authentication Solution is the U.S. Department of Defense (DoD) [US Army, Navy Air Force, Marines, Coast Guard and affiliated agencies].
  • Page 13: User Account Registration

    User Account Registration (User Account Enhance Unit) Most Ricoh devices allow customers to register up to 30 user accounts to track and limit user access. Installing the optional User Account Enhance Unit increases capacity to a maximum of 500 accounts to monitor device usage and restrict larger populations’...
  • Page 14: Data Encryption

    Without protection, intelligible information can easily be stolen, or modified/falsified and re-inserted back into the network. Ricoh Aficio devices are equipped with the following encryption capabilities to reduce these risks.
  • Page 15: Address Book Encryption

    That’s where Ricoh’s Encrypted PDF Transmission function adds value, scrambling and encrypting the data that would otherwise be a very transparent document during transmission.
  • Page 16: Driver Encryption Key

    Ricoh Aficio Common Security Features Guide Driver Encryption Key Ricoh devices offer this feature that scrambles user authentication passwords when using the PCL or RPCS drivers so others cannot access the system fraudulently using a stolen user’s password. PDF Password Encryption This function corrects a vulnerability in Encrypted PDF Transmission in that the window for entering the user password displays the password in clear text.
  • Page 17: Hard Disk (Hdd) Encryption

    Ricoh devices offer a number of features that safeguard information until the owner decides to retrieve or delete it.
  • Page 18: Locked Print/Secure Print

    Ricoh currently offers several types of DOSS systems for use with different devices and hard disk drive sizes, ranging from Type A, B, C, D, F, H & I and achieved ISO 15408 Common Criteria Certification, a recognized worldwide standard that defines security requirements and establishes procedures for evaluating the security of IT systems and software.
  • Page 19: Smartdevicemonitor (For Admin)

    4 – 8 digits directly at the control panel to prevent other users from viewing, printing, or sending the file. In Ricoh MFPs equipped with Preview capabilities (pictured at right) documents assigned a password display a key icon instead of an image of the first page of the document to preserve confidentiality.
  • Page 20: Ram-Based Security

    RPCS driver can be embedded with a special message that instructs the scanners of other Ricoh devices not to copy, scan, or send the page. Instead, page content is either grayed out, or overprinted with one of 10 possible obscuring patterns and/or a customized text message to deter illegal copying.
  • Page 21: Commercial Facsimile Security Solutions

    MFP with fax capability. The answer is NO. A Ricoh standalone fax, network fax or MFP with fax uses only a Class 1 modem that only controls fax transmission/reception. Regardless if fax is part of a network fax or an MFP connected to a network, the modem is physically separated from the main processor or any other network port.
  • Page 22: Closed Network

    IP-fax When the NIC FAX Unit is installed Ricoh facsimile systems support secure T.38 real-time IP-fax over a corporate Intranet. This not only bypasses costly phone lines, but also operates behind the firewall for secure point-to-point transmissions.
  • Page 23: Server Domain Authentication

    The machine will disconnect if the last four or eight digits of the dialed number do not match the CSI on the receiving machine. Fax Security Compatibility Table The following chart outlines the current Ricoh facsimile product line and those fax security features that are available with each product. Commercial Facsimile Security Features Super G3 Facsimile ■...
  • Page 24: Security Solution Compatibility Tables

    Ricoh Aficio Common Security Features Guide Ricoh Security Solutions ompatibility harts Network Data Document Protection Device Access Encryption Protection Color Multifunction...
  • Page 25 Network Data Document Protection Device Access Encryption Protection Black & White Multifunction...
  • Page 26 Ricoh Aficio Common Security Features Guide Network Data Document Protection Device Access Encryption Protection Black & White Multifunction (continued)
  • Page 27 Network Data Document Protection Device Access Encryption Protection Color Printers Black & White Printers...

Table of Contents