More than just an end of life solution A Best Practice Solution for sanitizing hard drives during their entire lifecycle CRADLE REFRESHES  Storage transfers.

Slides:



Advertisements
Similar presentations
Data Destruction for the 21 st Century 1/3/20141.
Advertisements

Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
AOC Services EPA Analytical Operations/Data Quality Center August 14 th, 2001 US Navy/NAVSEA Training Session.
OVERVIEW TEAM5 SOFTWARE The TEAM5 software manages personnel and test data for personal ESD grounding devices. Test and personnel data may be viewed/reported.
Understanding secure data erasure and end-of-lifecycle IT asset management.
Business Introduction Table of Contents Introduction to Green Data, Inc.1 Green Data Services2 Scanning3 Archiving & Storage4 Shredding5 Consulting6.
Windows Deployment Services WDS for Large Scale Enterprises and Small IT Shops Presented By: Ryan Drown Systems Administrator for Krannert.
THE WORLD’S PREMIER SOLUTION FOR SANITIZING HARD DRIVES PRIOR TO REPURPOSING OR DISPOSAL DIGITALSHREDDE R PRODUCT PRESENTATION PARTNER LOGO PARTNER CONTACT.
Dell Compellent and SafeNet KeySecure
Data Destruction and the Impact on Recycling Albert Hacker – Business Solutions Advisor (615)
MCITP Guide to Microsoft Windows Server 2008, Server Administration (Exam #70-646) Chapter 2 Installing Windows Server 2008.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Media Sanitization  NIST Guidance  Terms Defined  When is media under/not under your control?  Flowchart for decision making  Spreadsheet of.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Princeton PC Users Group Hard Drive Disaster! By Paul Kurivchack March 14, 2005.
What If You Could… …Automatically protect and secure your company’s most critical business information?... …Get more done with less by enabling employees.
Security Controls – What Works
Agenda Safe disposal practices for computers and information: –Removing files and folders –Disposing of computers –Disposing of other electronic devices.
School Management Software
PMI Inventory Tracker™
A+ Guide to Software, 4e Chapter 11 Supporting Printers and Scanners.
Fine Point Technologies Remote Device Administrator.
Equipment Surplus & Secure Media Destruction Michael Thorn, Data Security Specialist.
FreightSupplyChain Trinity Business Solutions Limited International Freight Consolidators March 2001 Trinity Business Solutions Limited International Freight.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Hands-On Microsoft Windows Server 2008
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
What If You Could… …Automatically protect and secure your company’s most critical business information?... …Get more done with less by enabling employees.
IT Essentials 1 v4.0 Chapters 4 & 5 JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Data Decommissioning: Overwriting, Shredding, Degaussing, and Beyond January 28, 2009 ISSA-Baltimore Chapter Meeting Columbia, MD.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
AMSI Hosting Options User Panel Discussion Presented by Brian Torney Session 107 Advantages of Self Hosting.
Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Media Sanitization at the Idaho National Laboratory Jonathan Bates NLIT 2009.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
“From Cradle to Grave” Firearm Asset Control for the AFP From Introduction into Service to Disposal & Destruction Presented by: Federal Agent Paul McFawn.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Barcodes and MDS Easy ways to speed up and increase accuracy using barcodes in MDS Monday June 14, 2010.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Life cycle services for automation products
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
CSC190 Introduction to Computing Operating Systems and Utility Programs.
Introduction TO Network Administration
CABLING SYSTEM WARRANTY REGISTRATION. PURPOSE OF CABLING REGISTRATION.
University of Kentucky Records Management Tutorial Taking responsibility for the records you create and managing their life-cycles.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
NT1110 Computer Structure and Logic Unit 8 (Module 5A) COMPUTER OPERATION AND SECURITY.
IBM System x Systems Management Made Easy ibm
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Work on the Fly Hosted Solutions for Timeslips Customers
Dell Compellent and SafeNet KeySecure
Presentation For.
Replace with Application Image
IOT (Internet Of Things) Solutions For OEE & OPE for Phase - III
Data Erasure Solutions and Services
Searchable. Secure. Simple.
IBM System x Systems Management Made Easy ibm
Automated Bulk Signing Solution
E-Lock ProSigner ProSigner means “Professional Signer” signifying the software that can apply legally enforceable Advanced electronic signatures to electronic.
Chapter 11 Supporting Printers and Scanners
24/7/365 Remote Computer Support
Introduction to the PACS Security
Presentation transcript:

More than just an end of life solution A Best Practice Solution for sanitizing hard drives during their entire lifecycle CRADLE REFRESHES  Storage transfers to a new user or server  Maintenance  Tech refresh or return at end of lease  Completion of a project  Employee turnover  Returning a computer under warranty  Protection from unauthorized access  A virus that is detected  Attack from a hacker GRAVE End of Life AFTERLIFE Reformat & Recycle DRIVE LIFECYCLE

