Web Content Viewer


Centralized Security
Centralized Security Settings
Security settings can be configured from a centralized location, password protected, and accessible only to authorized users. This gives organizations the ability to separate security administration and device administration, reserving access to certain controls to security professionals. Security policy settings can be monitored at regular intervals, with notifications set to alert administrators when changes are made. After establishing these settings, an administrator can use device management tools to export across other devices in the fleet, building consistent security settings system-wide with little time and effort.
Device Access
Control Device Access
Using a host of flexible authentication methods, administrators can control who has access to the MFP and to which features. This can be done using a PIN, username and password, or card log-in (with the addition of an optional card reader). Restrictions, such as access to color copying and scanning functions, can be applied by individual, group, or through customized roles. You can also define whether to allow unregistered users, such as visitors, to log in as guests and then specify their level of access.
Control Access
Control Access to Administration Settings
Device configurations, such as network settings and other control options, are available only to users with administrator privileges, enhancing security by helping to prevent intentional or accidental changes to device functions and permissions. Administrators can set requirements for passwords, such as expiration period, lockout time, and complexity. They can even access the device remotely with comprehensive control, from changing permissions to monitoring activity—even turning on or off devices, or locking down specific equipment or functions.
Your Valuable Data
imageRUNNER ADVANCE models provide standard support for HDD Encryption, leveraging a cryptographic module that complies with the FIPS 140-2 security standard. This helps protect sensitive information stored on the hard drive. The system also includes robust data erase features that can overwrite previous data as a part of routine job processing as well as initialize and permanently erase all data at the end of equipment life. Hard Disk overwriting can be performed on demand or scheduled, and a confirmation report can be provided.*

imageRUNNER ADVANCE models feature the ability to help verify that the device boot process, firmware, and applications initialize at startup without any alterations or tampering by malicious third parties. During operation, McAfee Embedded Control utilizes a whitelist to protect against malware and tampering.**

* HDD Erase Scheduler with confirmation report is optional.
** Supported on third generation imageRUNNER ADVANCE 3rd edition and imageRUNNER ADVANCE DX models only.
Valuable Data

Encryted Network Traffic
Encrypt Network Traffic
imageRUNNER ADVANCE models include several security features to help protect data it sends across the network. IPsec (Internet Protocol Security) safeguards the exchange of data at the communications level by encrypting inbound and outbound network traffic, confirming sender identity, and helping ensure unaltered transmission receipt. TLS 1.3 (Transport Layer Security) encryption further prevents access to, and tampering of, data being exchanged, helping keep information safe in transit.
Network Connections
Network Connections
Canon imageRUNNER ADVANCE systems support the IEEE 802.1x protocol, providing authentication to network devices and establishing a closed connection. The protocol is designed to help keep unwanted users from connecting to the network, whether they use a wired connection or mobile device.
Integrates with SIEM Systems
Integrates With SIEM Systems
Security Information and Event Management (SIEM) systems can be valuable tools, providing network administrators with real-time, comprehensive insights into their network activity. The imageRUNNER ADVANCE platform is built to integrate with your existing SIEM infrastructure, communicating directly with these third-party tools to help deliver insights into your print environment. Administrators can set up alerts to be notified of potential issues such as failed authentication attempts, changes in settings, new applications, and more. This communication between imageRUNNER ADVANCE MFPs and SIEM systems can provide visibility into potential threats to your network and printers.

Keeping Documents Secure
Keeping Documents In The Right Hands
All organizations deal with sensitive documents. Should documents get into the wrong hands, consequences can range from damaged reputation to heavy fines or even legal action. Sensitive and confidential information— including employee records, customer information, and proprietary intellectual property—is vulnerable when left unattended in output trays. To avoid having such documents left at the printer, users can create a PIN that must be entered at the device to release the job. Or administrators can require that users log in before printing their jobs using one of the various authentication methods.
Workflow Security
Workflow Security
Whether by human error or with harmful intent, everyday office workflows can lead to misdirected information, potentially causing serious security issues. imageRUNNER ADVANCE devices have several features that can help— all easy to use and under the administrator’s control. Scan destinations can be restricted for all users or certain groups, such as guests, limiting the ability to send documents to those recipients in a specific address book or domain. For even higher levels of control, users can be allowed to send documents only to themselves. Address books can be kept confidential to help protect private details and password protected so that information can be added, edited, or deleted only by authorized users.
Protecting Your PDFs
Protect Your PDFs
PDFs often represent some of the most confidential documents in an organization, with the format often used for contracts, reports, proposals, financial statements, and similarly sensitive information. The built-in* Encrypted PDF feature supports various levels of encryption for enhanced security when sending these documents. Permissions and passwords can be included to control who can open, read, or print the file. To help ensure the legitimacy of highly sensitive documents, users can add digital signatures to verify document source and authenticity. This signature can be viewed through the document properties or displayed prominently on the PDF’s pages.

* Standard on third generation imageRUNNER ADVANCE (2nd, and 3rd edition) and imageRUNNER ADVANCE DX models only. Optional on third generation imageRUNNER ADVANCE 1st edition models.

McAfee and the McAfee logo are trademarks of McAfee LLC in the US and/or other countries.
cloud content management
Cloud Content Management
Important business information can be stored in various locations within an organization. Workflow technology that can simplify communication and provide security features is a top priority. Canon’s strong integration with Box and mxHero** offers customers powerful, cloud-based capabilities to address many issues that often come with sending and receiving large files, including the need for security features and high costs related to email storage. As emails pass through mxHero, the body and attachments can be automatically routed to an access restricted and indexed cloud storage account, such as Box—transforming inboxes from bulky and potentially vulnerable to lightweight and controlled. Box solutions provide users with an array of security features, including the ability to restrict when files can be accessed and by whom.

** Box and mxHero integration requires optional solutions.