Data Erasure & Compliance

All of XTechnology Global’s efforts in data eradication are done to Department of Defense Min/Spec 5022.22M and NIST800-88* standards with full reporting of hard drive part and serial numbers. All certificates of data destruction provided.  Its portable test equipment for on/off site work means XTechnology Global has the flexibility to perform its valuable services at client data center locations. We have the ability to work with multiple vendors, across multiple platforms across multiple interfaces. Because we are vendor neutral we can accommodate specific client needs at the client site or in our state of the art data compliance laboratory. XTechnology Global’s data erasure methods have been validated and approved by a third party forensics analysis team, J.A.G. & Company, LLC.

On-Site Erasure

We can also bring our state of the art technology directly to your data center or office. Our professional services are delivered direct or through one of our network partners. Our on-site services are very cost effective on a per drive basis since our technology allows us to process high volumes of drives simultaneously, even across different protocols. We can do in a day what our competition does in a week. Our philosophy is that all drives should be erased while in YOUR custody, regardless of their final destination. Our proven methodology insures that every single drive is processed, with serial number tracking and custom reports for your record keeping. Non functional drives are degaussed then punched.

Off-site Logistics

XTechnology Global announced its relocation to a new 16,000 square foot facility in Danvers, Massachusetts. The new location boasts a full line of state of the art equipment, comprehensive security measures and a dedicated professional staff designed to facilitate inventory management and proven, end-to-end disposition of inventory with full data compliance. Our new location allows us to securely accommodate all our clients needs while still maintaining our on-site services to multiple clients across multiple platforms. A full logistics team plans and secures every point of transport to and from our facility. A detailed inventory of all assets is securely maintained at all times.

Non Destructive software wipe, 25 Programs

• 1X Write DOD Clear
• 1X Write NIST clear
• 1X HMG CCITSEC
• 1X Write Verify, DOD Clear Verify
• 1x Write GOST R 50739-95
• 1X Write ISM 6.2.92
• 1X Write NZSIT 402
• 1X Zero Drive
• 2X Write GOST R 50739.95
• 3X HMG CCITSEC
• 3X Write DOD without Verify
• 3XWrite Verify DOD sanitize
• 3X Write Verify NAVSO Purge

• 3X Write Verify NAVSO purge without format
• 3X Write ISM 6.2.92
• 3X Write VSITR
• 5X Write
• 5X Write Verify
• 7X Write
• 7X Write Verify
• Secure Erase (firmware based command applicable to only IDE and SATA Drives and some SSD)
• SSD Sanitize
• Secure Auto
• Secure Auto +1X DOD
• Secure Auto +3X DOD

Method Security Advantage Disadvantage
Physical Destruction: Disintegration, incineration, pulverization or melting in order to completely destroy the media
itself.
Physical Destruction of media is the ultimate form of sanitization. After media are destroyed, they cannot be reused as originally intended.
  • Highest level of security: assures that data is unrecoverable by any means.
  • Large amounts of media can be destroyed at once
  • Different types of media can be destroyed simultaneously
  • Cannot provide verification of the destruction process as required for regulatory compliance unless electronic data purges also take place prior to physical.
  • Hard drive or other media is no longer usable; econmically wasteful, environmentally questionable.
  • Typically outsourced to a metal destruction or incineration facility, which may compromise control.
  • Specific safety, hazmat, and special disposition requirements.
Firmware Based Security Erase or Purge: Hardware-based solutions connect directly to the hard drive and implement an erasure command that erases data but allows the drive to be redeployed. Many hardware solutions use the Secure Erase protocol developed by the NSA for ATA/SATA harddrives. Highest security rating that does not involve physical destruction of the hard drive.
  • Does not destroy hard drive; the drive may be reused or sold.
  • Portable solutions are effective for on-site purging because no software need be loaded onto the PC.
  • Green solution uses less energy than other methods.
  • Can be significantly faster than clear methods (software overwrite).
  • Provides Certification and a defendable audit trail.
  • No safety or hazmat issues.
Some solutions require that drives be physically removed from the PC.
Software Overwrite: Software based data destruction deploys a special application to write patterns of meaningless data (a combination of 1s and 0s) onto the drive, usually requiring several passes. The older, Department of Defense standard requires 3 levels of overwriting. Rated by NIST as equal to firmware-based purging (above)
  • Hard drive may be re-used.
  • May be deployed over a network.
  • Widely available commercially or as freeware for low volume requirements.
  • Some solutions offer validation and reporting utilities.
  • Viable for in-house computers.
  • Not a scalables solution; inappropriate for enterprise wide compliance programs.
  • Costly in terms of electrical requirements.
  • May be time consuming, especially for multiple passes.
  • Not portable for off-site hard drive sanitization.
  • Not usable if the hard drive is damaged or is not writeable.
  • Not all overwriting tools are able to erase data on the locked/hidden sectors, thus compromising data security.
  • Most overwriting programs access the drive via the BIOS, resulting in incomplete erasure.
  • Many freeware/shareware tools exist which perform an incomplete erasure putting a company at risk of a data breach.
Hard drive & Tape Degaussing: Deploys a powerful magnetic field to destroy all magnetically recorded data. Highest security rating that does not involve physical destruction of the hard drive (although the hard drive is rendered unusable).
  • Capable of destroying all the data on the hard drive, especially older units (especially hard drives that require a weaker electromagnetic field).
  • Relatively fast process.
  • Can also be used to destroy data on other magnetic media.
  • Destroys hard drive permanently; not a “green” solution.
  • Cannot provide verification of the destruction process as required for regulatory compliance.
  • May be less effective on newer drives with thicker shielding.
  • Drive must be physically removed from the PC.
  • Degaussing machines are costly and may damage nearby equipment.
  • Generally requires a third-party vendor and may compromise care, custody and control protcol.