With growing data leakages due to traditional, inadequate data deletion procedures in organizations, more and more regulations now enforce use of WipeOut data erasure techniques (secure overwriting algorithms) to ensure compliance.
Data discovery and scheduled erasure policies across organization
“WipeOut” integrated into windows as a widget with drag/drop functionality
Rescue Me (unique feature that allows erasure of important files at one click)
Erasure of selective database records (offered as database WipeOut version)
WipeOut for lost/stolen assets
Enterprise Server/Client data erasure policy management
Certificate of Data Erasures for audit trails
Remote WipeOut
The Health Insurance Portability and Accountability Act (HIPAA)
The Payment Card Industry Data Security Standard (PCI DSS)
Gramm-Leach-Bliley Act (GLB)
State Regulation of Protecting the Confidentiality of Personally Identifiable Information (PII)
Organization Data Privacy and Security Guidelines
Organization Data Retention and Disposal Guidelines
The Health Insurance Portability and Accountability Act (HIPAA)
The Payment Card Industry Data Security Standard (PCI DSS)
Gramm-Leach-Bliley Act (GLB)
State Regulation of Protecting the Confidentiality of Personally Identifiable Information (PII)
Organization Data Privacy and Security Guidelines
Organization Data Retention and Disposal Guidelines
"Clearing information is a level of media sanitization that would protect the confidentiality of information against a robust keyboard attack. Simple deletion of items would not suffice for clearing. Clearing must not allow information to be retrieved by data, disk, or file recove ry utilities. It must be resistant to keystroke recovery attempts executed from standard input devices and from data scavenging tools. For example, overwriting is an acceptable method for clearing media".
"Overwriting. One method to sanitize media is to use software or hardware products to overwrite storage space on the media with non-sensitive data. This process may include overwriting not only the logical storage location of a file(s) (e.g., file allocation table) to be erased or permanently removed but also the entire media, including all addressable locations. The security goal of the overwriting process is to replace sensitive data with nonsensitive random data. Media should be overwritten a minimum of three times using a method based on the information sensitivity contained on the media. Overwriting cannot be used for media that are damaged or not rewritable. The media type and size may also influence whether overwriting is a suitable sanitization method".
It overwrites this data several times with carefully selected patterns, wiping the data correctly. You can drag and drop files and folders into the WipeOut Bin, use the windows Explorer to WipeOut the Files, or WipeOut the Recycle Bin.
Copyright © 2012- CyberFIT Solutions. All rights reserved.