Degaussing magnetic data storage media

Degaussing magnetic data storage media

Degaussing magnetic data storage media

Degaussing magnetic data is the process of decreasing or eliminating a remnant magnetic field.

Data is stored in the magnetic media, such as hard drives, floppy disks, and magnetic tape, by making very small areas called magnetic domains change their magnetic alignment to be in the direction of an applied magnetic field. This phenomenon occurs in much the same way a compass needle points in the direction of the Earth’s magnetic field. Degaussing, commonly called erasure, leaves the domains in random patterns with no preference to orientation, thereby rendering previous data unrecoverable. There are some domains whose magnetic alignment is not randomized after degaussing. The information these domains represent is commonly called magnetic remanence or remanent magnetization. Proper degaussing will ensure there is insufficient magnetic remanence to reconstruct the data.

Erasure via Degaussing magnetic data may be accomplished in two ways: in AC erasure, the medium is degaussed by applying an alternating field that is reduced in amplitude over time from an initial high value (i.e., AC powered); in DC erasure, the medium is saturated by applying a unidirectional field (i.e., DC powered or by employing a permanent magnet). A degausser is a device that can generate a magnetic field for degaussing magnetic storage media

Degaussing magnetic data

Irreversible damage to some media types

Many forms of generic magnetic storage media can be reused after degaussing, including audio reel-to-reel tape, VHS videocassettes, and floppy disks. These older media types are simply a raw medium which are overwritten with fresh new patterns, created by fixed-alignment read/write heads.
For certain forms of computer data storage, however, such as modern hard drives and some tape backup drives, degaussing renders the magnetic media completely unusable and damages the storage system. This is due to the devices having an infinitely variable read/write head positioning mechanism which relies on special servo control data (e.g. Gray Code) that is meant to be permanently embedded into the magnetic media. This servo data is written onto the media a single time at the factory using special-purpose servo writing hardware.

The servo patterns are normally never overwritten by the device for any reason and are used to precisely position the read/write heads over data tracks on the media, to compensate for sudden jarring device movements, thermal expansion, or changes in orientation. Degaussing magnetic data indiscriminately removes not only the stored data but also the servo control data, and without the servo data the device is no longer able to determine where data is to be read or written on the magnetic medium. The medium must be low-level formatted to become usable again; with modern hard drives, this is generally not possible without manufacturer-specific and often model-specific service equipment.

DT Asia provides focused security solutions and services that secure your data at rest, data in motion and data in use. We provide best degaussing service in Singapore, Hard Disk Crusher, NSA degausser Singapore, DoD degausser Singapore.

You can further inquire following service from DT Asia: Degaussing service in Singapore, Degausser in Singapore,NSA degausser Singapore,US DoD degausser Singapore,IT security, IT asset disposal, line of sight, on-site, secure data destruction.

Degaussing Services in Asia

Degaussing Services

Degaussing services are becoming vital services for ending of data life in storage media. Information leakage is a major threat to all organisations. IT departments often spent millions of dollars on access security, anti-virus and intrusion-protection. This security fortress becomes inadequate when dealing with information leakage via data storage sanitization. DT Asia has the capability, competency and track record to provide organisations with effective data leakage protection solutions.

DT Asia’s secure data sanitization processes are ISO 9001:2008 certified, the first in its class in Singapore, signifying our commitment and priority to organisations’ security needs.

DT Asia’s secure data sanitization service covers all forms of electronic data storage media, which includes hard drive, magnetic tape, audio/video tape, optical media, flash media, static storage media, floppy and Zip cartridge, etc.

Besides data sanitization or degausing services, DT Asia also provides complete IT asset disposal solutions. Our capabilities include the management of the complete disposal process of asset verification, secure data sanitization and asset de-classification, proper destruction and disposal.

DT Asia provides a high quality degaussing service based on ISO 9001:2008 Certified – Secure Electronic Data Erasure & Destruction Services. We provide a quality checking process to demagnetizes the disk so that all data stored on the disk is permanently destroyed. Thus making the disk impossible to be recovered by any recovery tools available.

Degaussing Services

Kindly contact us for more details.

DT Asia provides focused security solutions and services that secure your data at rest, data in motion and data in use. We provide best degaussing service in Singapore, Hard Disk Crusher, NSA degausser Singapore, DoD degausser Singapore.

Secure Data Destruction

Data Terminator offer various Secure Data Destruction Services

secure data destruction

 

Hard Disk & Tape Sanitization

One of the key solutions to eliminate the risk of data falling into the wrong hands is to degauss hard drives prior to disposal. Hard drive degaussers use powerful magnets or an electromechanical “pulse” to erase data from hard drives. Similarly, tapes should also be properly degaussed before disposal.

In fact, DoD Requirements call for hard drives to be degaussed in an NSA listed Degausser and then physically destroyed prior to disposal.