5.6 Billion Hard Drives Produced from Million Hard Drives Reach end of life in – 3 Refreshes Can occur during a hard drives lifecycle One gigabyte of data on a hard drive = Approximately one dump truck of compacted paper Well Publicized Laws HIPAA, FACTA, SOX, FISMA Gramm-Leach-Bliley Consequences of a Breach Fines, Loss of License & Loss of Reputation 39% of Customers Explore other options after a data breach occurs 49% OF ALL DATA BREACHES RESULT FROM LOST OR STOLEN HARD DRIVES & LAPTOPS CURRENT SITUATION

ATTENDEES: MISSION: Develop a technology for sanitizing hard drives beyond forensic reconstruction – retain the ability to reuse the hard drive. OUTCOME: The Industry collaborated with The CMRR, under the direction of the NSA to develop Secure Erase.  Now part of the ATA Rev 4 Spec for hard drive manufacturers  A destruction command is embedded in the firmware of hard drives  It is an atomic process eradicating all user data beyond forensic recovery  Up to 18 times faster than ineffective overwrite routines  Compliant, certified standards based technology  Implemented by global hard drive manufacturers in 2002 BIOS and Operating System developers blocked the ability to initiate Secure Erase. SECURE ERASE

Australian Department of Defence (ACSI-33) RCMP Canadian Government B2-001 UK-HMG Infosec Standard 5 {IS5} and CESG Manuel S UNITED STATES NIST SP COMPLIANCE CLEAR PURGE DESTRUCTIO N Commercial Software Level of security: protection against keyboard attack Disintegration, Incineration, Pulverizing, or Melting Level of security: protection against laboratory attack Secure Erase, Degaussers Level of security: protection against laboratory attack Secure Erase is a high level of protection because you can validate the data is gone beyond forensic reconstruction & reuse the hard drive

DIGITALSHREDDER FEATURES Vacant bay, available for use Drive is loaded and ready, but no operation is taking place, blinks green when process is completed Process is being executed, bay is mechanically locked and password protected Reformatting / imaging  Sector Viewer  Certification Labels  User Adjustable log-out for secure access  Tiered user access – admin/user levels  Built in searchable history log  History log downloadable to CSV format  Large touch screen interface  No keyboards, mouse or cables  No Ethernet or Bluetooth connection  Ability to partition, reformat & reimage drives  8 – 18x faster than overwrite applications  Single point solution  User upgradable firmware  Portable & Scalable  Lock-down Bays for security  LED lights indicate current process running

Comparison of Data Destruction Methods Best Practice Requirements Digital Shredder Commerci al Software Degaussing Machines Mechanical Destruction Third Party Provide a single point solutionYESYesNo Destroy data beyond forensic reconstruction YESNoUncertain Maintain care, custody, & control over the process YESNo Imbed an automated certification process YES Uncertai n No Deploy a scalable process for corporate-wide compliance YESNo Yes Verify drive sanitization by sectorYES Uncertai n No Provide a green solution that allows reuse of hard drives YESYesNo Uncertai n BEST PRACTICE

GETTING STARTED DETERMINE YOUR NEEDS: A Needs Analysis will determine your requirements to develop a Digital Shredder placement plan that meets your needs. For example, your current backlog of hard drives (if any) and the types of hard drives in your environment. DETERMINE IMPLEMENTATION: After your needs are determined, we will create an agreement with you that offers one of three options – long term consignment, short term consignment or on/off site service. DEPLOYMENT & TRAINING: The Digital Shredder ships with easy to use instructions. If necessary, training will be conducted either on site or via the web. Training includes setup, administrative Digital Shredder functions, erasure functions, effectively managing the log and efficient sanitization practices Design. Features. Capacity Make a security and financial difference

NO CAPITAL EQUIPMENT INVESTMENT REQUIRED OPTIONS Number of Hard DrivesNumber of Days 100 – – – – – Easy Steps: 1.Determine the number of drives you must refresh or purge; 2.Contact us with your count and schedule the Shredder; 3.Set-up a web training session for your project leader; 4.Remove drives from computers before your unit arrives; 5.Purge your drives; price per purge is $25. Volume will determine how many days the Digital Shredder is deployed. OPTION II: SHORT TERM CONSIGNMENT Short term placement at your facility for project work OPTION I: LONG TERM CONSIGNMENT Place the Digital Shredder on a permanent basis with a revolving 12-month consignment Pricing Level Min Purges / Unit MSRP I2,000 +$ 10 II1, III1, IV Mechanics: 1.25% of your purge requirement will be preloaded into the unit and is due prior to shipment; 2.Replenishments can be ordered electronically. OPTION III: ON OR OFF SITE SERVICE We provide the service. Pricing will be quoted based on # of drives and time required.