Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      Public money, private plans: MPs demand Post Office transparency

      13 June 2025

      Coal to cash: South Africa gets major boost for energy shift

      13 June 2025

      China is behind in AI chips – but for how much longer?

      13 June 2025

      Singapore soared – why can’t we? Lessons South Africa refuses to learn

      13 June 2025

      10 red flags for Apple investors

      13 June 2025
    • World

      Yahoo tries to make its mail service relevant again

      13 June 2025

      Qualcomm shows off new chip for AI smart glasses

      11 June 2025

      Trump tariffs to dim 2025 smartphone shipments

      4 June 2025

      Shrimp Jesus and the AI ad invasion

      4 June 2025

      Apple slams EU rules as ‘flawed and costly’ in major legal pushback

      2 June 2025
    • In-depth

      Grok promised bias-free chat. Then came the edits

      2 June 2025

      Digital fortress: We go inside JB5, Teraco’s giant new AI-ready data centre

      30 May 2025

      Sam Altman and Jony Ive’s big bet to out-Apple Apple

      22 May 2025

      South Africa unveils big state digital reform programme

      12 May 2025

      Is this the end of Google Search as we know it?

      12 May 2025
    • TCS

      TechCentral Nexus S0E1: Starlink, BEE and a new leader at Vodacom

      8 June 2025

      TCS+ | The future of mobile money, with MTN’s Kagiso Mothibi

      6 June 2025

      TCS+ | AI is more than hype: Workday execs unpack real human impact

      4 June 2025

      TCS | Sentiv, and the story behind the buyout of Altron Nexus

      3 June 2025

      TCS | Signal restored: Unpacking the Blue Label and Cell C turnaround

      28 May 2025
    • Opinion

      Beyond the box: why IT distribution depends on real partnerships

      2 June 2025

      South Africa’s next crisis? Being offline in an AI-driven world

      2 June 2025

      Digital giants boost South African news media – and get blamed for it

      29 May 2025

      Solar panic? The truth about SSEG, fines and municipal rules

      14 April 2025

      Data protection must be crypto industry’s top priority

      9 April 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Company News » Xerox business printers – what does benchmark security mean?

    Xerox business printers – what does benchmark security mean?

    By Bytes Document Solutions21 February 2019
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    In today’s busy offices, cybersecurity is more important than ever.

    The proliferation of advanced equipment, new business technologies, and mobile devices has vastly increased the productivity of the modern office environment. At the same time, it has introduced new risks and threat vectors that employees on all levels need to be aware of.

    Organisations that invest in Xerox technology earn more than best-in-class performance and state-of-the-art connectivity. They also enjoy the benefits of benchmark security performance through the combination of purpose-built hardware and Xerox ConnectKey software.

    Why organisations that invest in Xerox technology earn more than best-in-class performance and state-of-the-art connectivity.

    Which Xerox business printer is the most secure?

    Xerox does not scale its cybersecurity solutions. That means that purchasing a larger, more expensive multi-function device does not necessarily provide you with better security features.

    All Xerox VersaLink Printers have uniform security features through embedded ConnectKey software technology. The same industry-leading security features go into the low-cost VersaLink B400 as in the high-volume VersaLink B-7000series printers.

    Xerox includes ConnectKey software with all of its new printers and multi-function devices. This technology offers comprehensive protection for print devices in today’s bring-your-own-device (BYOD) work environment.

    Why is printer security important?

    Most office print, copy and scan devices operate on unsecured networks. In order to make installation as easy as possible, office IT personnel often skip important steps when securing new printer permissions and instead leave it in its default security state — trusting all print commands it receives, regardless of source.

    This approach makes life easy for employees, who do not like having to authenticate prints every time they need a physical document. However, it introduces a critical vulnerability in the office security network. Since print traffic is exposed, a hacker does not need to access a workstation computer to extract sensitive data — it’s all there in the print queue.

    Up to 44% of network-connected printers in offices and workplaces are insecure from this point of view. The best way to address the issue is by making benchmark security standard in the printer and multi-function device industry.

    How Xerox ConnectKey security works

    It is a well-known fact that employees tend to resent production bottlenecks, like print authentication. In the office environment, this usually takes the form of a user-specific password assigned to each employee. The problem is that employees already have dozens of passwords to remember — equipment manufacturers cannot just keep asking people to remember more passwords.

    Xerox ConnectKey uses RFID technology to authenticate prints. Using this method, employees who send print commands to a Xerox business printer only obtain the document once they are physically present at the device and scan their RFID card.

    Until RFID scan occurs, the device’s print queue is encrypted and remains securely stored on the device, away from the prying eyes of potential cybercriminals. After the device completes the print process, it securely deletes the encrypted file from its hard drive, making unauthorised recovery impossible.

    The same set of benchmark security capabilities applies to preventing unauthorised access of device firmware, and misuse of printer resources. One of the innovative security features that ConnectKey offers is the ability for each printer to verify its own firmware on start up. This allows process owners to catch and quarantine printer-installed malware before it threatens the integrity of the entire business enterprise.

    Xerox business printer security in action

    For an example of how ConnectKey security works, consider an employee printing customer invoices. These invoices contain sensitive information, including customer financial data and personal information including names and addresses. A cybercriminal could use this information to compromise customer security and it would be the organisation’s fault.

    If the customer invoice is located on the employee’s smartphone, most printer systems would have to accept all incoming traffic in order to print the document. If the organisation in question does not have a robust BYOD policy, it is only a matter of time before someone sees sensitive, unprotected traffic on the network.

    However, with a Xerox VersaLink business printer, employees can securely print from their mobile devices using the included RFID scanning system to authenticate print orders. The documents would remain securely encrypted on the device’s hard drive until authentication occurs — at which point the employee can pick up the invoice and send it onwards.

    An additional benefit of this approach is that Xerox multi-function devices eliminate print-room bottlenecks. By associating each print order with an RFID scan, employees rarely have to wait for other print orders to finish. The printer is no longer a first-come-first-serve device, but a secure business productivity solution.

    Altron Bytes Document Solutions
    Altron Bytes Document Solutions (Altron BDS) is Africa’s leading document management technology and services company and the largest Xerox distributor in the world. It is the authorised Xerox distributor in 26 sub-Saharan countries offering the complete range of Xerox document equipment, software solutions and services. BDS forms part of JSE listed Altron.

    • This promoted content may have been paid for by the party concerned


    Altron BDS Bytes Document Solutions Xerox
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleSamsung unveils Galaxy S10 Series
    Next Article SA crypto firm Coindirect raises R16-million in funding

    Related Posts

    5 simple steps to problem solving

    12 February 2025

    Xerox named ‘sustainability leader’ for third year running

    24 January 2025

    5 annoying ways to get document security wrong

    18 January 2024
    Company News

    Huawei Watch Fit 4 Series: smarter sensors, sharper design, stronger performance

    13 June 2025

    Change Logic and BankservAfrica set new benchmark with PayShap roll-out

    13 June 2025

    SAPHILA 2025 – transcending with purpose, connection and AI-powered vision

    13 June 2025
    Opinion

    Beyond the box: why IT distribution depends on real partnerships

    2 June 2025

    South Africa’s next crisis? Being offline in an AI-driven world

    2 June 2025

    Digital giants boost South African news media – and get blamed for it

    29 May 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.