Data Security
Disk Wiping Solutions
- Centralized Drive Wiping
- Stand Alone Drives wiped in dedicated test stations
- Server, Array, PC, Notebook Drives wiped inside original equipment
- Flash, USB, etc. Storage Devices wiped in dedicated stations
- Remote Drive Wiping
- Web-based access to Drive Wiping algorithms (Linux based, no need for Windows)
- Remote Wiping Kit on On-Site service support
- CD/External Drive Linux Bootable devices with Drive Wiping algorithms
- Customization
- OEM Specific solutions addressing architectural barriers to see drive arrays
Disk Re-Certification
- DOD Compliant; 1 - 3 - 7 pass
- All Sectors of bootable drives subjected to Wiping algorithm
- All Sectors, Including Original Manufacturer's "reserved" sectors, Read/Write verified
Wiping Performance Specifications
- IDE, Serial, SCSI
- Parallel Drive Wiping and Re-Certification
- Up to 2,000 Drives per set-up simultaneous Wiping and Re-Certification
- Wiping speeds dependent on disk size, speed of bus (MB/s) and hardware components
- In Shelf/In Rack capability
- Over 150 known HBA solutions to individually mount drives behind an array
- Minimum twice annual update to code; keeping pace with industry architectures
Reporting and Traceability
- Individual Drive Serial Numbers captured and maintained in database
- Per Serial Number/per Sector statistical data on Wipe and Re-Certify pass/fail
- Provide Certificate of Data Destruction documentation as required
- Data stored in redundant secured environment
Additional Features Available
- Asset Management
- Automatically detect configuration of your equipment
- Brand
- Model
- Memory
- Processors
- Mother Board
- Bios
- Network Cards
- USB/Fire Wire Ports
- RAID Adapters
- Hard Drives
- Record all Serial Numbers of base unit and subcomponents
- Data Stored and fully Reportable
- Automatically detect configuration of your equipment
- Basic Functionality Testing
- Check internal functionality of subcomponents (does include external ports)
Certifications and Standards
- Air Force System Security Instructions 5020
- Bruce Schneier's algorithm
- BSI (German overwrite standard by Federal Office for Information Security/ Bundesamt für Sicherheit in der Informationstechnik)
- German Standard VSITR
- HMG Infosec Standard No: 5 (baseline) [Note! Certified versions: 4.5 HMG and 3.7r1]
- HMG Infosec Standard No: 5 (enhanced) [Note! Certified versions: 4.5 HMG and 3.7r1]
- Navy Staff Office Publication (NAVSO P-5239-26) for RLL
- NSA (Overwrite standard by National Security Agency)
- OPNAVINST 5239.1A
- Peter Gutmann's algorithm
- The National Computer Security Centre (NCSC-TG-025)
- U.S. Department of Defense Sanitizing (DOD 5220.22-M, DOD 5220.22-M ECE)
- US Army AR380-19