Xerox
®
 WorkCentre
®
 7775 Evaluator Guide     13
Section 1: Evaluating Workgroup  
Color Multifunction Printers
Evaluate Security Capabilities 
What types of security requirements are critical to your office? Does the device 
have the security features to meet these demands? Can device access be password 
protected? Does the system remove latent images on its hard drive? Does the system 
have features in place to protect confidential documents?
How the WorkCentre 7775 mul-
tifunction printer exceeds the 
security capabilities requirement
Integrated security
Xerox is committed to the security of its 
products and takes a unique approach to 
security within the document industry: 
Xerox believes security should be built in as 
a core component of the MFP system and 
its controller.
The WorkCentre 7775 offers built-in 
security features for physical and network-
based access controls, user authentication, 
usage tracking, file encryption, and file 
deletion to fully comply with the IT organi-
zation’s information security policies. This 
is accomplished through intelligent design 
architecture that complies with stringent 
industry security standards and increasing 
regulations in the government, military, 
health care (HIPAA), legal (Sarbanes-Oxley), 
financial (Gramm-Leach-Biley Act) and 
pharmaceutical (FDA 21 CFR Part 11) sec-
tors. The security capabilities of WorkCentre 
7775MFP can be further extended with 
solutions from Xerox Alliance Partners.  
Security features of the WorkCentre  
7775 include:
•   802.1X Support — Ensures devices 
connected to the network are properly 
authorized
•   Analog Fax and Network Isolation — 
Controller architecture isolates the fax 
telephone line and the network connec-
tion to foil incoming attacks
•   Authentication
  –  System Administrator Authentica-
tion — The WorkCentre 7775 allows 
access to administrative web pages to 
be restricted to authorized employees. 
Device Access Password Protection 
further restricts access to device setup 
screens and remote network settings
  –  Network Authentication — Manage 
access to copy, scan, email, and fax 
features by validating network user 
names and passwords
•   Firewall — Restricts access via IP 
Address Filtering, Domain Filtering,  
and Port Blocking
•   Image Overwrite Security — Elec-
tronically erases data that has been 
processed to the hard disk in print, copy, 
scan, and fax modes using a three-pass 
algorithm specified by U.S. Department 
of Defense Directive 5200.28-M at regu-
lar, pre-selected times
•   Internal Security Audit Log — Permits 
tracking of activity at the device, satisfy-
ing the needs of organizations that 
must provide logging of the transfer of 
Personally Identifiable Information per 
regulations like HIPAA, Sarbanes-Oxley, 
Gramm-Leach-Bliley Act, and more.
•   IPv6 Support — Built-in support for 
networks utilizing the IPv6 standard
•   Hide Print Job Name in Queue — Hides 
or obscures document names when the 
job queue is viewed from the front panel 
or via CentreWare IS
•   LDAP Authentication/Secure LDAP — 
Adds ability to configure LDAP requests 
to only people with user IDs are sent to 
and authenticated by the LDAP server