Recent Articles

SSD Erasure: What Enterprises Need to Know

Solid-state drives (SSDs) can be used alone in a single device, such as in a laptop. Often, however, they are used in tandem with hard disk drives (HDDs) in single machines, or alongside them (in data centers, for instance) to meet the data storage needs of an entire enterprise. This mixed environment can introduce confusion over how to address data destruction for these two very different types of drives. … Read More

Is It Time to Update Your IT Security Policies?

While technology developments come fast and furious, the policies that govern them often aren’t agile enough to keep up. And, when it comes to IT security policies, new technologies aren’t the only factors that can leave your standard protection methods outdated: Changes in business structure, regulation, the value of your data, the speed of data collection and increased malicious activity can also lessen their effectiveness. All of this leaves even … Read More

Data Sanitization Enters “Slope of Enlightenment” on Gartner Hype Cycle

The Gartner Hype Cycles provide a graphic representation of the maturity and adoption of technologies and applications, and how they are potentially relevant to solving real business problems and exploiting new opportunities. In addressing data sanitization in the Gartner Hype Cycle for Data Security, 2019,1 Hype Cycle for Privacy, 20192 and Hype Cycle for Endpoint Security, 2019,3 Gartner analysts have provided the following definition: “data sanitization is the disciplined process … Read More

How Many Times Must You Overwrite a Hard Disk for Complete Data Erasure?

The safest and most cost-effective way to make data disappear without having to destroy a hard disk drive (HDD) is to simply overwrite it. But how many overwriting passes are sufficient? Or, as some put it, how many times do you write ones, zeroes, or other junk data to a hard drive before it is completely wiped? It may be fewer than you think. … Read More

Need to Erase Mac T2 Devices? Blancco Has You Covered.

Apple’s latest Mac mini, MacBook Pro, MacBook Air and iMac Pro all use the T2 chip with secure boot. Secure boot acts like an exclusive club’s sharply dressed but no-nonsense bouncer, disallowing access for even the most well-dressed nonmembers—in this case, the majority of drive erasure software. However, that doesn’t mean you have to give up removing confidential data from your Mac devices—even if you have tens, hundreds or thousands … Read More

How to Securely Erase Different SSDs: NVMe, PCIe and More
Download the White Paper
managing and automating data erasure for mobile devices
White Paper
Managing and Automating Data Erasure for Mobile Devices
Download Now
desktop erasure
Case Study
Infotheek Data Erasure Case Study
Read Case Study

Top Categories