Run Time Intrusion Detection
Detects and stops attacks while the device is running and forces a reboot to repair the system.
In the reboot, detection and prevention occur of any malicious code and self-heals the BIOS with a golden copy.
Helps ensure only authentic code is loaded into memory and will reboot and notify IT if compromised.
Continual Settings Check
Checks and fixes security settings and configuration and forces a reboot and initialises pre-determined configuration if a change occurs.
Useful for end-of-life as well as during operation – encrypts the secure data on the hard drive.
Enables replication of data in case of hard disk failure so that data can be recovered.
Allows the physical removal of the hard drive day to day when the device is not in use to protect confidential data.
Document Scan Lock
Increases document security by embedding hidden track and lock code within copied or printed documents to restrict unauthorized copying, scanning and faxing.
Deters duplication of sensitive documents by embedding hidden watermarks that become visible when copied.
Encrypts the print job in transit to the device and requires a password at the printer before the documents can be printed.