Secure Access

Restrict who and what they can do with your devices


black triangle

Building blocks of secure access

Does your organization require a log in to access a network print device?

Surprisingly, many don't. Secure access features in Lexmark products ensure that only authenticated and authorized users can work with sensitive, valuable and protected information. It’s easy to configure confirmation of user identity through active directory integration, network or badge login, or even two-factor authentication. Taking advantage of such built-in technologies simplifies both deployment and enforcement of predefined user access controls. 

security-solution

Keep pretenders out with devices designed to provide unhindered access


Authentication and authorization flexibility

Lexmark devices can be configured to validate user credentials and restrict device functions. They use Active Directory and other directory server platforms, including internal accounts, NTLM, Kerberos 5, LDAP, LDAP+GSSAPI, password, and PIN. 

Access controls

Control local and remote access to specific menus, functions and workflows on each device. Entirely disable functions like copy, print, fax, scan to email, FTP, held jobs and address book. Over 50 access controls are available, providing greater flexibility for your unique environment.

Protected USB ports

Lexmark laser printers and MFPs include support for USB devices which may cause concern in environments where security is critical. Designed with security in mind, USB host ports have various mechanisms in place to keep them from being used in a malicious manner.

Auto-insertion of sender’s email address

When a user authenticates in order to scan a document to email, the email address of the sender is automatically looked up and inserted into the “From” field. This lets the recipient clearly see that the email was generated by that individual, not anonymously or from the MFP.

Incoming fax holding

Lexmark devices can be configured to hold rather than print incoming faxes during scheduled times. Incoming faxes are held securely on the hard disk until the proper credentials have been entered on the Lexmark device. Examples of credentials include a PIN, password, and user network ID and password.

Login restrictions

You can prevent unauthorized use of a device by restricting the number of consecutive failed logins—and track such events through integrated auditing. When this limit is exceeded, the device is locked for a predetermined amount of time specified by the administrator.

VIDEO

Fort Knox Hospital

[MP4 03:31]

Lexmark authentication solution helps secure patient information

Related Lexmark solutions

Lexmark Cloud Services

Reduce infrastructure, simplify device management, enhance productivity and flexibility.

Lexmark Secure Document Monitor

Lexmark Secure Document Monitor discreetly monitors printed, copied, scanned or faxed hardcopy data.

Managed Print Services

Transform your print infrastructure into a platform for delivering precise information

Related Links