East-Tec Logo

Information about data-destroying algorithms

east-tec DisposeSecure offers the guaranteed destruction of sensitive data on hard disks using special algorithms. It works in compliance with the most known national standards:

  • American: U.S. Standard, DoD 5220.22-M
  • American: NAVSO P-5239-26 (RLL)
  • American: NAVSO P-5239-26 (MFM)

Besides these algorithms corresponding to national, governmental standards, east-Tec DisposeSecure uses predefined algorithms proposed by well-known and authoritative specialists in the field of information security:

  • Peter Gutmann algorithm - a maximum security 35 pass sanitize method
  • Bruce Schneier algorithm - a 7 pass data-destroying algorithm

east-Tec DisposeSecure's wiping methods also include two simple but fast data-destroying algorithms, that overwrite all disk data with zero or random characters (patterns), according to the chosen method.

east-tec DisposeSecure supports all of the above standards, furthermore it offers you the opportunity to develop and use your own data-destroying algorithms, that perfectly suit your security needs. For more information on how to develop custom algorithms, please read the CREATING CUSTOM ALGORITHMS section of this documentation file. To locate this section, use the table of contents from the beginning of this file.

For more information about the above mentioned sanitizing standards/algorithms, please read the appropriate section in this documentation file.