Tip

Appliance-based digital shredding for data destruction

Service provider takeaway: Service providers can deliver secure on-site data destruction services using appliance-based digital shredders with purge technology.

As public and private organizations realign their data protection policies to meet more refined compliance objectives, most security teams are responding by reassessing their security policies and filling gaps in their security posture. In the process, they are also coming to grips with the liability posed by data on legacy storage devices awaiting destruction in their storerooms. The need for a reliable means to mitigate this risk is fast becoming a significant focus.

One might expect to see service providers -- other than the physical destruction companies -- running to address this potentially lucrative business opportunity. Yet, due to confusion about effective practices and standards, many service providers have been discouraged from entering the marketplace, as few want to offer questionable or less than effective security practices that may ultimately impose potential liability. However,

    Requires Free Membership to View

Ensconce Data Technology (EDT) has a data destruction appliance on the market that completely eradicates data, enabling service providers to deliver effective on-site destruction services.

Destroy and clear technology

One aspect of physical destruction companies' business is fueled by corporate customers who must destroy data but are not inclined to add a data destruction infrastructure. Customers typically do not want to purchase technology capable of purging high-capacity hard drives, such as disintegrators or degaussers, because of the associated costs. In addition to shelling out for a disintegrator or degausser, customers also have to bear the costs of building an environment suitable for operation.

See our breakdown of the various sanitation methods.

But not all data destruction techniques cost customers dollars and cents -- some cost time and peace of mind. Multipass overwrite technology is offered by data clear software products and may require hours to process a hard drive. The duration of the process and the inability to assure customers that data is not forensically unrecoverable makes overwrite-type products unsuitable for company use or as a reliable means for service providers to offer data destruction services. Surprisingly, many products claim compliance to outdated standards such as DOD 5220, and are classified as clear-level data protection technology. But outdated compliance standards won't ease the minds of customers. Service providers need to look to current recommendations and understand the differences between clear and purge technologies.

See our comparison of various data destruction approaches.

Purge technology

When considering technology for data destruction it is important for service providers to differentiate between the various technologies and understand their capabilities. The National Institute for Standards and Technology (NIST) clarifies the capabilities of these technologies in their recommendation 800-88. One of the differentiations made in their recommendations is between clear and purge type technologies. Clear technology is susceptible to forensic reconstruction. Purge technologies, on the other hand, are capable of eradicating data from storage media beyond forensic reconstruction.

More on compliance
Archiving, backup and EDD hot storage technologies

FRCP boosts reseller value

Email classification, search and discovery for FRCP litigation

The one purge technology that is getting a lot of attention is Secure Erase. Unlike physical destruction technologies, Secure Erase affords service providers the ability to provide a reliable and efficient standards-based technology as an on-site service. Facilitated using an appliance format, Secure Erase is a very effective solution for purging data as an on-site or in-house service, and can do so at speeds as fast as 17 minutes per 100 Gig of volume space. As a portable appliance the service provider is able to deliver services affording clients a single point of destruction, where all devices processed are logged. Unlike costly, less effective clear technologies, such as software overwriting products, Secure Erase ensures no data remains, including any potentially recoverable data in margins, bad tracks or sectors.

Secure data destruction

Data destruction can be assured with an efficient and cost-effective model that you can offer as a value-added service. EDT's Dead on Demand Digital Shredder uses Secure Erase technology and incorporates an internal tamper-proof audit log. The appliance issues an adhesive certificate of destruction upon successful completion of the process. Delivering data destruction services using the Secure Erase appliance platform enables service providers to provide clients with absolute data destruction using a highly efficient process assuring true peace of mind for the client. Highly portable, EDT's triple-bay Digital Shredder weighs in at only 22 pounds and is available with a hardened transport case, making the delivery of on-site service easy.

Appliance-based digital shredding offers the client or service provider the ability to establish a single point of data eradication that reduces the worry of liability and meets security policy objectives.

About the author: Ryk Edelstein is the founder and director of operations at Converge Net Inc., a Montreal-based network services provider specializing in data loss prevention, risk and vulnerability management, automated policy violation detection and protection, and security solutions necessary to establish end-to-end protection for all sizes of enterprise.


This was first published in January 2008

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.