- Services
- Data wiping
Data wiping
Why use the data wiping service?
No organization wants its data to fall into the wrong hands even after the hardware it uses is no longer needed. Also, strictly legally, there are serious penalties for leaking data, even accidentally. In addition, data leakage is dangerous for the reputation and competitiveness of any company.
No organization wants its data to fall into the wrong hands even after the hardware it uses is no longer needed. Also, strictly legally, there are serious penalties for leaking data, even accidentally. In addition, data leakage is dangerous for the reputation and competitiveness of any company.
Want to know how much your equipment is worth?
Request a free valuationWhat are your benefits of data erasure
Reduce e-waste
Software erasure is an environmentally friendly solution that plays a major role in the end-of-life of your IT assets.
You give yourself peace of mind
Perhaps one of the most important reasons to invest in a certified data erasure service is the guaranteed irretrievable destruction of data.
You encourage reuse of technology
Through software erasure, devices remain reusable and available for resale.
You achieve compliance with regulatory requirements
Another vital reason for using the service is the need to adhere to data destruction policies and comply with regulatory requirements. Professional service providers like us provide a certificate and an audit trail that ensures permanent data deletion.
What is data wiping?
Data wiping is the process of logically removing data from a storage device without the possibility of recovery. The process involves overwriting the data carrier (hard drives, solid state drives, disk arrays or mobile devices) in an unreadable manner so that it is impossible to recover the data even after using specialized data recovery software or even in-house lab services.
Data erasure using software
The erasure of data with specialized software that we offer makes the information on a data carrier absolutely unreadable. The advantage of software data erasure is that you can reuse the data carrier, so it retains its value.
Physical destruction of data
Physical destruction of data carriers can be done in addition to software-based data erasure or if your organization specifically requires it. The process completely erases the information on the medium by physically destroying it.
Unlike software data erasure, with this method the data carriers really lose their value because they can no longer be used.
When to apply data erasure service?
There are various situations where data deletion is an absolute must for any organization.
When disposing of the equipment
When your IT equipment is at the end of its life cycle and can no longer be used, you can prevent your data from falling into the wrong hands and delete it 100% securely before it is recycled.
When you are selling it
If you sell or give away your old IT equipment, you must delete the data first. After that, you can safely hand over the equipment to the new owner.
On reuse of your equipment
Your laptop or computer must be reused for another employee. First wipe the data and then give the device to the new user.
Want to know how much your equipment is worth?
Request a free valuationIs software data erasure safe?
The data erasure software we use is among the most secure in the world. It is certified and recommended by leading organizations worldwide. After data deletion, you always receive an official certificate from us for each data carrier as proof that the information has been successfully deleted.
When to apply data erasure service?
There are various situations where data deletion is an absolute must for any organization.
When disposing of the equipment
When your IT equipment is at the end of its life cycle and can no longer be used, you can prevent your data from falling into the wrong hands and delete it 100% securely before it is recycled.
When you are selling it
If you sell or give away your old IT equipment, you must delete the data first. After that, you can safely hand over the equipment to the new owner.
On reuse of your equipment
Your laptop or computer must be reused for another employee. First wipe the data and then give the device to the new user.
Types of data erasure
In this process, the data on the media device is overwritten with binary zeros or ones in all user-addressed locations, resulting in the permanent deletion of the information without the possibility of recovery. The most common types of data erasure are defined by various international organizations such as the US National Institute of Standards and Technology (NIST) and the US Department of Defense (DoD) and include:
1 Pass Data Wiping
An 1 pass data wipe overwrites all memory locations with binary zeros. According to the NIST 800-88 Clear standard, it is enough to erase the data from the devices without the possibility of recovery.
2 Passes Data Wiping
This method allows data to be erased in binary addressable memory locations.
3 Passes Data Wiping
This data erasure model enables overwriting with arbitrary bits, with a verified final overwrite.
4 Passes Data Wiping
The Canadian RCMP TSSIT OPS-II method was published in 1997. It involves 4 overwrite cycles - the first three passes write ones and zeros to the carrier, and the fourth pass includes random characters.
33 Passes Data Wiping
According to the Pfitzner method, 20 overwrite cycles leave the data recoverable. So, using a complex algorithm of 33 overwrites with a combination of random characters for each, the successful deletion of data is assured.
35 Passes Data Wiping
Another algorithm developed by Peter Gutmann in 1996 works by overwriting some random values in 35 cycles. This type of data deletion uses pseudo values for the first and last 4 passes, followed by a complex pattern in each overwrite that is in the range 5 to 31.