Reduce Administrative Workload And Ensure A Secure Environment; Device Management; Security Enhancements; Versatile Workflow Solutions - Canon imageRunner Advance 6075 Manual

Hide thumbs Also See for imageRunner Advance 6075:
Table of Contents

Advertisement

Reduce administrative workload and ensure a secure environment

Device Management

Address Book Sharing
By registering shared
Address Book Sharing
destinations in the Address
Book of one imageRUN-
Search the Address Book
Search the Address Book
NER ADVANCE system,
you can search that
Address Book for selecting
iR-ADV
sending destinations from
other systems on the
network. This saves you the
effort of registering the
same destinations on
multiple systems and allows
for centralized manage-
ment.

Security Enhancements

Document Scan and Copy Lock & Tracking
This feature embeds
Document Scan and
Track and Lock Code
Copy Lock & Tracking
Copy
(TL Code) within
copied or printed
Print
documents. TL Code is
low visible digital
information (dot
patterns) that can be
(TL Code)
detected easily. The
"who copies what at
which device"
 Scan and Copy lock
information
information can also be
 Tracking information
embedded to track
(dot patterns)
down a person who
makes an unauthorized copy. Additionally, when combined with Watermark embedding, text
appears when copies are made from a non TL Code enabled device. This protects
confidential information from unauthorized copying and increases security for tigher control
of original documents.
* TL Code may not be embedded within documents containing solid color backgrounds and photos.
* The optional Document Scan & Copy Lock Kit-A1 and Image Data Analyzer Board-A1 are required.
HDD data encryption
HDD Data Encryption automatically encodes all data stored on the hard disk of these
models for enhanced security. It utilizes Canon MFP Security Chip 1.10 that has achieved
the Common Criteria (ISO 15408) EAL 3 certification.
* The optional HDD Data Encryption and Mirroring Kit-C2 is required.
IPSec/IEEE 802.1X
These models support IPSec*, which is a suite of network layer protocols for securing
Internet Protocol (IP) communications by authenticating and/or encrypting each IP packet in
a data stream, and IEEE 802.1X (RADIUS), which is primarily designed to enhance the
security of wireless local area networks (WLANs). These network security features provide
strong security that can be applied to all traffic crossing the network.
* The optional IPSec Board-B2 and Expansion Bus-F2 are required.
Password entry per sending to prevent unauthorized access to the Address Book
Upon registering new destinations in the Address Book, you can set these models to require
anyone to enter the correct password when they select these destinations for document
sending. This helps ensure that only authorized users can select these destinations. Plus,
you do not need to re-register these destinations every time you update the password.
With predecessor models
With the imageRUNNER ADVANCE Series
Select a destination
Press Start
Destination : ABC Password :

Destination : ABC

Versatile Workflow Solutions

Capsulebrowser for MEAP ADVANCE
When Capsulebrowser for MEAP ADVANCE is enabled on these models, these models allow
you to save scanned data on the hard disk of the main unit via FTP. You can download data
via Web Browser at a later time. You can also password protect your files to restrict
unauthorized access. This enhances your document security.
* Available as an option.
iR-ADV
from other systems
from other systems
iR-ADV
iR-ADV
iR-ADV
iR-ADV
Output
Copy
<TL Code + Watermark>
Output
Print
<TL Code + Watermark>
MFP
Select a destination
Press Start
Enter the password
Password :


Department ID management

Department IDs and passwords registered on these models allow system administrators to manage
device usage for each department or group. Volume limitations or controlled access to copy, scan,
Address Book
and print functions can be set for up to 1,000 departments. Output totals can be managed through
registered Department IDs, which help to keep an easy-to-read database of who does what and
TEL00-0000-0000
when on a departmental basis.
FAX00-0000-0000
Device information delivery
Device information can be shared between these models, when they are connected over the same
network. By registering device information on a reference device, system administrators can set the
device to automatically or manually deliver such information as the Address Book, Department ID,
and settings specified in Additional Functions to up to 100 other specified devices on the network.
Remote operation to operate device functions remotely from your PC
You can operate device functions remotely from your personal computer. You are provided access to
all system functions from the touch screen and the hard keys.
* The optional Remote Operator's Software Kit-B1 is required.
Erase all data stored on the hard disk
Job files received at the hard disk are automatically deleted when each job is completed. However,
only the file's directory entry is removed. The data itself still exists on the hard disk in hidden files and
is potentially recoverable. These models allow system administrators to erase all data stored on the
hard disk completely.
* The optional HDD Data Erase Kit-C1 is required.
Job denied
Access Management System
You are allowed or disallowed access to a specific device function such as Copy, Print, Send, Fax,
Copy restricted
Data Box, Web Access, Advanced Box, MEAP applications, and so on, in conjunction with the SSO-H
login service. This allows you to freely use unrestricted features without needing to authenticate, while
Watermark text
restricted features prompt for login when selected. Permissions can be customized for each user.
* The optional Access Management System Kit-B1 is required.
IEEE2600 compliant, for a higher level of security control
Trusted Platform Module (TPM), tamper-resistant storage vault to protect highly sensitive information
Initialize All Data/Settings, to wipe and reformat the hard disk
Suppressible USB interface, to allow or disallow the use of USB interface
System Monitor Screen Restriction, to safeguard job status/history from unauthorized users
Hiding Password Under Asterisks, to shielding your password from being viewed by others
MAC & IP address filtering, to prevent unauthorized access to these models
IC Card Authentication for MEAP ADVANCE, to simplify
authentication through the use of intelligent cards
IC card* authentication allows to integrally manage attendance,
entry/exit, network and device usage, and work activity of each
employee. This significantly enhances security.
* FeliCa, MIFARE, and eL WISE cards are supported. Available as an option.
Personal ListPrint for MEAP ADVANCE, for serverless secure printing
When Personal ListPrint for MEAP ADVANCE is enabled on these models, you can authenticate
yourself through the use of your IC card, to print your own documents. This eliminates the need for
a print server.
* Available as an option.
Anyplace Print for MEAP ADVANCE, to allow secure printing anywhere
When Anyplace Print for MEAP ADVANCE is enabled on these models, you can authenticate
yourself through the use of your IC card, to send your documents to Anyplace Print Server from
your PC and release these jobs at any of these models. This enhances information privacy and
prevents your documents from being viewed by unintended recipients.
* Available as an option.
Workflow Composer
Using Workflow Composer, scanning, e-mailing, faxing, and archiving can be done in one
operation, all from a single button on the device control panel. When combined with user
authentication, scan-anywhere solutions and the Destination Restriction feature can be used.
In addition, when combined with the MEAP Connector (option), Workflow Composer can be
connected with external systems and can allow sending obtained index information to an SMB
or FTP server as attribute information files.
* Available as an option.
8

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Imagerunner advance 6065Imagerunner advance 6055

Table of Contents