Data Erasure

The news is exploding with stories of high profile cases concerning the loss of sensitive data, emphasizing the need to properly destroy that data. Data erasure allows companies to mitigate risk, achieve compliance and reduce the risk of data breaches. By completely destroying information, businesses can feel secure that their employee and customer data is safe. Read the blogs to find out more.

Everything You Need to Know About the DoD 5220.22-M Wiping Standard & Its Applications Today

When vendors state that their solutions meet the DoD 5220.22-M “standard,” it typically means that their software will write to all addressable hard drive locations with a character, its complement and a random character. It must then be followed by verification. This “three-pass” procedure is designed to prevent data from being recovered by commercially available processes. But is the DoD 5220.22-M standard the best wiping method for your organization? Read … Read More

Adapt or Die: Why MSPs are Turning to Software as a Service

Managed Service Providers (MSPs) are facing mounting pressure to ‘evolve or die’ as our technological world advances. New technologies can no longer be ignored, and economic pressures and increasing customer demands mean MSPs need to be taking a fresh look at their business if they hope to go the distance. Customers are demanding so much more of their MSPs, and margins have been slowly driven down, so MSPs must adapt … Read More

A Comprehensive List of US Data Disposal Laws

Most businesses have access to Personally Identifiable Information (PII). This information is sensitive and must remain confidential—both during the customer’s active business with the company and after that relationship has ended. Businesses found to be careless with the management of PII, and its eventual disposal, can be harshly penalized, especially in this post-GDPR era. Compliance is key. Data breaches are costly to businesses; companies that have allowed personal data to … Read More

Is Your Business’ BYOD Policy Posing a Security Threat?

In today’s age of flexible working, virtual offices and the thoroughly modern business, the “Bring Your Own Device” (BYOD) policy is becoming increasingly popular. This means employees are expected to use their own personal devices – such as mobile phones and laptops – to carry out their workplace duties. For many organizations, implementing a BYOD policy is cost-effective, as it cuts the expense of purchasing devices for all employees, a … Read More

Why Smartphone Erasure is Essential for the Mobile Reseller Market

With the price of new smartphones reaching fever-pitch, many consumers are turning to used devices to address their needs. In fact, the second-hand mobile market is projected to be worth circa $30 billion by 2020, according to IDC. For warehouses and enterprises dealing with the sanitization and onward sale of unwanted devices for resale, security and efficiency of processing are two core pain points; mobile device erasure is essential. But … Read More

How to Securely Erase Different SSDs: NVMe, PCIe and More
Download the White Paper
managing and automating data erasure for mobile devices
White Paper
Managing and Automating Data Erasure for Mobile Devices
Download Now
desktop erasure
Case Study
Infotheek Data Erasure Case Study
Read Case Study

Top Categories