1 / 8

More than just an end of life solution

DRIVE LIFECYCLE. CRADLE. REFRESHES. Storage transfers to a new user or server Maintenance Tech refresh or return at end of lease Completion of a project Employee turnover Returning a computer under warranty Protection from unauthorized access A virus that is detected

dillian
Download Presentation

More than just an end of life solution

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. DRIVE LIFECYCLE CRADLE REFRESHES • Storage transfers to a new user or server • Maintenance • Tech refresh or return at end of lease • Completion of a project • Employee turnover • Returning a computer under warranty • Protection from unauthorized access • A virus that is detected • Attack from a hacker More than just an end of life solution GRAVEEnd of Life A Best Practice Solution for sanitizing hard drives during their entire lifecycle AFTERLIFEReformat & Recycle

  2. CURRENT SITUATION = One gigabyte of data on a hard drive Approximately one dump truck of compacted paper 5.6 BillionHard Drives Producedfrom 2001 - 2011 Well Publicized LawsHIPAA, FACTA, SOX, FISMAGramm-Leach-Bliley 750 MillionHard Drives Reachend of life in 2008 Consequences of a BreachFines, Loss of License &Loss of Reputation 2 – 3 RefreshesCan occur during a hard drives lifecycle 39% of Customers Explore other options aftera data breach occurs 49% OF ALL DATA BREACHES RESULT FROM LOST OR STOLEN HARD DRIVES & LAPTOPS

  3. SECURE ERASE ATTENDEES: MISSION: Develop a technology for sanitizing hard drives beyond forensic reconstruction – retain the ability to reuse the hard drive. OUTCOME: • The Industry collaborated with The CMRR, under the direction of the NSA to develop Secure Erase. • Now part of the ATA Rev 4 Spec for hard drive manufacturers • A destruction command is embedded in the firmware of hard drives • It is an atomic process eradicating all user data beyond forensic recovery • Up to 18 times faster than ineffective overwrite routines • Compliant, certified standards based technology • Implemented by global hard drive manufacturers in 2002 BIOS and Operating System developers blocked the ability to initiate Secure Erase.

  4. COMPLIANCE UK-HMG Infosec Standard 5 {IS5} and CESG Manuel S Australian Department of Defence (ACSI-33) RCMP Canadian Government B2-001 CLEAR Commercial Software Level of security: protection against keyboard attack DESTRUCTION Disintegration, Incineration, Pulverizing, or Melting Level of security: protection against laboratory attack PURGE Secure Erase, Degaussers Level of security: protection against laboratory attackSecure Erase is a high level of protection because you can validate the data is gone beyond forensic reconstruction & reuse the hard drive UNITED STATESNIST SP 800-88

  5. DIGITALSHREDDER FEATURES Vacant bay, available for use Drive is loaded and ready, but no operation is taking place, blinks green when process is completed Process is being executed, bay is mechanically locked and passwordprotected Reformatting / imaging • Sector Viewer • Certification Labels • User Adjustable log-out for secure access • Tiered user access – admin/user levels • Built in searchable history log • History log downloadable to CSV format • Large touch screen interface • No keyboards, mouse or cables • No Ethernet or Bluetooth connection • Ability to partition, reformat & reimage drives • 8 – 18x faster than overwrite applications • Single point solution • User upgradable firmware • Portable & Scalable • Lock-down Bays for security • LED lights indicate current process running

  6. BEST PRACTICE

  7. GETTING STARTED Design. Features. Capacity Make a security and financial difference 1 DETERMINE YOUR NEEDS: A Needs Analysis will determine your requirements to develop a Digital Shredder placement plan that meets your needs. For example, your current backlog of hard drives (if any) and the types of hard drives in your environment. 2 DETERMINE IMPLEMENTATION: After your needs are determined, we will create an agreement with you that offers one of three options – long term consignment, short term consignment or on/off site service. 3 DEPLOYMENT & TRAINING: The Digital Shredder ships with easy to use instructions. If necessary, training will be conducted either on site or via the web. Training includes setup, administrative Digital Shredder functions, erasure functions, effectively managing the log and efficient sanitization practices

  8. OPTIONS NO CAPITAL EQUIPMENT INVESTMENT REQUIRED OPTION I: LONG TERM CONSIGNMENTPlace the Digital Shredder on a permanent basis with a revolving 12-month consignment • Mechanics: • 25% of your purge requirement will be preloaded into the unit and is due prior to shipment; • Replenishments can be ordered electronically. OPTION II: SHORT TERM CONSIGNMENTShort term placement at your facility for project work • 5 Easy Steps: • Determine the number of drives you must refresh or purge; • Contact us with your count and schedule the Shredder; • Set-up a web training session for your project leader; • Remove drives from computers before your unit arrives; • Purge your drives; price per purge is $25. Volume will determine how many days the Digital Shredder is deployed. OPTION III: ON OR OFF SITE SERVICEWe provide the service. Pricing will be quoted based on # of drives and time required.

More Related