Secure Access

Restrict who and what they can do with your devices


black triangle

Building blocks of secure access

Does your organisation require a log in to access a network print device?

Surprisingly, many don't. Secure access features in Lexmark products ensure that only authenticated and authorised users can work with sensitive, valuable and protected information. It’s easy to configure confirmation of user identity through active directory integration, network or badge login, or even two-factor authentication. Taking advantage of such built-in technologies simplifies both deployment and enforcement of predefined user access controls. 

security-solution

Keep pretenders out with devices designed to provide unhindered access


Authentication and authorisation flexibility

Lexmark devices can be configured to validate user credentials and restrict device functions. They use Active Directory and other directory server platforms, including internal accounts, NTLM, Kerberos 5, LDAP, LDAP+GSSAPI, password, and PIN. 

Access controls

Control local and remote access to specific menus, functions and workflows on each device. Entirely disable functions like copy, print, fax, scan to e-mail, FTP, held jobs and address book. Over 50 access controls are available, providing greater flexibility for your unique environment.

Protected USB ports

Lexmark laser printers and MFPs include support for USB devices which may cause concern in environments where security is critical. Designed with security in mind, USB host ports have various mechanisms in place to keep them from being used in a malicious manner.

Auto-insertion of sender’s e-mail address

When a user authenticates in order to scan a document to e-mail, the e-mail address of the sender is automatically looked up and inserted into the “From” field. This lets the recipient clearly see that the e-mail was generated by that individual, not anonymously or from the MFP.

Incoming fax holding

Lexmark devices can be configured to hold rather than print incoming faxes during scheduled times. Incoming faxes are held securely on the hard disc until the proper credentials have been entered on the Lexmark device. Examples of credentials include a PIN, password, and user network ID and password.

Login restrictions

You can prevent unauthorised use of a device by restricting the number of consecutive failed logins—and track such events through integrated auditing. When this limit is exceeded, the device is locked for a predetermined amount of time specified by the administrator.

VIDEO

Fort Knox Hospital

[MP4 03:31]

Lexmark authentication solution helps secure patient information

Related Lexmark solutions

Lexmark Cloud Services

Reduce infrastructure, simplify device management, enhance productivity and flexibility.

Managed Print Services

Transform your print infrastructure into a platform for delivering precise information

Analyst Reports

IDC MarketSpace Report

IDC MarketScape report names Lexmark a leader in Security Solutions and Services Hardcopy