Data should be erased from IT assets prior to their removal from data centers. We provide on-site data erasure services for storage arrays and servers using our hard drive eraser. Disk erasure is performed to NIST 800-88 or DoD standards. Our hard driver eraser systems have the capability of wiping hundreds of hard drives simultaneously, typically without removing disk drives from their enclosure. Sometimes we wipe a storage array using our custom built appliances (which are also available for sale). Our appliances integrate a disk wipe utility with Intel based servers which connect to storage arrays and enable potentially thousands of drives to be wiped from a single server. If the situation dictates, we are used a bootable USB image of our erasure software to wipe servers and server based storage arrays without removing the targeted disk drives from the server(s). Regardless of the method used to perform the secure erasure, our tools generate a detailed report showing each drive when has been wiped, by serial number, and whether that drive passed or failed erasure.
We currently provide product (hard drive erasure appliances, bootable software) as well as on-site services to many large and corporations and government entities. Some larger customers prefer to do the hard drive erasure, of both failed drives as well and end-of-life wiping of storage arrays, themselves using an integrated appliance we provide. Others customers prefer to outsource the on-site wiping to us, and let us provide them with a detailed erasure report after the project is completed. We have built a reputation as one of the best providers in the industry, and thrive on difficult erasure projects. Some IT Asset Disposal companies use our services when the job may be too challenging for their in-house staff.
We have the ability to erase storage arrays and servers from any vendor. Our software, Xerase, is the leading product, by a wide margin, when it comes to performing data wiping in the data center.
The National Institute of Standards and Technology (NIST):
"The application of sophisticated access controls and encryption help reduce the likelihood that an attacker can gain direct access to sensitive information. As a result, parties attempting to obtain sensitive information may seek to focus their efforts on alternative access means such as retrieving residual data on media that has left an organization without sufficient sanitization effort having been applied... Even internal transfers require increased scrutiny, as legal and ethical obligations make it more important than ever to protect data such as Personally Identifiable Information (PII). No matter what the final intended destination of the media is, it is important that the organization ensure that no easily re-constructible residual representation of the data is stored on the media after it has left the control of the organization or is no longer going to be protected at the confidentiality categorization of the data stored on the media.
The two most common data eradication standards in the United States are NIST and DoD. We provide a Certified Erasure Certificate upon completion of erasure that becomes our client's Legal Document and proof of erasure.