Building blocks of secure access

Does your organisation require a log in to access a network print device?

Surprisingly, many don't. Secure access features in Lexmark products ensure that only authenticated and authorised users can work with sensitive, valuable and protected information. It’s easy to configure confirmation of user identity through active directory integration, network or badge login, or even two-factor authentication. Taking advantage of such built-in technologies simplifies both deployment and enforcement of predefined user access controls. 

Keep pretenders out with devices designed to provide unhindered access

  • Authentication and authorisation flexibility
  • User and group security
  • Access controls
  • Security templates
  • Protected USB ports
  • Auto-insertion of sender’s email address
  • Login restrictions
  • Operator Panel Lock
  • Incoming fax holding

 

Authentication and authorisation flexibility

Lexmark devices can be configured to validate user credentials and restrict device functions. They use Active Directory and other directory server platforms, including internal accounts, NTLM, Kerberos 5, LDAP, LDAP+GSSAPI, password, and PIN. 

Access controls

Control local and remote access to specific menus, functions and workflows on each device. Entirely disable functions like copy, print, fax, scan to email, FTP, held jobs and address book. Over 50 access controls are available, providing greater flexibility for your unique environment.

Protected USB ports

Lexmark laser printers and MFPs include support for USB devices which may cause concern in environments where security is critical. Designed with security in mind, USB host ports have various mechanisms in place to keep them from being used in a malicious manner.

Auto-insertion of sender’s email address

When a user authenticates in order to scan a document to email, the email address of the sender is automatically looked up and inserted into the “From” field. This lets the recipient clearly see that the email was generated by that individual, not anonymously or from the MFP.

Incoming fax holding

Lexmark devices can be configured to hold rather than print incoming faxes during scheduled times. Incoming faxes are held securely on the hard disk until the proper credentials have been entered on the Lexmark device. Examples of credentials include a PIN, password, and user network ID and password.

Login restrictions

You can prevent unauthorised use of a device by restricting the number of consecutive failed logins — and track such events through integrated auditing. When this limit is exceeded, the device is locked for a predetermined amount of time specified by the administrator.