WE ACCEPT:     PHONE : 1300 657 317  

PRODUCT DETAILS

IR5075

Price: TBA

IR5075
Canon’s iR5075/N helps you create, share and distribute documents throughout your organisation. User-friendly and designed for maximum productivity the multifunctional iR5075/N can be equipped with an impressive range of finishing options, whilst management facilities ensure cost control and security stay high on your agenda.

Achieve the highest productivity
The iR5075/N frees-up office space with a single, multifunctional device that allows you to print, copy, fax, scan or send documents. High speed 75 ppm print performance is further enhanced by a one-pass duplex system which virtually doubles the speed achieved by conventional scanning, allowing 100 impressions per minute. Finishing capabilities match those you might find at a local print shop - including document insertion, stapling, hole punching, C and Z folding – giving you the cost-effective option to handle work in-house that might previously have been outsourced.

Documents can also be scanned, instantly encrypted and then dispatched securely as PDFs using Canon’s i-Send to various locations - such as network folders, email addresses and mailboxes.

Cost effective, controllable printing
Canon’s optional uniFLOW software takes printing knowledge and cost management to whole new levels. uniFLOW provides an ongoing and detailed insight into who is printing what, where, and how much it’s costing you as well as providing specific controls by user or department.

Protect your assets
Device access is controllable via passwords, your company’s network log-in procedure, or even fingerprints. Documents can be held in secure mailboxes until the relevant user is ready to print them at the device. Documents can also be encrypted before sending to others. For highly sensitive material, a watermark can be embedded into a printed document, becoming prominent when someone attempts to make a copy. To minimise the threat of external hacking, network authentication tools ensure that only authorised PCs or Macs can communicate with the device. Furthermore, device hard disks can be erased or encrypted, and “job logs” concealed.

ENQUIRE TODAY

Thank you! Your submission has been received!

Oops! Something went wrong while submitting the form