What industry standards for data removal does east-tec DisposeSecure comply with?

east-tec DisposeSecure offers wiping methods against both software and hardware recovery tools. Stopping software recovery tools usually requires one pass overwriting, however, that number must be increased when it comes to stopping hardware recovery tools.

The software comes with 9 built-in industry standard compliant erasing options and you can find the list below. Besides them, east-tec DisposeSecure offers faster wiping solutions, with one or two wipe passes, but they are only safe against software recovery tools.

However, as it was mentioned earlier, if you prefer, you can also create your own custom wipe methods, thanks to east-tec DisposeSecure’s open architecture.

Here is the list of the built-in wiping methods:

  • Peter Gutmann (35 passes)
  • Bruce Schneier
  • US Naval Information Systems Management Center: NAVSO P-5239-26 (RLL)
  • US Naval Information Systems Management Center: NAVSO P-5239-26 (MFM)
  • US Air Force System Security Instruction 5020: AFSSI-5020
  • Russian Federation – Federal Agency on Technical Regulating and Metrology: GOST P50739-95
  • The German Federal office for IT Security: German VSITR, etc.

For a detailed description of each wiping method, please click here

What does “Secure Data Destruction” or “Secure Erasing” mean?

When you delete a file, the operating system does not destroy the file contents from the disk – it only deletes some “references” on the file from some system tables. The file contents remains on disk until another file happens to overwrite it. Any software recovery tool can restore the data if it hasn’t been overwritten or thoroughly erased. Hardware recovery tools may even restore overwritten files by analyzing latent magnetic traces.

As a result, your confidential information may be lying unprotected on your disk (not wiped, overwritten or erased) and it is almost impossible to prevent it from falling into the wrong hands.

east-tec Eraser offers secure wipe methods that meet and exceed not only the U.S. Department of Defense standards, but also several other international secure erasing standards, such as Peter Gutmann, Bruce Schneier, AFSSI, NAVSO, Russian GOST, German VSITR. By using these methods, you make sure your data is erased for good.