DATA SECURITY DATA RECOVERY DATA ERASING COMPUTER FORENSICS



Similar documents
ECONOMY WORKING DAYS STANDARD 3-8 WORKING DAYS

data recovery specialists

UMBC POLICY ON ELECTRONIC MEDIA DISPOSAL UMBC# X

STANDARD 3-8 WORKING DAYS

Information Technology Services Guidelines

Data Recovery - What is possible to recover and how? Data Erasure - How to erase information in a secure way. Åke Ljungqvist, Country Manager Sweden

HIPAA Security. assistance with implementation of the. security standards. This series aims to

Data Recovery - What is possible to recover and how?

How to Start a Data Recovery Business?

Data Backup for Small and Medium Businesses: Priorities, Current Practices, and Risks

introducing COMPUTER ANTI FORENSIC TECHNIQUES

HP Hardware Support Onsite 6-Hour Call-to-Repair Service - U.S.

THE. solution. STORe it. SHARE it.

Solid-State Drives with Self-Encryption: Solidly Secure

Policy Document. Communications and Operation Management Policy

Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media?

CPR: Circumstances, Prevention and Response in Safeguarding Personal Healthcare Information

Chapter 8. Secondary Storage. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

ISO Controls and Objectives

Availability Digest. Ace Data Recovery December 2014

Source: data- loss

Network Security Policy

Media Disposition and Sanitation Procedure

ICT Policy. Executive Summary. Date of ratification Executive Team Committee 22nd October Document Author(s) Collette McQueen

Safe, secure data recovery services for any media or operating system. Innovative solutions for new technologies. Service centres worldwide.

Privacy Data Loss. Privacy Data Loss. Identity Theft. The Legal Issues

ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

1 of :01

Data Security 2. Implement Network Controls

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

The Ministry of Information & Communication Technology MICT

Information Resources Security Guidelines

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

POLICIES. Campus Data Security Policy. Issued: September, 2009 Responsible Official: Director of IT Responsible Office: IT Central.

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

ICT Disaster Recovery Plan

EaseUS Partition Master

Management of Hardware Passwords in Think PCs.

Operator s Manual. Overview. (Read This Document First)

HIPAA Security Alert

Technical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates

Version 1.0. Ratified By

EC-Council Ethical Hacking and Countermeasures

The Growing Problem of Data Breaches in America

HIPAA Security COMPLIANCE Checklist For Employers

CANADIAN PAYMENTS ASSOCIATION ASSOCIATION CANADIENNE DES PAIEMENTS STANDARD 012 IMAGE SECURITY STANDARD

CCTM IA CLAIMS DOCUMENT (ICD) Data Eliminate Ltd

Q. If I purchase a product activation key on-line, how long will it take to be sent to me?

Information Security

TPM Key Backup and Recovery. For Trusted Platforms

Security for Disk Drive Data at Rest Disk Drive Opportunities?

HP Hardware Support Onsite Service - U.S.

IT - General Controls Questionnaire

الدكتور عادل إسماعيل العلوي الجامعة الملكية للبنات البحرين نائب رئيس الجمعية الدولية لضبط ومراقبة نظم المعلومات

CITY UNIVERSITY OF HONG KONG. Information Classification and

Archive Storage Technologies Supporting Information Lifecycle Management

Network and Workstation Acceptable Use Policy

You can protect your computer against attacks from the Internet with Windows Vista integrated Firewall.

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HP FutureSmart Firmware Device Hard Disk Security

HIPAA Security Matrix

Chapter 15: Computer Security and Privacy

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Data

Samsung Data Migration v.3.0 Introduction and Installation Guide

TPM. (Trusted Platform Module) Installation Guide V for Windows Vista

Data-at-Rest Encryption Addresses SAN Security Requirements

TPM. (Trusted Platform Module) Installation Guide V2.1

HP Hardware Support Onsite 6-Hour Call-to-Repair Service - U.S.

