Certified data erasure

The typical solution involves erasure, reporting and auditing.

We erase your sensitive data from server and storage systems as used in data centers. Finally you will
receive a certified data erasure report. The software we use meets the following standards:

  • Air Force System Security Instructions 5021
  • Bruce Schneiers algorithm 
  • BSI 
  • German VSITR Standard
  • HMG Infosec Standard No: 5 (baseline) [Certified versions: 4.10 HMG, 4.8 HMG und 3.7r1]
  • HMG Infosec Standard Nr: 5 (erweitert) [Certified versions: 4.10 HMG, 4.8 HMG und 3.7r1]
  • Navy Staff Office Publication (NAVSO P-5239-26) for RLL
  • NSA (Overwriting Standard of the National Security Agency)
  • OPNAVINST 5239.1A
  • Peter Gutmanns algorithm 
  • National Computer Security Centre (NCSC-TG-025)
  • U.S. Department of Defense Sanitizing (DOD 5220.22-M, DOD 5220.22-M ECE)
  • US Army AR380-20