Understanding secure data erasure and end-of-lifecycle IT asset management.

Slides:



Advertisements
Similar presentations
The Company that Buys, Sells, and Maintains Enterprise I.T.1 KruseCom Buys, Sells, and Maintains Enterprise I.T.
Advertisements

IBM’s Transformation to a Services Company and the Growth of Digital Trade Michael DiPaula-Coyle IBM Governmental Programs.
© 2007 IBM Corporation Enterprise Content Management Integrating Content, Process, and Connectivity for Competitive Advantage Malcolm Holden October 2007.
Data Destruction and The Impact on Recycling. Data Breaches In 2012, over 26M records from 617 data breaches were made public Average costs: –$194 per.
Environmentally Sustainable IT Una Du Noyer 20 th February 2008.
©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain Digital is a trademark of Iron Mountain Incorporated. Stanford University ©2006 Iron.
Phone: (919) Fax: (919) CFR Part 11 FDA Public Meeting Comments Presented by: M. Rita.
“Advancing Electronics Recycling in the Midwest” A workshop by the Illinois Recycling Association & NRC Neil Peters-Michaud Co-founder and CEO CASCADE.
ECONOMIC EVALUATION OF POLLUTION PREVENTION PROJECTS CHAPTER 11.
Corporate Environmental Strategy Creating the Culture/Values Paul Hawken notes, "We are far better at making waste than at making products. For every 100.
Security Controls – What Works
IS Security Control & Management. Overview n Why worry? n Sources, frequency and severity of problems n Risks to computerized vs. manual systems n Purpose.
More than just an end of life solution A Best Practice Solution for sanitizing hard drives during their entire lifecycle CRADLE REFRESHES  Storage transfers.
The Cloud: Demystified Neil Cattermull Frontier Technology.
WHAT’S A TECHNOLOGY SYSTEM? A technology system is a machine that processes digital data. A computer is a technology system. A computer installation is.
Friday, August 14, 2015 Print Management has helped organizations worldwide to significantly reduce the cost and environmental impact of clicking print.
Trends in Corporate Social Responsibility Reporting
A Comprehensive Solution Team Mag 5 Valerie B., Derek C., Jimmy C., Julia M., Mark Z.
WHERE WE ARE 22 member associations in 20 countries Over 4300 individual members who are responsible for risk management and/or insurance in their organisations.
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 13 1 John Caulfield.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission. Ingram.
Overview of Cybercrime
Information Assurance... Smart Card Interoperability Steve Haynes Phone
1 Brett Roberts Director of Innovation | Microsoft NZ | 28 Aug 07 Technology and Privacy.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Active KillDisk © v3.0 Active Data Security Solutions.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
Blancco – Data Erasure Management
Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper
Tampa Computer Recycling. Our Tampa computer recycling company takes responsibility of safely disposing of all older computer systems and their electronic.
Financial Institutions Accounting Dr. Salah Hammad Chapter 1 An Overview of the Changing Financial-Services Sector 2.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
12015/10/20 Muhammad Salman University of Indonesia.
The State of Computer & Data Security in Corporations Independent Survey.
ANDROID DATA CONFIDENTIALITY Tips and tools for keeping corporate confidential information confidential on Android Mobile Devices. Alex Mayer University.
COMPUTER HARDWARE REDEPLOYMENT AND DISPOSAL July 19, 2004.
Life cycle services for automation products
Desktop Virtualization Joshua Bradfield Dan Bacus Data Center Solutions Manager Sr. Engineer.
AIR POLLUTION PREVENTION AND CONTROL
Protecting Your Data With Just Get Backup, LLC. Agenda How important is your data – Acknowledging worst-case scenarios. Understanding that data backup.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Why Collect and Recycle Electronics -Clive Hess. Benefits of Recycling Establishes more jobs, economic development, and tax revenue Makes less impact.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Welcome to the ICT Department Unit 3_5 Security Policies.
Data-Tech Guardian Endpoint Security Suite. Guardian Endpoint Security Suite secures All Things Mobile TM from one management console.
Speaker Name Speaker Title Date Get the Most from Your Technology Investment Cisco Services.
Clients and Prospective Clients on the Threat of Cyber Crime
Functions and Forms of Banking
Learn Your Information Security Management System
BUSINESS CONTINUITY BY HUI ZHENG.
Green University of Bangladesh
Attention! In order to print this two-page flyer, please follow these steps: 1) Personalize the text and logo area with your custom copy and logo. 2) Delete.
WhiteCanyon ADISA Presentation
Workgroup Technology Partners
Information Security based on International Standard ISO 27001
My First Template.
My First Template.
Chapter 3: IRS and FTC Data Security Rules
I have many checklists: how do I get started with cyber security?
Data Erasure Solutions and Services
of Technology Recycling
SOUTH AFRICAN INSURANCE ASSOCIATION
IBM Global Financing IBM Asset Recovery Solutions
IT Management, Simplified
Presentation transcript:

