White Papers

Does You Data Sanitization Software Address The DCO Correctly?


A DCO lock prevents DCO setting modification. Since a locked DCO is not accessible to the user, it can potentially pose a threat to data security, if data has been stored on the DCO.

WipeDrive is Fundamental in Helping Organizations Meet PCI DSS Requirements


New data breach strategies and attacks have made it imperative that standards be put in place to protect credit card data. The Payment Card Industry Data Security Standard (PCI DSS) is an ongoing regulation started in 2006 to ensure that all companies that accept, process, store or transmit credit card information do so in a secure environment.

5 Security Holes You May Have Missed


The hard drive retirement process is one of the most neglected security threats most companies face today. Data contained in old or retired hard drives can put your organization at equal risk to other attack vectors. Take the opportunity to see how your organization may be at risk and how to address any security holes you may have in regards to your hard drive retirement process.

Are Multiple Passes Necessary?


While WipeDrive software allows you to do any number of passes using any wipe pattern, there is no compelling evidence to suggest that any more than one pass is necessary to ensure complete data erasure. This report briefly explains why organizations use multiple passes and why we don't currently see them as being necessary.

Crypto Erase and Data Erasure


Disk encryption is a useful way to secure data, but there are problems with relying on encryption alone to protect data after drive disposal. Using drive wiping in conjunction with cryptographic key erasure solves these problems.

GDPR Changes and Asset Retirement


The worlds strictest data protection regulations have recently gone in to effect. General Data Protection Regulation's newest updates aim to protect all EU citizens from privacy and data breaches. Every organization that collects and/or processes data from people in the EU is subject to GDPR and needs to comply.

Is Encryption Enough When Retiring Hard Drives?


Encrypting hard drives adds an effective new level of data protection and security for organizations. However, there is a disturbing trend of relying upon encryption as a form of data sanitization. While encrypted data may seem inaccessible it should never be considered 'sanitized' since all of the data remains and various risk factors threaten this approach.

WipeDrive Performance Review


WipeDrive's overwrite speed varies depending on the drives size, speed, type, number of overwrite passes, and other factors. Although there is no simple answer, we have compiled some data to help you estimate wipe times for your system.

Why Is Certification Important?


There is a significant difference between software claiming to be "in compliance" with standards and software that is "certified" by recognized security organizations. Learn why certification is important and why relying only on compliance is dangerous.

Data Storage on the Cloud


With all the advantages to the cloud, there are many disadvantages and dangers when entrusting data to another company. Data leakage, DDOS attacks, and snooping are far greater risks on the cloud as opposed to physical storage.


Auditing Your Hard Drive Retirement Process

Watch Now

This webinar shows the critical risk factors involved in retiring hard drives and how to significantly reduce the security risk involved with retiring hard drives and data sanitization. We will go over optimal security practices, highlight 5 common security holes and how to protect your process against them.

WipeDrive Walk Through

Watch Now

Watch a short introduction to WipeDrive and some of its standard configuration and deployment options.

Case Studies

We are dedicated to providing you the best possible data erasure solution. We know we can make your hardware retirement process more efficient and more secure. Ask us how or read how we have helped these companies in substantial ways.

Cascade Asset Management

Read More

Cascade Asset Management employed WipeDrive's automation features to achieve incredible productivity gains and cost savings.


Read More

CitiGroup uses WipeDrive's audit logging features to ensure that absolutely no data spillage occurs.

CWI Streamlines Operations

Read More

CWI chose WhiteCanyon's WipeDrive for its data sanitization and automation needs. WhiteCanyon was able to deliver a comprehensive solution that met all of CWI's requirements by not only wiping computers to the highest standard, but also by improving the efficiency and effectiveness of their underlying work flow.


Read More

Deloitte uses WipeDrive's remote wiping ability to eliminate the time and expense required to ship computers for data erasure.


Read More

Sipi used WipeDrive's extensive customization options to increase productivity and improve their audit SLA's


We want you to have the information you need to keep your data secure at all times, and so we have created a library of useful articles that will help you understand the process and your options. Follow the links below to view each article.

  • Top 10 Questions ITAD’s Ask

    ITADs continue to improve their processes to meet their client’s requirements.

  • Top 10 Question Corporations Ask

    The top 10 questions the private sector face when choosing a data wipe solution.

  • Top 10 Public Sector Questions

    The public sector has particular requirements for data eradication.

  • WipeDrive Compliance in Australia

    2018 Notifiable Data Breaches Scheme.

  • Custom Build Configuration Access

    Customize WipeDrive to meet you internal requirements.

  • Erasing Data From EMC Storage

    Customers expect all data to be protected, and the evidence to verify it.

  • TRIM Command & WipeDrive

    The ‘Allow TRIM’ option is a performance enhancing feature for SSDs in WipeDrive.

  • Data Erasure Statutes by State

    Find out more about the data sanitization statutes enacted by 34 states.

  • DoD 5220.22-M Relevancy

    DoD 5220.22-M is no longer recommended. What standards are currently recommended?

  • Do You Know What Your Disposal Strategy Is?

    What is your end-of-life hard drive retirement process?

  • Forms of Data Destruction

    Before retiring, selling, donating, or trashing old hardware, be sure your data is really gone.

  • Gramm-Leach-Bliley Act Privacy Compliance

    New regulations require you to have a customer privacy policy in place.

  • High Volume Data Erasure

    High volume data erasure is more important than ever.

  • How Does Your Law Firm Erase Old Data?

    How do law firms handle their data on retired hard drives?

  • IT Asset Management

    The most important factor of IT Asset Management is the auditing of hardware.

  • Software Wiping vs. Physical Data Destruction

    Don’t pay more for a less secure data destruction.

  • The Risks of Shredding Drives Internally

    Drive destruction is not the same as data sanitization.

  • What Is the Best Method for Data Sanitization?

    Be sure your unwated data can not be recovered.

  • Low Level Format & OEM Tools

    Why formatting and OEM tools fail to address drive sanitization correctly.

  • UK National Health Service & Data Sanitisation

    Data sanitisation guidelines for N3 connected networks.

  • OEM Tools: Data Wiping Issues & Weaknesses

    The short falls of using OEM tools in your protection plan.

  • WhiteCanyon Software Patent 9396359

    System and method for encrypted disk drive sanitizing.