Product Features

With growing data leakages due to traditional, inadequate data deletion procedures in organizations, more and more regulations now enforce use of WipeOut data erasure techniques (secure overwriting algorithms) to ensure compliance.

WipeOut

Data discovery and scheduled erasure policies across organization

WipeOut

“WipeOut” integrated into windows as a widget with drag/drop functionality

WipeOut

Rescue Me (unique feature that allows erasure of important files at one click)

WipeOut

Erasure of selective database records (offered as database WipeOut version)

WipeOut

WipeOut for lost/stolen assets

WipeOut

Enterprise Server/Client data erasure policy management

Wipeout

Certificate of Data Erasures for audit trails

WipeOut

Remote WipeOut

Are you compliant with Data Disposal Policies?

WipeOut

The Health Insurance Portability and Accountability Act (HIPAA)

WipeOut

The Payment Card Industry Data Security Standard (PCI DSS)

WipeOut

Gramm-Leach-Bliley Act (GLB)

WipeOut

State Regulation of Protecting the Confidentiality of Personally Identifiable Information (PII)

WipeOut

Organization Data Privacy and Security Guidelines

WipeOut

Organization Data Retention and Disposal Guidelines

The Health Insurance Portability and Accountability Act (HIPAA)

The Payment Card Industry Data Security Standard (PCI DSS)

Gramm-Leach-Bliley Act (GLB)

State Regulation of Protecting the Confidentiality of Personally Identifiable Information (PII)

Organization Data Privacy and Security Guidelines

Organization Data Retention and Disposal Guidelines

wipeout

NIST Special Publication 800-88

This product ensure your organization is meeting the standard put forth in the NIST 800-88, 800-36 Guidelines for Computer Security.

"Clearing information is a level of media sanitization that would protect the confidentiality of information against a robust keyboard attack. Simple deletion of items would not suffice for clearing. Clearing must not allow information to be retrieved by data, disk, or file recove ry utilities. It must be resistant to keystroke recovery attempts executed from standard input devices and from data scavenging tools. For example, overwriting is an acceptable method for clearing media".

NIST Special Publication 800-36

"Overwriting. One method to sanitize media is to use software or hardware products to overwrite storage space on the media with non-sensitive data. This process may include overwriting not only the logical storage location of a file(s) (e.g., file allocation table) to be erased or permanently removed but also the entire media, including all addressable locations. The security goal of the overwriting process is to replace sensitive data with nonsensitive random data. Media should be overwritten a minimum of three times using a method based on the information sensitivity contained on the media. Overwriting cannot be used for media that are damaged or not rewritable. The media type and size may also influence whether overwriting is a suitable sanitization method".

Our Products

WipeOut is an advanced security tool, which allows you to completely remove sensitive data from your hard drive.

It overwrites this data several times with carefully selected patterns, wiping the data correctly. You can drag and drop files and folders into the WipeOut Bin, use the windows Explorer to WipeOut the Files, or WipeOut the Recycle Bin.

WipeOut