A DCO lock prevents DCO setting modification. Since a locked DCO is not accessible to the user, it can potentially pose a threat to data security, if data has been stored on the DCO.
New data breach strategies and attacks have made it imperative that standards be put in place to protect credit card data. The Payment Card Industry Data Security Standard (PCI DSS) is an ongoing regulation started in 2006 to ensure that all companies that accept, process, store or transmit credit card information do so in a secure environment.
The hard drive retirement process is one of the most neglected security threats most companies face today. Data contained in old or retired hard drives can put your organization at equal risk to other attack vectors. Take the opportunity to see how your organization may be at risk and how to address any security holes you may have in regards to your hard drive retirement process.
While WipeDrive software allows you to do any number of passes using any wipe pattern, there is no compelling evidence to suggest that any more than one pass is necessary to ensure complete data erasure. This report briefly explains why organizations use multiple passes and why we don't currently see them as being necessary.
Disk encryption is a useful way to secure data, but there are problems with relying on encryption alone to protect data after drive disposal. Using drive wiping in conjunction with cryptographic key erasure solves these problems.
The worlds strictest data protection regulations have recently gone in to effect. General Data Protection Regulation's newest updates aim to protect all EU citizens from privacy and data breaches. Every organization that collects and/or processes data from people in the EU is subject to GDPR and needs to comply.
Encrypting hard drives adds an effective new level of data protection and security for organizations. However, there is a disturbing trend of relying upon encryption as a form of data sanitization. While encrypted data may seem inaccessible it should never be considered 'sanitized' since all of the data remains and various risk factors threaten this approach.
WipeDrive's overwrite speed varies depending on the drives size, speed, type, number of overwrite passes, and other factors. Although there is no simple answer, we have compiled some data to help you estimate wipe times for your system.
There is a significant difference between software claiming to be "in compliance" with standards and software that is "certified" by recognized security organizations. Learn why certification is important and why relying only on compliance is dangerous.
With all the advantages to the cloud, there are many disadvantages and dangers when entrusting data to another company. Data leakage, DDOS attacks, and snooping are far greater risks on the cloud as opposed to physical storage.
This webinar shows the critical risk factors involved in retiring hard drives and how to significantly reduce the security risk involved with retiring hard drives and data sanitization. We will go over optimal security practices, highlight 5 common security holes and how to protect your process against them.
Watch a short introduction to WipeDrive and some of its standard configuration and deployment options.
We are dedicated to providing you the best possible data erasure solution. We know we can make your hardware retirement process more efficient and more secure. Ask us how or read how we have helped these companies in substantial ways.
Cascade Asset Management employed WipeDrive's automation features to achieve incredible productivity gains and cost savings.
CitiGroup uses WipeDrive's audit logging features to ensure that absolutely no data spillage occurs.
CWI chose WhiteCanyon's WipeDrive for its data sanitization and automation needs. WhiteCanyon was able to deliver a comprehensive solution that met all of CWI's requirements by not only wiping computers to the highest standard, but also by improving the efficiency and effectiveness of their underlying work flow.
Deloitte uses WipeDrive's remote wiping ability to eliminate the time and expense required to ship computers for data erasure.
Sipi used WipeDrive's extensive customization options to increase productivity and improve their audit SLA's
We want you to have the information you need to keep your data secure at all times, and so we have created a library of useful articles that will help you understand the process and your options. Follow the links below to view each article.
Top 10 Questions ITAD’s Ask
ITADs continue to improve their processes to meet their client’s requirements.
Top 10 Question Corporations Ask
The top 10 questions the private sector face when choosing a data wipe solution.
Top 10 Public Sector Questions
The public sector has particular requirements for data eradication.
WipeDrive Compliance in Australia
2018 Notifiable Data Breaches Scheme.
Custom Build Configuration Access
Customize WipeDrive to meet you internal requirements.
Erasing Data From EMC Storage
Customers expect all data to be protected, and the evidence to verify it.
TRIM Command & WipeDrive
The ‘Allow TRIM’ option is a performance enhancing feature for SSDs in WipeDrive.
Data Erasure Statutes by State
Find out more about the data sanitization statutes enacted by 34 states.
DoD 5220.22-M Relevancy
DoD 5220.22-M is no longer recommended. What standards are currently recommended?
Do You Know What Your Disposal Strategy Is?
What is your end-of-life hard drive retirement process?
Forms of Data Destruction
Before retiring, selling, donating, or trashing old hardware, be sure your data is really gone.
Gramm-Leach-Bliley Act Privacy Compliance
High Volume Data Erasure
High volume data erasure is more important than ever.
How Does Your Law Firm Erase Old Data?
How do law firms handle their data on retired hard drives?
IT Asset Management
The most important factor of IT Asset Management is the auditing of hardware.
Software Wiping vs. Physical Data Destruction
Don’t pay more for a less secure data destruction.
The Risks of Shredding Drives Internally
Drive destruction is not the same as data sanitization.
What Is the Best Method for Data Sanitization?
Be sure your unwated data can not be recovered.
Low Level Format & OEM Tools
Why formatting and OEM tools fail to address drive sanitization correctly.
UK National Health Service & Data Sanitisation
Data sanitisation guidelines for N3 connected networks.
OEM Tools: Data Wiping Issues & Weaknesses
The short falls of using OEM tools in your protection plan.
WhiteCanyon Software Patent 9396359
System and method for encrypted disk drive sanitizing.