Product Security Guides: How can they help you?
Do you have questions about how Xerox products protect data at rest/in motion or what secure protocols are supported by a particular device? These are of course only a few security related questions you may have surrounding the security functions/features of a Xerox product. It is important to know however, that you are not alone. Many organizations are becoming increasingly Cyber Security conscious and are wanting to know more about how they can leverage available security options to secure their networked devices. So where can information like this be found?
In order to provide you with a stress free way to get security related information for specific Xerox products, we have introduced the Security Guide for Xerox products which has combined the Information Assurance Disclosure (IAD) and the Statement of Volatility (SOV) documents. The Security Guide expands on the security information normally found in the IAD and SOV. It is a comprehensive, security focused document and should be the first stop when there are questions regarding the security functions/features of a Xerox product. In addition, products that are Common Criteria Certified also have Secure Operation and Installation Guides which can be used as a reference for suggested secure configurations.
Note that older products may only have an IAD but many newer products such as the XeroxÂ® AltaLinkÂ® have a Security Guide. To access available Security Guides for your product, select your Product Platform (e.g., AltaLink) and model (e.g., C8030) from the Product Security Page. Here is an example of a Security Guide and a Secure Installation and Operation Guide.