CD/DVD Optical Media Destruction

Destroying CD/DVD Optical Media doesn’t have to be a problem.

Data Terminator has a variety of machines to meet NSA/CSS Specifications for CD/DVD Optical Media Destruction.

IT Asset Disposal

Proper IT asset disposal is becoming more and more important not just on the environmental issues but also on data confidentiality.

Many organizations do not have the dedicated resources or the bulk quantity to justify the investment of procuring the equipment. They may choose to outsource such destruction and disposal. Outsourcing can be affordable and safe when done properly. If you choose this option, ask what methods will be used, where your items will be kept prior to destruction, or if there are any on-site services, what happens to destroyed waste, and what proof you will get that those items were actually destroyed.

Data security is an ongoing process, by being aware of the threats and understanding the destruction options, you will be in a much better position to protect your business and yourself. You will have complete peace of mind that you have left nothing behind.

Data Terminator provides complete IT asset disposal solutions. Our capabilities include the management of the complete disposal process of asset verification, secure data sanitization and asset de-classification, proper destruction and disposal.

You can further inquire following service from Data Terminator: NSA degausser Singapore,US DoD degausser Singapore, Degaussing service in Singapore, Degausser in Singapore, IT security, IT asset disposal, line of sight, on-site, secure data destruction.

 

Enterprise Security Solutions

Enterprise Security Solutions

Enterprise Fraud Management

Enterprise Fraud Management (EFM) is a solution for detection of any suspicious activity or fraud incident in the Enterprise environment.

SSH Communication Security

SSH Communication Security providing an overall coverage for secure access communication on a network. This include monitoring, auditing, and controlling access of the communication.

User Activity Auditing & Monitoring

Keep track of the administrator or end user activity from a centralize management. It also covers user access to remote servers, virtual desktops, or networking devices, and records these activities

Advanced Persistent Threat (APT) Detection

APT detection is a live memory analysis that detects and analyzes threats on compromised endpoints. Contrary to the antivirus or IDS approach of matching suspected malware or traffic patterns with known malware signatures, the live memory analysis agent gives the analyst a view from a centralized console of what is happening inside the computer’s memory. This view can quickly expose a malware infection, regardless of whether a signature exists or not.

Network Access Control

Network Access Control (NAC) provides a network with the mandatory extra layer of protection for all existing security policies. It allows the Network Administrator to configure access parameters for the physical network ports and determine which devices are allowed access. It is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.

DB Security

A Unified Database Solution including: Security, Caching, Auditing and Masking. The solution features a high-availability configuration to ensure business continuity. It has a broad range of security controls to protect databases (potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links) against compromises of their confidentiality, integrity and availability.

Endpoint Security.

The End Point Data Protection Suite delivers complete visibility, control, and protection of enterprise endpoints. It provides a comprehensive data protection solution in a single product, with a single management server and a single, lightweight agent.

HDD Hard Disk Drive Eraser

WipeDrive

WipeDrive is an erasure that able to wipe all data from your hard drives in accordance with some well-known standards such as (DoD 5220.22-M, HMG IS5 Baseline, HMG IS5 Enhanced, Canada Ops-II, US Army AR380-19, US Air Force 5020, German VSITR, NAVSO P-5239-26, NCSC-TG-025, Russian GOST P50739-95) making it unrecoverable.

By completely erase your hard drive, it protects your identity and other personal information, when buying, selling or throwing your computer away. It may also improve your system performance.

Hammer

• NIST Approved – Hammer erasure tool is compliant with NIST 800-36 and 800-88

• Supports Multiple Devices At One Time – Hammer erasure tool is able to process up to 4 hard disks at once

• All-In-One Device – Hammer erasure tool can not only erase, but also, partition, format and image source data to each of the drives.

The Hammer is a hard disk drive erasure tool. The device will securely erase all data written to the attached drives, up to 4 drives at once.

Both PATA and SATA interfaces are supported. Secure Erase is implemented allowing guaranteed, uninterrupted erasure of all data stored on the media.

If a drive does not support the secure erase command, NIST 800-36 and 800-88 compliant data erase methods are used.

Once each connected device is erased, the user can configure the system to partition, format and image source data to each of the drives.

Once the process has been started, the Hammer will execute each step until complete.

Hammer is a one step tool that will erase all data from a drive and prepare the drive to be redeployed into service.

Features:

• Secure Erase / Pattern Erase
• Auto Partitioning / Auto Formatting
• Auto Image Copy
• NIST 800-88 Compliant / NIST 800-36 Compliant
• SATA and PATA interfaces
• High Speed UDMA transfers
• Verify after complete
• Portable
• Up to Four Drives at one time
• USB 2.0 for storing and printing verification logs

Benefits

• Provides peace of mind that confidential data will not fall into the wrong hands.

• Meets data sanitization standards set by the US National Institute of Standards and Technology (NIST) and The US Department of Defense