Touch state-of-the-art security and management, Security and management, Solution case study – Konica Minolta BIZHUB C220 User Manual

Page 6

Advertising
background image

6

IEEE802.1X Compatibility Active Directory Coordination External-server Authentication

POP before SMTP

NDS Authentication over TCP/IP IP Filtering

A variety of advanced authentication methods prevents unauthorised access and information leakage.

Biometric Finger-Vein Authentication*

Our original innovative finger vein identification makes forged access
virtually impossible. Easy use and precision technology ensure critical
information safety.

* Requires optional Authentication Unit AU-102.

Non-Contact IC Card Authentication*

This non-contact IC smart card system grants access with a single touch.
It can be used with your existing ID card system, so updating information
is easily manageable.

* Requires optional Authentication Unit AU-201.

Users must painstakingly enter ID and

password, while administrators must make

extra effort to manually set passwords.

ID and password entry is unnecessary. Existing

employee IC cards can be used, and updating

information is easily manageable.

By scanning each user’s unique finger vein pattern,

the Biometric Reader eliminates need for passwords

and ensures accurate identification.

There is a risk of stolen and leaked passwords.

Each user must have a card of his/her own. There

is a risk of card loss or unauthorised card lending.

Biometric authentication is among the most

secure methods of ensuring exceptional safety.

Eliminate unauthorised access with stringent user authorisation

Advanced Authentication Function for network and server

Authentication type

Ease of use

Mid-level

Mid-level

High-level

High-level

None

WT-506 , AU-201

High-level

High-level

WT-506 , AU-102

Security

Additional options

Password

IC card

Biometric

Security and Management

Touch state-of-the-art security and management.

Solution Case Study

Brokerage / IT Solutions Manager

“ Data asset protection and centralised
administration reduce our costs.”

Our company manages confidential information. In the past, our main

challenge was to build an open and secure network environment that

would prevent information leakage. Through the high-level user

authorisation in bizhub, we achieved such a system. Moreover,

PageScope Enterprise Suite software makes the system flexible and

secure enough for comprehensive management of all device

information. With bizhub, we’ve affordably made our business more

secure and convenient.

Adopt various network security and communication data encryption measures.

Employ outstanding security with a cutting-edge user authentication system.

Protect documents with passwords and an embedded copy prevention code
that prevents unauthorised output.

Utilise counter data collection and cost management for each device and user

with authorisation.

Solutions

Issues

Developing a secure environment for network printing and data sharing.

Preventing information leakage from the corporate network.

Preventing document alteration and reducing unauthorised duplication.

Establishing solid, cost-effective management at the group and individual level.

Advertising
This manual is related to the following products: