Challenges and Solutions for Effective SSD Data Erasure
|
|
- Mabel Wells
- 8 years ago
- Views:
Transcription
1 Challenges and Solutions for Effective SSD Data Erasure Blancco White Paper Published 8 October 2013 First Edition
2 Table of contents Introduction...3 The Simplicity And Complexity Of SSDs...4 Traditional Erasure Approaches Carry Risks For SSDs...5 External Factors Complicating SSD Erasure...6 Key Requirements For Secure SSD Erasure...7 Summary: Professional Tools Bypass SSD Erasure Barriers...9 References
3 AMOUNT OF SSDs SOLD 239 million =40% of the HDD market Size of the HDD market 83 million 39 million Introduction A versatile and reliable mass storage device, the Solid State Drive (SSD) has transitioned from a boutique product to one of mainstream consumer and enterprise use, functioning as a direct replacement for the traditional Hard Disk Drive (HDD). Driven by the SSD s improved performance, reliability and small size with high density, SSD shipments are predicted to reach around 83 million units in 2013 a more than 100% increase in drives sold during As SSDs grow in popularity, information technology (IT) asset managers and IT asset disposal specialists (ITADs) will face several challenges with securely erasing data from SSDs set for retirement, reassignment or disposal. Unlike its mechanical disk counterpart, the HDD, an SSD employs flash memory that complicates the full removal of data using methods established for HDDs. Also, because the SSD market has grown so rapidly, it has been saturated by a large number of vendors, each with its own array of SSD models that often vary in terms of their operational processes. This lack of standardization further complicates erasure, especially given the speed at which SSDs continue to evolve. For enterprise IT asset managers, as well as thirdparty recyclers and the ITADs that support them, it is important to understand SSD technology, why SSD erasure is challenging, and the importance of choosing an effective erasure product with detailed reporting capabilities. Effective and efficient data erasure software is developed by a vendor who can apply techniques exclusively designed to erase SSDs, as well as achieve third-party verification of erasure software effectiveness and provide access to significant R&D resources to keep pace with emerging technology. This expertise prevents false positives from occurring due to use of an ineffective erasure technology or process, which could result in a costly data breach. 3
4 HARD DISK DRIVE (HDD) SOLID STATE DRIVE (SSD) DATA #2 DATA #2 DATA #4 DATA #2 DATA #2 DATA #4 DATA #4 DATA #4 Data Block Old Hidden Data OS Visible Area The simplicity and complexity of SSDs From a physical standpoint, SSDs are simple in that they do not have moving mechanical parts, unlike electromechanical HDDs, which have spinning disks and movable read/write heads. In comparison SSDs are smaller, quieter, faster and less susceptible to physical shock. SSDs are about half the size of a hard drive, weigh half as much, and use half the power, making them an especially good fit for data centers and other mass storage environments. From another perspective, SSDs start to become more complex. Flash memory, similar to what SSDs use, has been employed for years in USB drives, portable music players, mobile phones, memory cards and more. However, the way data is managed in these simple devices differs in many ways when compared to the processes performed by an SSD and its flash memory controller. The internal memory chips in SSDs called NAND flash are very similar to those found in other devices; the difference is that an SSD applies complex data management schemes to distribute data across the memory. SSDs also contain a much larger pool of overprovisioned (spare) memory capacity that is only accessible by the SSD. These and other processes are necessary to prolong the performance and lifespan of the drive key benefits of SSDs. However, they are hidden from the view of the host computer and, therefore, the user. Such differences separate SSDs from the rest of flash based storage and provide the motivation for a distinct approach to erasing them. 4
5 TRADITIONAL ERASURE METHOD RECOMMENDED SSD ERASURE METHOD CONTROLLER CONTROLLER DATA #4 Erased Area Erased Area Traditional erasure approaches carry risks for SSDs Because of the difference in how flash memory operates in SSDs, their erasure carries additional requirements compared to smartphones, USB drives, and other more simple devices. SSD erasure requirements also differ significantly from those for HDD erasure, which has been effectively performed by software for many years. There are a variety of approaches for erasing data on SSDs, but each carries its own risk factors: Delete/Format commands are not effective as a means of sanitization on an SSD as it is possible that data will remain on the device, which can be recoverable by data recovery/forensic experts. Physical destruction renders a drive inoperable and denies the opportunity for a return on investment or to exhibit sustainable, environmentallyfriendly practices. More importantly, the improper destruction of SSDs may present opportunities for highly skilled adversaries to recover data from flash chip fragments.2 Degaussing is successful for HDDs, but SSDs use integrated circuits to store data, and these circuits are electrically programmed and erased. Therefore, the data stored on the NAND flash of an SSD is unaffected by the application of a magnetic field. Overwriting data on an SSD using standards designed for HDDS such as DoD M or HMG presents potential issues with reliably removing all user data. This is due to the specific properties of an SSD and how it manages data on a device a claim supported by empirical results.3 Firmware-based erasure techniques like ATA s Secure Erase are not universally reliable for SSDs. This is because SSD manufacturers have not adopted a standardized approach to data erasure.4 Cryptographic erasure sanitizes a drive through modification of the key used to encrypt/decrypt data, but the data effectively remains on the device, as it is susceptible to improper implementation of the cryptographic system. Issues may also arise when attempting to verify the erasure. Selective erasure may be required at different stages in an SSD s lifecycle to securely sanitize individual files on a drive. However, SSD controllers tend to write data to new locations, instead of in-place, making it difficult to ensure that all stale copies of the file are also removed. 5
6 External factors complicating SSD erasure In addition to internal technical complexities, there are external factors prompting those who need SSD erasure to choose a provider capable of applying effective data erasure techniques. These factors include manufacturer variations in technology, along with legal and regulatory requirements. Lack of OEM standardization The swift adoption of SSDs has resulted in a large number of SSD original equipment manufacturers (OEMs) looking to engage this emerging market. With so many OEMs pursuing the market at once, there has been a lack of standardization in the elements surrounding SSD technology. Industry-wide acceptance of criteria, including approaches to data erasure, has been something of an afterthought.5 The assortment of SSD models, with their variations in hardware and processes, has added to the complexity of choosing the best approach for handling end-oflifecycle management. It is not possible to assume the behavior of one SSD will match that of the next, which is why an erasure software provider s knowledge and expertise are so critical. Increase in data privacy legislation and standards Data privacy and protection is an ongoing issue and a number of stringent industry-specific standards and regulations exist to protect data. At the same time, new legislation is also being implemented. In 2012, the US introduced the Consumer Privacy Bill of Rights,6 which provides strong privacy protection for consumers, including a requirement for deletion of data. In Europe, changes in data protection have been proposed, including requirements for the deletion of online data, use of auditable procedures, and recommendations for the use of certified data erasure tools.7 Violators can incur fines of up to 2% of global annual turnover. Choosing a data erasure provider with technology that provides detailed reports and a certificate of erasure is critical to complying with regulations and standards throughout the world. While regulations and standards may vary from country to country and industry to industry, one common requirement exists verifiable proof of data erasure. Choosing a data erasure provider with technology that provides detailed reports and a certificate of erasure is critical to complying with regulations and standards throughout the world. 6
7 Key requirements for secure SSD erasure Businesses and organizations depend on the processes presented by professional data erasure companies to provide security for their data. Failure to understand the challenges presented by SSDs will result in the increased potential of a breach. There are some key requirements that professional data erasure software must address to ensure successful erasure of SSDs. Third-party testing and validation When developing an SSD erasure process, it is essential for a software vendor to have an independent third party with data recovery and forensic expertise verify and analyze its data erasure processes. This is the most effective and unbiased way to determine the robustness of the erasure process. Only those data erasure providers with technology that has undergone such stringent and recognized forensic testing can definitively claim to offer a solution effective for erasing SSDs and other emerging technologies. SSD erasure providers should seek any validation schemes available to validate their solution independently. The Asset Disposal and Information Security Alliance (ADISA) has developed a methodology designed to test SSD sanitization software.8 The testing, led by a data security expert, verifies SSD erasure against the requirements of a defined set of forensic standards. When developing an SSD erasure process, it is essential for a software vendor to have an independent third party with data recovery and forensic expertise verify and analyze its data erasure processes. 7
8 To benchmark the erasure process adhering to the most advanced tactics known in the industry, erasure processes should also be tested utilizing the expertise of world class data recovery experts. Data recovery companies with years of experience and tailored recovery tools that have been developed in-house can provide the most accurate processes for judging erasure success. Advanced data erasure software should apply automated methods to remove these freeze locks and ensure that the essential firmware erasure methods are accessed. Pursuit of SSD erasure standardization Erasure software must apply erasure techniques specifically designed to provide the best security possible. Ideally, the software should incorporate an SSD erasure standard requiring erasure processes that have the capacity to counteract SSD specific behaviors, as well as the ability to expose all available security measures on a drive. Published research has already shown that reliance on one specific erasure method is not advisable or universally suitable for SSDs.9 This SSD erasure standard must provide a multilayered erasure approach, be able to detect any drive faults and perform the most stringent possible verification. The processes performed on an SSD must include elements that are designed to mitigate any false positives these drives may communicate when reporting erasure success. Removal of freeze locks A key aspect of successful SSD erasure is gaining access to the device s internal erasure commands. The BIOS of most modern computers blocks access to these commands through the application of a lock on the drive s security feature set (known as a freeze lock). The existence of freeze locks can present a significant challenge to efficient and secure erasure of SSDs, as manual intervention and physical access to the hard drive is often the only way to remove a freeze lock. Because SSDs apply the use of storage areas that are not accessible by software, firmwarebased erasure techniques are critical to a secure sanitization process. However, without access to automated freeze lock removal, this process becomes significantly more difficult. Gaining physical access to the SSD is impractical and inefficient in environments where large volumes of assets are being processed, necessitating more time and effort to undertake operations, particularly in laptops where SSD access is difficult and time consuming. It also presents the opportunity for errors and even damage to the technology through mishandling. Advanced data erasure software should apply automated methods to remove these freeze locks and ensure that the essential firmware erasure methods are accessed. Vendor-OEM cooperation The current lack of standardization surrounding SSDs indicates the need for erasure providers and SSD OEMs to cooperate in building an effective knowledge base regarding SSD functionality. These kinds of partnerships ensure that best erasure practices are adopted so that OEM security functions are accessed and undertaken appropriately. Continued cooperation also means that data erasure providers can act as a third party to validate an OEM s internal erasure processes and ensure they meet the highest security requirements. 8
9 Summary: Professional tools bypass SSD erasure barriers In the future, SSDs will become an even more prevalent storage alternative for both consumers and enterprises, further impacting the dynamics of the data erasure industry. To adhere to robust data security policies and practices, IT asset managers and ITADs need to understand the differences between HDD and SSD data erasure requirements so they can choose an effective erasure tool, especially as SSD technology continues to evolve. When selecting a data erasure tool that can effectively process SSDs, it is essential to look for one developed by a vendor who understands the many caveats involved with SSD technology. Otherwise, a less advanced erasure tool or method may result, presenting the potential for data breach and removing the possibility of lucrative resale opportunities. Professional data erasure software removes the barriers to erasure by bypassing freeze locks, detecting errors in the drive and reporting the inability of the SSD to effectively fulfill erasure operations so that alternative procedures can be used to mitigate risks. The software s comprehensive erasure report also supports compliance with various regulations and standards and supplies hardware details necessary for device remarketing. Ultimately, advanced data erasure software provides the peace of mind that sensitive data will not fall into the wrong hands. 9
10 References 1 Zhang, Fang, IHS isuppli, Hard Disk Drive Market Revenue Set for Double-Digit Decline This Year, February 4, 2013, Decline-This-Year.aspx 2 Swanson, Steven, Destroying Flash Memory-Based Storage Devices, University of California, San Diego, CA, 2011, 3 Grupp L., Spada F., Swanson S., Wei M., Reliably Erasing Data From Flash-based Solid State Drives, Grupp et. al, Belkasort, Why SSD Drives Destroy Court Evidence, and What Can Be Done About It, 6 Obama Administration, Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy, February 2012, 7 European Commission, January 2012, 8 ADISA Product Claims Testing, 9 Grupp et. al, The information contained in this document represents the current view of Blancco Oy Ltd on the issues discussed as of the date of publication. Because of changing market conditions, Blancco cannot guarantee the accuracy of any information presented after the date of publication. This white paper is for informational purposes only. Blancco makes no warranties, express or implied, in this document. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in, or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Blancco. 10
11 For further information, please visit Blancco Oy Ltd. Länsikatu 15 FI Joensuu, FINLAND Tel
Managing and Automating Data Erasure for Mobile Devices: STRATEGIES FOR RECYCLERS AND IT ASSET DISPOSAL SPECIALISTS
Managing and Automating Data Erasure for Mobile Devices: STRATEGIES FOR RECYCLERS AND IT ASSET DISPOSAL SPECIALISTS Blancco White Paper Published 14 February 2013 Introduction Advanced mobile devices like
More informationManaging Data Erasure in the Enterprise: Automated Processes for Optimal Efficiency
Managing Data Erasure in the Enterprise: Automated Processes for Optimal Efficiency Blancco White Paper Published 30 June 2014 Table of contents Introduction...2 Threats from improperly disposed IT equipment...4
More informationUnderstanding Data Destruction and How to Properly Protect Your Business
Understanding Data Destruction and How to Properly Protect Your Business Understanding Data Destruction and How to Properly Protect Your Business I. Abstract This document is designed to provide a practical
More informationDestruction and Disposal of Sensitive Data
Destruction and Disposal of Sensitive Data Good Practice Guidelines Version: 3.0 Date: March 2015 1 Copyright 2015, Health and Social Care Information Centre. Contents 1. Introduction 3 1.2 Aims and Objectives
More informationA Guide to Minimizing the Risk of IT Asset Disposition
A Guide to Minimizing the Risk of IT Asset Disposition Who is concerned about risk? They may not think about it terms of risk, but almost everyone at your organization is worried about the chinks in its
More informationDestroying Flash Memory-Based Storage Devices (draft v0.9)
Destroying Flash Memory-Based Storage Devices (draft v0.9) Dr. Steven Swanson Director, Non-volatile Systems Laboratory Department of Computer Science and Engineering University of California, San Diego
More informationGuidance on Personal Data Erasure and Anonymisation 1
Guidance on Personal Data Erasure and Anonymisation Introduction Data users engaged in the collection, holding, processing or use of personal data must carefully consider how to erase such personal data
More informationAsset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business
Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Allow AMI to unlock the value in your redundant IT equipment by extending the lifecycle of your
More informationSolid-State Drives with Self-Encryption: Solidly Secure
Solid-State Drives with Self-Encryption: Solidly Secure 09/22/2011 Michael Willett Storage Security Strategist SAMSUNG SOLID STATE DRIVES Solid-State Drives SSD ADVANTAGES SOLID STATE DRIVES Save $$ on
More informationMobile Network Operators and the Used Mobile Device Market: SAFELY CAPTURING VALUE WITH ADVANCED DATA ERASURE
Mobile Network Operators and the Used Mobile Device Market: SAFELY CAPTURING VALUE WITH ADVANCED DATA ERASURE Blancco White Paper Published 21 February 2014 Table of contents Introduction...3 Drivers for
More informationProtecting Data in Decommissioned IT Assets: Factors, Tools and Methods
SECURIS SM Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods Information Systems Security Association (ISSA) Baltimore Chapter Monthly Meeting January 27, 2016 Hugh McLaurin, CSDS
More informationTECHNICAL USER MANUAL
TECHNICAL USER MANUAL For Blancco Erasure Software v5.7.0.1 www.blancco.com ABSTRACT This document is based on "Guidelines for Preparation of User Manual v2.0", issued by the National Security Authority
More informationThat s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail.
Why Zak Enterprises? Information contained on the hard drives of retired computers must be destroyed properly. Failure to do so can result in criminal penalties including fines and prison terms up to 20
More informationForm #57, Revision #4 Date 7/15/2015 Data Destruction and Sanitation Program. Mobile (ON-SITE) Data Destruction/Shredding Services
Data Destruction and Sanitation Program Mobile (ON-SITE) Data Destruction/Shredding Services 1 Diversified Recycling utilizes state of the art equipment for their data destruction and eradication services.
More informationTechnical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates
Technical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates Introduction and Summary Secure erase SE is defined in the ATA specification
More informationSecure Mobile Shredding and. Solutions
Secure Mobile Shredding and Data Erasure Solutions SECURE MOBILE SHREDDING & DATA ERASURE SERVICES... NCE s mobile shredding and data erasure service permanently destroys your data in a secure and controlled
More informationCCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd
CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd DESTRUCTION OF DATA ON HARD DRIVES, COMPUTER STORAGE MEDIA AND HANDHELD DEVICES INCORPORATING WEEE RECYCLING MANAGEMENT Version 1 VENDOR DETAILS Data Eliminate
More informationOUR SERVICES... SUPPLY CHAIN SERVICES ONSITE SERVICES IT RECYCLING SERVICES
SERVICES OVERVIEW OUR SERVICES... ONSITE SERVICES Onsite Shredding Services Onsite Data Erasure Services Onsite Document Destruction Services Onsite Hard Drive Destruction Services Data Centre Decommissioning
More informationData Erasure Solutions for Data Center and Cloud Computing Security
Data Erasure Solutions for Data Center and Cloud Computing Security Blancco White Paper Third Edition Table of contents Abstract...3 The data explosion and information security...4 Data center trends and
More informationStopping Leaks: How to Confront the Challenges of Endpoint Information Security from HDD. Whitepaper
Stopping Leaks: How to Confront the Challenges of Endpoint Information Security from HDD intimus consulting is a division of the MARTIN YALE GROUP Bergheimer Strasse 6-12 88677 Markdorf / Germany www.intimusconsulting.com
More informationHow to Guide FUJITSU COMPUTER PRODUCTS OF AMERICA, INC. 1255 E. Arques Ave., Sunnyvale, CA, 94085 Telephone: 408-746-7000 Facsimile: 408-746-6914
How to Guide FUJITSU COMPUTER PRODUCTS OF AMERICA, INC. 1255 E. Arques Ave., Sunnyvale, CA, 94085 Telephone: 408-746-7000 Facsimile: 408-746-6914 How to Install and Setup a Fujitsu MHZ2-CJ Series FDE HDD
More informationTechnical Reference Document Summary of NIST Special Publication 800-88: Guidelines for Media Sanitization
TECHNICAL REFERENCE DOCUMENT Technical Reference Document Summary of NIST Special Publication 800-88: Guidelines for Media Sanitization Recommendations Key Points: of the National Real world compliance
More informationTable of Contents 01 How to minimize cost in the ITAD Process. 02 Four ways to maximize investment recovery
IT Asset Manager s Guide to Disposition As the person accountable for managing the life cycle of your organization s IT assets, you have a number of unique concerns in regard to the disposition of those
More informationIT ASSET DISPOSAL ISO 27001. ISO 14001 Registered Environmental Management. ISO 9001 Registered Quality Management
ISO 27001 IT ASSET DISPOSAL ISO 14001 Registered Environmental Management Registered Information Security Management ISO 9001 Registered Quality Management CONTENTS PAGE 04 WHO ARE STONE? PAGE 05 IT ASSET
More informationHARD DRIVE REMARKETING
A PUBLICATION BY HORIZON TECHNOLOGY THE SUPPLY CHAIN PROFESSIONAL S GUIDE TO HARD DRIVE REMARKETING THE INTRODUCTORY GUIDE TO HARD DRIVE DISPOSITION & REMARKETING TO MAXIMIZE COMPANY PROFIT TABLE OF CONTENTS
More informationOverview of Data Security Methods: Passwords, Encryption, and Erase
Overview of Data Security Methods: Passwords, Encryption, and Erase Chris Budd SMART High Reliability Solutions Santa Clara, CA 1 Overview of Data Security Methods Introduction Data Protection Passwords
More informationApproved By: Agency Name Management
Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the
More informationHigh-Performance SSD-Based RAID Storage. Madhukar Gunjan Chakhaiyar Product Test Architect
High-Performance SSD-Based RAID Storage Madhukar Gunjan Chakhaiyar Product Test Architect 1 Agenda HDD based RAID Performance-HDD based RAID Storage Dynamics driving to SSD based RAID Storage Evolution
More informationHP Notebook Hard Drives & Solid State Drives. Identifying, Preventing, Diagnosing and Recovering from Drive Failures. Care and Maintenance Measures
HP Notebook Hard Drives & Solid State Drives Identifying, Preventing, Diagnosing and Recovering from Drive Failures Care and Maintenance Measures Technical White Paper Table of contents Identifying, Preventing,
More informationUnderstanding endurance and performance characteristics of HP solid state drives
Understanding endurance and performance characteristics of HP solid state drives Technology brief Introduction... 2 SSD endurance... 2 An introduction to endurance... 2 NAND organization... 2 SLC versus
More informationNasir Memon Polytechnic Institute of NYU
Nasir Memon Polytechnic Institute of NYU SSD Drive Technology Overview SSD Drive Components NAND FLASH Microcontroller SSD Drive Forensics Challenges Overview SSD s are fairly new to the market Whereas
More informationInformation Technology Services Guidelines
Page 1 of 10 Table of Contents 1 Purpose... 2 2 Entities Affected by These Guidelines... 2 3 Definitions... 3 4 Guidelines... 5 4.1 Electronic Sanitization and Destruction... 5 4.2 When is Sanitization
More informationMontclair State University. HIPAA Security Policy
Montclair State University HIPAA Security Policy Effective: June 25, 2015 HIPAA Security Policy and Procedures Montclair State University is a hybrid entity and has designated Healthcare Components that
More informationFive Truths. About Enterprise Data Protection THE BEST WAY TO SECURE YOUR DATA AND YOUR BUSINESS DEFENDING THE DATA CMYK 100 68 0 12
Five Truths About Enterprise Data Protection THE BEST WAY TO SECURE YOUR DATA AND YOUR BUSINESS DEFENDING THE DATA CMYK 100 68 0 12 1. Business data is everywhere and it s on the move. Data has always
More informationCloud Computing. What is Cloud Computing?
Cloud Computing What is Cloud Computing? Cloud computing is where the organization outsources data processing to computers owned by the vendor. Primarily the vendor hosts the equipment while the audited
More informationTechnical Note. Installing Micron SEDs in Windows 8 and 10. Introduction. TN-FD-28: Installing Micron SEDs in Windows 8 and 10.
Technical Note Installing Micron SEDs in Windows 8 and 10 TN-FD-28: Installing Micron SEDs in Windows 8 and 10 Introduction Introduction Self-encrypting drives (SEDs) can provide an effective way of protecting
More informationTrustworthy Mobile Security for Smartphones, Tablets, etc. Is there an App for that?
Trustworthy Mobile Security for Smartphones, Tablets, etc. is there an App for that? intimus consulting is a division of the MARTIN YALE GROUP Bergheimer Strasse 6-12 88677 Markdorf / Germany www.intimusconsulting.com
More informationHow To Improve Write Speed On An Nand Flash Memory Flash Drive
White Paper Apacer and Diskeeper Corporation The Best Gets Better Apacer and Diskeeper Corporation The Best Gets Better Table of Contents Overview 1 The Problem 1 Problem Analysis 1 The Software Solution:
More informationEnterprise Data Protection
PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION
More informationBuilding an ITAD Program:
Building an ITAD Program: What Your Company Needs To Know By: Integrated Communications & Technologies Contents 3 4 6 7 8 9 Introduction Understanding The Concepts of IT Asset Disposition Evaluating by
More informationKeep Your Data Secure: Fighting Back With Flash
Keep Your Data Secure: Fighting Back With Flash CONTENTS: Executive Summary...1 Data Encryption: Ensuring Peace of Mind...2 Enhanced Encryption and Device Decommission in the Enterprise...3 Freeing Up
More informationSolid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant
Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant Flash Memory Summit 2014 Santa Clara, CA 1 The Problem 2005-2013: over 864,108,052
More informationECONOMY 10-15 WORKING DAYS STANDARD 3-8 WORKING DAYS
TecLeo DATARECOVERYLAB H ELPING Y OU LO O K AFTER YO U R DATA V.A.T. REG. NO. 4410173209 20 Uitzicht Office Park, 5 Bellingham Street, Centurion, 0157 DATA RECOVERY Data Recovery & Data Destruction Price
More informationGarage Sale Forensics: Data Discovery Through Discarded Devices
Garage Sale Forensics: Data Discovery Through Discarded Devices John Michael Wright Mike County of Butte Session ID: DAS-403 Session Classification: Intermediate Objectives - What I hope you take away
More informationAn Oracle White Paper July 2013. Accelerating Database Infrastructure Using Oracle Real Application Clusters 11g R2 and QLogic FabricCache Adapters
An Oracle White Paper July 2013 Accelerating Database Infrastructure Using Oracle Real Application Clusters 11g R2 and QLogic FabricCache Adapters Executive Overview Thousands of companies world-wide use
More informationSamsung SED Security in Collaboration with Wave Systems
Samsung SED Security in Collaboration with Wave Systems Safeguarding sensitive data with enhanced performance, robust security, and manageability Samsung Super-speed Drive Secure sensitive data economically
More informationGuidance on the Use of Portable Storage Devices 1
Guidance on the Use of Portable Storage Devices Introduction Portable storage devices ( PSDs ) such as USB flash memories or drives, notebook computers or backup tapes provide a convenient means to store
More informationWHITEPAPER It s Time to Move Your Critical Data to SSDs
WHITEPAPER It s Time to Move Your Critical Data to SSDs Table of Contents 1 Introduction 2 3 5 7 Data Storage Challenges: Where Are We Now? Are SSDs Really Worth It? Introducing Micron s Newest SSD: The
More informationWhite paper Security Solutions Advanced Theft Protection (ATP) Notebooks
White paper Security Solutions Advanced Theft Protection (ATP) Notebooks Contents Introduction 2 Approaching the Challenge 4 Fujitsu s Offering Advanced Theft Protection (ATP) 5 Fujitsu is taken the lead
More informationSTANDARD 3-8 WORKING DAYS
TecLeo DATARECOVERYLAB HELPING Y OU LO O K AFTER YO U R DATA V.A.T. REG. NO. 4410173209 20 Uitzicht Office Park, 5 Bellingham Street, Centurion, 0157 Price List DATA RECOVERY Deloud (Pty) Ltd Data Recovery
More informationSolid State Drive (SSD) FAQ
Solid State Drive (SSD) FAQ Santosh Kumar Rajesh Vijayaraghavan O c t o b e r 2 0 1 1 List of Questions Why SSD? Why Dell SSD? What are the types of SSDs? What are the best Use cases & applications for
More informationEmpirical Analysis of Solid State Disk Data Retention when used with Contemporary Operating Systems
DIGITAL FORENSIC RESEARCH CONFERENCE Empirical Analysis of Solid State Disk Data Retention when used with Contemporary Operating Systems By Christopher King and Timothy Vidas Presented At The Digital Forensic
More informationBuild (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)
It is a well-known fact in computer security that security problems are very often a direct result of software bugs. That leads security researches to pay lots of attention to software engineering. The
More informationThe legal admissibility of information stored on electronic document management systems
Softology Ltd. The legal admissibility of information stored on electronic document management systems July 2014 SOFTOLOGY LIMITED www.softology.co.uk Specialist Expertise in Document Management and Workflow
More informationSOLID STATE DRIVES AND PARALLEL STORAGE
SOLID STATE DRIVES AND PARALLEL STORAGE White paper JANUARY 2013 1.888.PANASAS www.panasas.com Overview Solid State Drives (SSDs) have been touted for some time as a disruptive technology in the storage
More informationWaste, Not! Recovering Value from Unused and Surplus IT Assets
Waste, Not! Recovering Value from Unused and Surplus IT Assets A CNE Direct Whitepaper Contents 2 Introduction 3 The Asset-Value Recovery Landscape 4 Five Steps to Maximizing Asset-Value Recovery 6 Conclusion
More informationComputer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)
Computer Storage Computer Technology (S1 Obj 2-3 and S3 Obj 1-1) Storage The place in the computer where data is held while it is not needed for processing A storage device is device used to record (store)
More informationInside Track Research Note. In association with. Enterprise Storage Architectures. Is it only about scale up or scale out?
Research Note In association with Enterprise Storage Architectures Is it only about scale up or scale out? August 2015 About this The insights presented in this document are derived from independent research
More informationFujitsu Asset Lifecycle Management Services
Fujitsu Asset Lifecycle Management Services Reshaping ICT, Reshaping Business Contents 1.1 Introduction 3 1.2 Our approach 4 1.2.1 Fujitsu differentiators 5 1.3 Capability 6 1.3.1 Compliance 6 1.3.2 Tools
More informationUNCLASSIFIED CESG ASSURED SERVICE CAS SERVICE REQUIREMENT DESTRUCTION. Version 1.0. Crown Copyright 2012 All Rights Reserved.
CESG ASSURED SERVICE CAS SERVICE REQUIREMENT DESTRUCTION Version 1.0 Crown Copyright 2012 All Rights Reserved Page 1 Document History Version Date Description 0.1 June 2012 Initial Draft Version 1.0 July
More informationCyber and Data Security. Proposal form
Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which
More informationIT asset disposal for organisations
ICO lo Data Protection Act Contents Introduction... 1 Overview... 2 What the DPA says... 3 Create an asset disposal strategy... 3 How will devices be disposed of when no longer needed?... 3 Conduct a risk
More informationData Recovery - What is possible to recover and how? Data Erasure - How to erase information in a secure way. Åke Ljungqvist, Country Manager Sweden
Data Recovery - What is possible to recover and how? Data Erasure - How to erase information in a secure way Åke Ljungqvist, Country Manager Sweden Who is Ibas? Norway... Recovery of hard drives after
More informationEnterprise Class SSD: A Business Benefit Analysis
Research January 2014 Enterprise Class SSD: A J.Gold Associates Research Report Intel Corporation recently announced a new enterprise-class Solid State Drive for mobile devices with improved performance,
More informationWHITE PAPER Addressing Enterprise Computing Storage Performance Gaps with Enterprise Flash Drives
WHITE PAPER Addressing Enterprise Computing Storage Performance Gaps with Enterprise Flash Drives Sponsored by: Pliant Technology Benjamin Woo August 2009 Matthew Eastwood EXECUTIVE SUMMARY Global Headquarters:
More informationValue Recovery Enterprise IT Asset Disposition
Value Recovery Enterprise IT Asset Disposition arrowvaluerecovery.com Enterprise IT Asset Disposition The world of Five Years Out is all about new thinking, new materials, new standards New everything.
More informationCANADIAN PAYMENTS ASSOCIATION ASSOCIATION CANADIENNE DES PAIEMENTS STANDARD 012 IMAGE SECURITY STANDARD
CANADIAN PAYMENTS ASSOCIATION ASSOCIATION CANADIENNE DES PAIEMENTS STANDARD 012 IMAGE SECURITY STANDARD 2013 CANADIAN PAYMENTS ASSOCIATION 2013 ASSOCIATION CANADIENNE DES PAIEMENTS This Rule is copyrighted
More informationSeagate Instant Secure Erase Deployment Options
Technology Paper Seagate Instant Secure Erase Introduction When hard drives are retired and moved outside the data centre into the hands of others, the data on those drives is put at significant risk.
More informationReliability and Recovery: How Can We Make Better Storage Devices?
Reliability and Recovery: How Can We Make Better Storage Devices? Tom Coughlin Coughlin Associates www.tomcoughlin.com Outline Modern Storage Devices What causes failure and data all bits must die! Avoiding
More informationDRAFT IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) Communications and Operations Management Policy #2450
DRAFT IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) Communications and Operations Management Policy #2450 POLICY INFORMATION Major Functional Area (MFA): Finance and Administration Policy Title:
More informationOffice Equipment Disposal Policy
Office Equipment Disposal Policy R ISK MANAGEMENT HANDOUTS OF L AWYERS MUTUAL LAWYERS MUTUAL LIABILITY INSURANCE COMPANY OF NORTH CAROLINA 5020 Weston Parkway, Suite 200, Cary, North Carolina 27513 Post
More informationFlash In The Enterprise
Flash In The Enterprise Technology and Market Overview Chris M Evans, Langton Blue Ltd Architecting IT January 2014 Doc ID: AI1401-01S Table of Contents The Need for Flash Storage... 3 IOPS Density...
More informationData Recovery - What is possible to recover and how?
Data Recovery - What is possible to recover and how? Data Erasure - How to erase information in a secure way Åke Ljungqvist, Country Manager Sweden Who is Ibas? Norway... Recovery of hard drives after
More informationDublin City University
Asset Management Policy Asset Management Policy Contents Purpose... 1 Scope... 1 Physical Assets... 1 Software Assets... 1 Information Assets... 1 Policies and management... 2 Asset Life Cycle... 2 Asset
More informationMedia Disposition and Sanitation Procedure
Media Disposition and Sanitation Procedure Revision History Version Date Editor Nature of Change 1.0 11/14/06 Kelly Matt Initial Release Table of Contents 1.0 Overview... 1 2.0 Purpose... 1 3.0 Scope...
More informationDESIGNING SECURE USB-BASED DONGLES
DESIGNING SECURE USB-BASED DONGLES By Dhanraj Rajput, Applications Engineer Senior, Cypress Semiconductor Corp. The many advantages of USB Flash drives have led to their widespread use for data storage
More informationPreventing Final Disposition Data Breaches
Preventing Final Disposition Data Breaches How to Evaluate an ITAD Vendor for Your Organization By: Jim Kegley Founder, President and CEO, U.S. Micro Corporation The IT asset disposition (ITAD) industry
More informationFrequently Asked Questions: EMC Isilon Data at Rest Encryption Solution
1 Frequently Asked Questions: EMC Isilon Data at Rest Encryption Solution Table of Contents What s New? Target Customers Customer Benefits Competitive Positioning Technical Sales Questions General Sales
More informationUMBC POLICY ON ELECTRONIC MEDIA DISPOSAL UMBC# X-1.00.05
UMBC POLICY ON ELECTRONIC MEDIA DISPOSAL UMBC# X-1.00.05 I. POLICY STATEMENT Increasing amounts of electronic data are being transmitted and stored on computer systems and electronic media by virtually
More informationFACT SHEET: Ransomware and HIPAA
FACT SHEET: Ransomware and HIPAA A recent U.S. Government interagency report indicates that, on average, there have been 4,000 daily ransomware attacks since early 2016 (a 300% increase over the 1,000
More informationResponsibly Retiring IT Assets, Medical or Laboratory Equipment
Responsibly Retiring IT Assets, Medical or Laboratory Equipment Agenda Introductions David Zimet, President, Hesstech, LLC Industry Overview Key Issues When Retiring Electronic Equipment Data Security
More informationUnderstanding Solid State Drive Hosting and Advantages and Disadvantages of Solid State Drives (SSDs)
Keeping up with hordes of customers piling up orders by thousands a minute can be an arduous task for owners of large ecommerce websites or corporate websites of similar nature. That is why most of such
More informationFull Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
More informationKaspersky Lab s Full Disk Encryption Technology
Kaspersky Lab s Full Disk Encryption Technology In the US alone, an estimated 12,000 laptops are lost or stolen each week. According to the Ponemon Institute, a laptop is stolen every 53 seconds; more
More informationACER ProShield. Table of Contents
ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...
More informationInformation Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
More informationCorsair Flash Voyager USB 2.0 Flash Drive UFD Utility User s Manual
Corsair Flash Voyager USB 2.0 Flash Drive UFD Utility User s Manual Contents For AP v2.10.0.0 Release For Windows 98/ME/2000/XP Version 1.1B (08/27/2004) Contents...1 Introduction...1 Features & Specifications...2
More informationIndustrial Flash Storage Trends in Software and Security
January 22, 2013 Industrial Flash Storage Trends in Software and Security Many flash storage devices in embedded applications are used to save data but also function as disks for the OS. Most users are
More informationFlash-optimized Data Progression
A Dell white paper Howard Shoobe, Storage Enterprise Technologist John Shirley, Product Management Dan Bock, Product Management Table of contents Executive summary... 3 What is different about Dell Compellent
More informationSolid Security: The Rise of Self-Encrypting. Solid State Drives. Thomas Coughlin
Self-Encrypting PRESENTATION TITLE GOES HERE Solid State Drives Thomas Coughlin Marketing Chair, SNIA Solid State Storage Initiative President, Coughlin Associates About the Presenter Tom Coughlin, Marketing
More informationHIPAA/HITECH Compliance Using VMware vcloud Air
Last Updated: September 23, 2014 White paper Introduction This paper is intended for security, privacy, and compliance officers whose organizations must comply with the Privacy and Security Rules of the
More informationExhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
More informationCPA SECURITY CHARACTERISTIC DATA SANITISATION - FLASH BASED STORAGE
12040940 CPA SECURITY CHARACTERISTIC DATA SANITISATION - FLASH BASED STORAGE Version 0.3 Crown Copyright 2012 All Rights Reserved CPA Security Characteristics for Data Sanitisation - Flash Based Storage
More informationHow To Destroy Data From A Hard Drive
Safe, Secure and Certified Data Destruction Solutions to meet your individual needs Whether you require data destruction supplementary or exclusively to our IT disposal solution, our fully security screened
More informationEmail archives: no longer fit for purpose?
RESEARCH PAPER Email archives: no longer fit for purpose? Most organisations are using email archiving systems designed in the 1990s: inflexible, non-compliant and expensive May 2013 Sponsored by Contents
More informationInformation retention and disposal guide. Date: 31 October 2014 Version: 2.0
Information retention and disposal guide Date: 31 October 2014 Version: 2.0 Contents 01. Guidelines The data challenge 5 Compliance what is it and why is it important? 6 The compliant data journey 7 Case
More informationGuide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Information and Resources for Small Medical Offices Introduction The Personal Health Information Protection Act, 2004 (PHIPA) is Ontario s health-specific
More informationMIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
More information256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES
256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES integralmemoryusa.com Integral and the Crypto SSD range Introducing Integral Memory plc are one of the largest digital memory producers in Europe with
More information