Understanding secure data erasure and end-of-lifecycle IT asset management

Presentation Agenda 1.Blancco’s expert credentials 2.Explanation of secure data erasure and benefits of Blancco 3.Blancco’s solutions; products and services

Blancco’s expert credentials Who are we to speak?

Who are we to speak? Why Blancco can claim to be the global leader Certified data erasure software Blancco has over 10 years experience with both public and private sector organisations Millions of licenses used worldwide with tens of thousands of assets erased daily BLANCCO IS THE MOST CERTIFIED AND RECOMMENDED PROVIDER

Half of the Fortune Global Top 10 companies use Blancco

Five biggest banks out of ten trust on Blancco

Over third of top pharmaceutical / chemical companies run Blancco

Explanation of secure data erasure and benefits of Blancco Certified Data Erasure Software

Blancco’s secure data erasure Blancco uses software-based overwriting that destroys all electronic data. Overwriting goes beyond file deletion commands which only removes direct pointers to the actual files. Physical destruction, which render the disk unusable, data erasure removes all data while leaving the hard drive operable.

Risks associated with poor data leak prevention Identity theft Prison sentence* Federal and/or civil liability* Exorbitant fines or lawsuits* Irreparable damage to an organisation’s reputation Loss in consumer confidence / bad will and decline in revenue * Blancco is compliant with HIPAA, FACTA, Gramm Leach Bliley and Sarbanes Oxley acts. Violating regulatory compliance may cause up to 20 years in prison and 1 million USD fines

Consider Blancco an investment not a cost Faster process time and less resources required than alternatives Value of IT Assets can be unlocked if safely processed – Reuse / Resell / Donate Company value and reputation can be greatly improved: – Fit with environmental policies – Compliance with security and corporate governance regulations – Shareholder value and profitability – Employee relations and values

Blancco vs Physical Destruction ECOLOGICAL Manufacturing computers takes a lot of energy and natural resources (81% of computer’s lifecycle energy consumption). Old PCs are a problematical waste. Extending the lifecycle is ecological and good for company image. ECONOMICAL There is value in a reusable computer with the possibility to sell or donate computers or their parts. Process improvements and faster method using less human resource and time. SECURE Certified process, Blancco eliminates human error. 100% compliant with automated reporting to prove the data destruction.

Detailed erasure report includes IT asset management

Blancco’s solutions; products and services Blancco know-how and solutions

Service providers Leasing, Financing and Managed Service Providers Public Sector International Institutions, National governments, Defense, Police, Healthcare, Local Municipalities and Education Corporate Banking, Insurance, Retail, Industry, Forestry, Engineering and Foundations ITADs Refurbishers and recyclers

Blancco solutions ERASURE CLIENT SOFTWARE Desktops, Laptops, Servers and Storage Equipment

Blancco Kit

Blancco Tool Kit

Blancco goes beyond the competition Widest range of hardware supported and under continual development. Blancco is able to access all areas on the hard drive. – Erasure and detection of locked/hidden sectors (DCO, HPA), remapped sectors and bypass of operating system and BIOS given hard disk parameters. Bad sector detection. 18 international and national level standards: NIST, HMG, US DoD etc., including possibility to create user defined erasure.

Blancco software is used to provide you with the following benefits: Increased data security. Assuring regulatory compliance Minimised environmental impact Creation of alternative revenue streams Reduced costs with faster, cheaper and improved processing of IT assets

What should a secure data erasure policy contain? 3 CRITERIAS FOR DATA ERASURE: E RASURE – Certifications – 16 supported data erasure standards R EPORTING – Erasure reports from every erasure – Justice for IT Manager A UDITING – Erasure process must be supervised – internal checks – All reports to one database

Thanks for your time! Please feel free to ask questions and comment on Blancco and data erasure. You can also learn more at or