ELECTRONIC COMMERCE (E-COMMERCE)

PERSONAL COMPUTER SECURITY

HP Hardware Support Onsite 6-Hour Call-to-Repair Service

Huddersfield New College Further Education Corporation

Newcastle University Information Security Procedures Version 3

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

Seagate Instant Secure Erase Deployment Options

Stopping Leaks: How to Confront the Challenges of Endpoint Information Security from HDD. Whitepaper

Supplier Security Assessment Questionnaire

GUIDE TO: PLANNED & AFFORDABLE DATA RECOVERY SPONSORED BY

2» 10» 18» 26» PD »

NCTE Advice Sheet Storage and Backup Advice Sheet 7

Data Security Incident Response Plan. [Insert Organization Name]

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

Factory Image Restoration Procedures

Decision on adequate information system management. (Official Gazette 37/2010)

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection

Music Recording Studio Security Program Security Assessment Version 1.1

TIPS IN PREVENTING INFORMATION LEAKAGE

Acme Corporation Enterprise Storage Assessment Prepared by:

BACKUP SECURITY GUIDELINE

IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)

Information Technology Security Policies

ISO27001 Controls and Objectives

2) applied methods and means of authorisation and procedures connected with their management and use;

Projectplace: A Secure Project Collaboration Solution

The Evolution of a Proactive Data Management Plan Assessing, Protecting, and Recovering Sensitive Information (PII/PHI)

How To Monitor The Internet In Idaho

Data Loss Prevention Program

Topic 1 Lesson 1: Importance of network security

StorageCraft Technology Corporation Leading the Way to Safer Computing 2009 StorageCraft Technology Corporation. All Rights Reserved.

Transcription:

DATA SECURITY DATA RECOVERY DATA ERASING COMPUTER FORENSICS Data Recovery Center

EPOS Data Recovery Center offers a unique set of solutions and services in the field of data recovery and information EPOS DATA RECOVERY CENTER security on the storage devices. Active research work and close cooperation of the Center with the worldwide storage devices manufacturers ensure the state-of-art level of technologies. With over of 14 years of experience, high-skilled engineers, professional instruments and high quality service EPOS Data Recovery Center is now a recognized leader of Ukrainian data recovery market. The Data Recovery Center has implemented the quality management system in compliance with ISO 9001-2001 standard EPOS Data Recovery Center is: an exclusive partner in Ukraine of Ontrack Data Recoverya worldwide leader in data recovery; an authorized technical center of Samsung for HDD data recovery; a Hewlett-Packard partner for servers and RAID systems data recovery; an authorized service center for HDD Samsung; a distributor of Intelligent Computer Solutions - a worldwide leader in production of equipment for data duplication and computer forensics.

A distinctive feature of EPOS Data Recovery Center is availability in its structure of the research and development department (R&D), which functions include: researches of data storage methods and means; development of specialized hardware and software data recovery tools; researches of secure data erasing methods and means; experimental development production. Based on the results of researches of R&D department the series of books is published: "Information security" and ""Inside"" looking at the hard disk". Series of books ""Inside" looking at the hard disk" and "Information security" published by company EPOS The Center provides a wide range of services: Hard drives data recovery; Flash data recovery; RAID data recovery; Removable media (FDD, CD, DVD, Zip, Jaz disks) data recovery; Hard drives repair; Secure data erasing from any magnetic media; Computers forensic equipment and services; Development of specialized hardware and software for data recovery and data erasing.

Innovation technologies for hard drive data recovery The hard drive data recovery process is based on application of a range of key proprietary technologies and use of unique equipment that ensures the maximum probability of data recovery and improvement of work efficiency. In-house products and unique equipment are broadly used (up to 80% cases) in data recovery processing: 1. Class 100 Clean Room EPOS is the only company in Ukraine which has the Class 100 Clean Room, which allows data recoverу even from hard Working place in Сlass 100 Сlean Room drives with damages inside of drive disk enclosure. Hard drive recovery system IRS-HDD developed by "EPOS" 2. Intelligent Recovery System for HDD ( IRS-HDD ) It provides quick and safe data recovery from hard disks with physical surface defects. System operation is based on the original technologies developed by EPOS: Adaptive reading technology. It allows to optimize the quantity of multiple readings from the defective sectors based on the specified validity of data to be recovered. Selective data read-out technology. It provides possibility of selection of the logical addresses of the sectors for further data recovery. In case of the progressive disk surface destruction, it allows to read the most important data quickly and with minimal losses. Technology of defective sector processing allows performing of separate processing of good and defective sectors according to the surface scanning results.

EPOS Data Recovery Center has developed the unique data recovery technology based on the physical access to the Flash memory. Complexity of data recovery from Flash-drives consists in the fact that software tools can not in essence recover data in case of physical defects of a drive or in case of damage of service information contained in it. Application of the technology developed in the Center allows data recovering from Flash drives of all existing types irrespective of their technical condition, including the service areas inaccessible for conventional tools, and password protected data. Innovation technologies for flash data recovery Proprietary Intelligent Recovery System for Flash (IRS Flash) is based on the original technology of direct physical access to the Flash memory chips. The system provides considerable increase of data recovery probability as compared with the existing software techniques that use only the logical level. The technology of Flash data recovery allows remote data recovery via Internet. A high level of technologies, unique equipment and great experience of Center's engineers guarantee high success rate. Implementation of IRS-Flash system into Center's technological process has allowed achieving success rate of 94% for Flash data recovery. Flash data recovery system IRS-Flash developed by "EPOS"

Computer Forensics Violation of information security often relates to the fact that computers and computer networks become the objects of unauthorized actions: unauthorized access, hacker's attacks; modification, distortion or destruction of data bases; copying or stealing of confidential information or documents; stealing of funds, fraud with payment instruments (client bank etc.); use of viruses and other harmful software; use of PC for of attacks and other destructive actions towards the other PCs and local networks. Such actions expose organizations to various risks of legal, financial and ethic nature. They often require conducting of internal investigation of such computer incidents by the organizations Computer security incidents investigation model

EPOS offers wide range of Computer Forensic services: recovery of databases and electronic documents lost or modified through deliberate physical and software actions against computers and data storage devices; examination of IT-incidents reasons and conditions; informational support for prevention and precaution of ITincidents, sales of "data safe" equipment; data acquisition (write protected) from different data storage systems (HDD, RAID, Flash ); sale of special hardware and software means for data acquisition, analysis and storage (write-protected imaging systems, diagnostic systems, data erasing systems etc.). Computer Forensic equipment for non-destructive data acquisition License and authorizations Any services related to Computer Forensics require keeping of confidentiality. EPOS has licenses for handling information containing state secret, and for performing of activity in the field of technical and cryptographic protection of information: for handling of information containing state secret ( KI2-2007-36 dated 15.03.2007); for performing of activity in the field of technical protection of information (АВ 340167 till 09.07.2012); for performing of activity in the field of cryptographic protection of information (АV 340200 till 06.07.2012). Licenses for performing of activity in the field of technical and cryptographic protection of information

Data erasing systems One of the aspects of the general problem of protection against unauthorized access to the confidential information stored on the storage devices with hard disks is a problem of data erasing both in the process of continuous operation of the drive and in case of withdrawal of the drive because of different reasons. All possible methods of of HDD data erasing can be divided into two large groups: with irrevocable loss of drive functionality; with reservation of drive functionality. EPOS has developed a range of devices and technologies for secure data erasing: Hard drive and magnetic media degausser "Lavina" 1. Degausser "Lavina" The device provides secure data erasing from any magnetic media at the end of their lifetime. The device erases contained on the technically functional media and on the media with hardware damages. "Lavina" uses the physical method of data erasing by effecting the media with powerfull electromagnetic pulse. During the erasing process (on the level of domain structure of the magnetic medium), not only user data but the service information as well is deleted (destructed) completely. Main features of the device: Data erasing from hard disks, including defective disks. Data erasing from any other magnetic media (floppy-disk, ZIP, Jazz, streamer tapes. cassettes). Istant operation ( 0,1 second).

2. "DiskMaster" System The system is designed for data acquisition from hard disks and provision of storage security and information leakage prevention. The system provides fast (up to 3,5 GB/min) data acquisition from HDD during computer security incidents investigations. In this case, the channel, to which the investigated drive is connected, is hardware write protected. This guarantees impossibility of accidental or deliberate data modification on the investigated HDD in the process of analysis and investigation. "DiskMaster" provides data erasing by two methods: a) physical methods by effecting media with the electromagnetic pulse; b) overwrite method, when random or special patterns are recorded repeatedly in all sectors of the drive. Hard disk service system "DiskMaster" 3. Data safe "Kolchuga" It is designed for emergency data erasing on hard disks in Data safe "Kolchuga" cases of the risk of malicious physical access to of a computer (drive) for prevention of information leakage. "Kolchuga" may provide continuous protection for up to 4 running hard disks at the same time, thus allowing its application in PCs and multi-disk RAID systems. The system may be activated manually directly from the front panel, and remotely: а) using a radio-trinket with a range of 100 m; b) by call or SMS from a standard mobile phone. System "Kolchuga" allows integration in an existing burglar alarm system with automatic initiation of data erasing by movement sensors, premises unsealing sensors, etc.

Cooperation with the world leaders in the field of data recovery There are few companies in the world professionally dealing with data recovery. This work requires deep theoretical and practical knowledge in the field of IT-technologies, formation of computer systems and data storage devices, availability of own research laboratories and departments for development of new technologies and performing of experimental developments, and production of specialized advanced equipment or its application. Only world's prominent companies in the field of data storage and recovery can evaluate the level of company proficiency, working in data recovery sector. High quality services and high level of technologies allowed the EPOS Data Recovery Center to reach acknowledgement of such several companies: 1. In 2003 EPOS became the first exclusive partner in CIS of the world leader Ontrack. Ontrack Data Recovery is the largest company of the world in the field of data recovery. Ontrack has 30 offices in 19 countries of the world. The number of data recovery engineers working with Ontrack 10 times exceeds the number of such engineers of the nearest competitor. Ontrack services are enjoyed by 98 from 100 the largest companies of the world from the list Fortune 100. Ontrack services are recommended to the leading world manufacturers of data storage devices: Fujitsu, IBM, Maxtor, Quantum, Samsung, Seagate, Toshiba, Western Digital etc. Consolidation of efforts of EPOS and Ontrack in development of the new software and hardware, exchange of technologies and experience allowed to provide a high level of service and to achieve the highest level of successful data recovery in Ukraine.

2. Since 2003 "EPOS" is Samsung technical center for data recovery. For 5 years the Data Recovery Center has been working within the loyalty program for the users of Samsung hard disks. This program includes: Free of charge data recovery services for Hi-End class Samsung hard drives. This service is provided on the priority terms. Warranty preservation for all Samsung hard drives in case of data recovery on them, even in the case of opening of the drive enclosure. Replacement of the guaranteed drive is performed immediately in EPOS Data Recovery Center. Special warranty terms for Samsung hard drives for corporate customers with higher requirements to information security. 3. In 2005 EPOS signed an agreement with the leading world server manufacturer - Hewlett-Packard - about cooperation in the field of data recovery and data storage security. According to this agreement, EPOS acquired a status of HP partner in the field of servers data recovery. Due to technical support of Hewlett-Packard, EPOS got the possibility to improve its technologies of RAID data recovery. Users of HP ProLiant servers may enjoy unprecedented for the world IT market conditions of warranty. For the first time in the world, data are recovered from servers free of charge in EPOS Data Recovery Center, on the priority terms, within 1-3 days. Replacement of the failed components is also performed immediately in the center.