Your Happy Family

Leaders in asset optimization
RoHS • WEEE • ISO 14001 Certified

Data Security

Disk Wiping Solutions

  • Centralized Drive Wiping
    • Stand Alone Drives wiped in dedicated test stations
    • Server, Array, PC, Notebook Drives wiped inside original equipment
    • Flash, USB, etc. Storage Devices wiped in dedicated stations
  • Remote Drive Wiping
    • Web-based access to Drive Wiping algorithms (Linux based, no need for Windows)
    • Remote Wiping Kit on On-Site service support
    • CD/External Drive Linux Bootable devices with Drive Wiping algorithms
  • Customization
    • OEM Specific solutions addressing architectural barriers to see drive arrays

Disk Re-Certification

  • DOD Compliant; 1 - 3 - 7 pass
  • All Sectors of bootable drives subjected to Wiping algorithm
  • All Sectors, Including Original Manufacturer's "reserved" sectors, Read/Write verified

Wiping Performance Specifications

  • IDE, Serial, SCSI
  • Parallel Drive Wiping and Re-Certification
  • Up to 2,000 Drives per set-up simultaneous Wiping and Re-Certification
  • Wiping speeds dependent on disk size, speed of bus (MB/s) and hardware components
  • In Shelf/In Rack capability
  • Over 150 known HBA solutions to individually mount drives behind an array
  • Minimum twice annual update to code; keeping pace with industry architectures

Reporting and Traceability

  • Individual Drive Serial Numbers captured and maintained in database
  • Per Serial Number/per Sector statistical data on Wipe and Re-Certify pass/fail
  • Provide Certificate of Data Destruction documentation as required
  • Data stored in redundant secured environment

Additional Features Available

  • Asset Management
    • Automatically detect configuration of your equipment
      • Brand
      • Model
      • Memory
      • Processors
      • Mother Board
      • Bios
      • Network Cards
      • USB/Fire Wire Ports
      • RAID Adapters
      • Hard Drives
    • Record all Serial Numbers of base unit and subcomponents
    • Data Stored and fully Reportable
  • Basic Functionality Testing
    • Check internal functionality of subcomponents (does include external ports)

Certifications and Standards

  • Air Force System Security Instructions 5020
  • Bruce Schneier's algorithm
  • BSI (German overwrite standard by Federal Office for Information Security/ Bundesamt für Sicherheit in der Informationstechnik)
  • German Standard VSITR
  • HMG Infosec Standard No: 5 (baseline) [Note! Certified versions: 4.5 HMG and 3.7r1]
  • HMG Infosec Standard No: 5 (enhanced) [Note! Certified versions: 4.5 HMG and 3.7r1]
  • Navy Staff Office Publication (NAVSO P-5239-26) for RLL
  • NSA (Overwrite standard by National Security Agency)
  • OPNAVINST 5239.1A
  • Peter Gutmann's algorithm
  • The National Computer Security Centre (NCSC-TG-025)
  • U.S. Department of Defense Sanitizing (DOD 5220.22-M, DOD 5220.22-M ECE)
  • US Army AR380-19