Information Security Articles and White Papers
Xerox Remote Control User Interface Security White PaperJuly 10, 2013
This document describes the Remote User Interface use and Security Features available on the new Xerox ConnectKey devices. The latest edition may always be viewed here
Xerox Remote Services Security White Paper v1.09
(PDF 670.8K)November 12, 2012
This document describes the system components, interoperability, and features available for securing Xerox Remote Services within Xerox products. It is intended to serve as a guide for deploying Xerox Remote Services within a network environment.
Xerox and Cisco Partnership Frequently Asked QuestionsMarch 05, 2012
Xerox has received questions about the partnership between Xerox and Cisco and the security features this will add to Xerox products. We have compiled these questions and answers into a document. It can be accessed here
ISO 27001 Security Certification
(PDF 2.4M)December 13, 2011
Xerox ISO 27001 Security Certifications
This document will detail the Xerox commitment to the ISO 27001 Security Certification, what it is, and the certification Plan-Do-Check-Act Process Model.
Xerox and Information Security
(PDF 3.3M)November 29, 2011
Information Security with Xerox Products
Protecting your data so you can focus on what matters: the success of your business or organization.
Xerox Secure Print
(PDF 582K)April 05, 2011
Do you avoid printing private or confidential documents on workgroup devices? Now you can use Xerox® Secure Print to control the print timing of any document, without worrying about security.
Internal Hard Drive File Security for Phaser Printer Models
(PDF 1.3M)June 23, 2010
This document details the types of data stored on the internal hard disk and describes how to use both the Secure File Overwrite feature and the Automatic File Deletion feature. It also contains instructions on setting security features. This document applies to a variety of Phaser models. For a complete list, see inside the document.
Xerox Secure Access Unified ID System
(PDF 2.2M)April 16, 2010
This brochure describes how Xerox devices can use your existing access control magnetic or proximity cards to allow access to Print, Copy, Scan, and Fax. Gain flexibility with Follow-You printing while also saving user time. See how your unique ID card may be able to open more than the front door.
Xerox and the P2600 Security Working Group
(PDF 359K)April 16, 2010
This document describes how Xerox has been working with the IEEE from the start to help author and comply with the P2600 Security specification. Now that the standards are written, see how this benefits our customers.
Use of CA-signed Digital Certificates for Better Security
(PDF 38.6K)March 16, 2009
This document describes a solution to prevent exploit of a vulnerability in the MD5 algorithm that can affect WorkCentre® and WorkCentre Pro® devices. This vulnerability could allow attackers to create forged X.509 certificates to use in phishing attacks or impersonating legitimate sites.