Information leakage prevention service

Information leakage prevention service

Information leakage is a major threat to all organisations. IT departments often spent millions of dollars on access security, anti-virus and intrusion-protection. This security fortress becomes inadequate when dealing with information leakage via data storage sanitization. Data Terminator has the capability, competency and track record to provide organisations with effective data leakage protection solutions. Information leakage prevention is critical for your business.

Data Terminator’s secure data sanitization processes are ISO 9001:2008 certified, the first in its class in Singapore, signifying our commitment and priority to organisations’ security needs.

Data Terminator’s secure data sanitization service covers all forms of electronic data storage media, which includes hard drive, magnetic tape, audio/video tape, optical media, flash media, static storage media, floppy and Zip cartridge, etc.

Besides data sanitization, Data Terminator also provides complete IT asset disposal solutions. Our capabilities include the management of the complete disposal process of asset verification, secure data sanitization and asset de-classification, proper destruction and disposal.

Information leakage prevention

When a file is erased or deleted from your computer, the actual data in the file is not gone forever. The space utilized by that file is simply marked as “free” for use by other data. The case also applies to hard disks which are spoilt or with bad sectors. The fact is your data is still lurking in those hard disks that have no operational use.

Many people would think that once other data is written in that space, the original data becomes gone forever. However, with data recovery tools readily available, it is now possible to recover data even after it has been written over a few times.

Data Terminator provides secure and comprehensive data sanitization equipment and services with full compliance and quality to give our customers complete peace of mind. The secure data sanitization equipment used are all NSA-certified and our data sanitization process is ISO-certified.

Safend Data Protection Suite

Data Protection

Q: What does Safend do?

Safend Data Protection Suite protects organizations from data leakage and theft with a single software product providing granular port and device control, transparent hard disk encryption, comprehensive removable media encryption and accurate content control. It provides complete protection of sensitive data-in-use, data-at-rest and data-in-motion, without sacrificing productivity.

Q: What is an “endpoint”?

“Endpoint” refers to all enterprise workstations, laptops, and kiosks.

Data Protection

Q: What kinds of devices are commonly connected at endpoints?

A myriad of devices are connected to endpoints, including media players, handhelds, smart phones, printers, scanners, multi-function peripherals (scan/fax/print), Disk on Keys, CD/DVD-RWs, removable hard-drives, and other portable storage devices.

Q: Where can I get answers to questions not addressed here?

You may contact Data Terminator at info@data-terminator.com This e-mail address is being protected from spambots. You need JavaScript enabled to view it for any questions concerning Safend.

Q: How can I evaluate Safend products?

To request an evaluation of the Safend Data Protection Suite go to the Data Protection Suite page or click here.

The Safend Auditor can be downloaded from our Safend product page or by clicking here.
To request an evaluation of the Safend Protector go to the Protector product page or click here.
To request evaluation of the Safend Encryptor go to the Encryptor product page or click here

Q: What new Safend products are on the horizon?

Safend has a very aggressive development cycle and strives for frequent product updates. Future versions will include even more granular control of an expanded number of endpoints, including mobile devices, and also include enhanced scalability and management features.

Since Safend recognizes the importance of Content Awareness as part of a data protection solution, we intend to introduce a new add-on product to our offering, Safend Inspector, during 2010. This product will further strengthen our offering by providing a comprehensive, accurate endpoint based data protection solution which enforces a data centric security policy across approved data transfer channels.

Contact inspector.beta@safend.com This e-mail address is being protected from spambots. You need JavaScript enabled to view it to join the Safend Inspector Beta Program

Q: Does Safend have any type of ‘software assurance’ or maintenance program?

Yes, Safend offers a comprehensive maintenance and support program for all customers. This program assures customer access to software bug fixes, updates and version releases. The program can be purchased for a one-, two- or three-year period, which can then be extended on an annual basis.

Q: How do Safend products compare to other endpoint solutions available today?

Safend Data Protection Suite has several advantages over other endpoint security products:

Safend Data Protection Suite allows you to control all your data protection measures with a single management server, single management console and a single lightweight agent.

Operational friendly deployment and management

Best of breed port and device control, with instant visibility of connected devices (both current and past), and granular, flexible control over all physical and wireless ports.

Hard disk encryption is completely transparent and does not change end user experience and common IT procedures

Comprehensive and enforceable removable media encryption

Full control over sensitive data both inside and outside organizational network

Track file transfers from encrypted devices even on non-corporate computers

Q: Why do I need additional endpoint protection if we have the latest versions of Microsoft Windows and a firewall deployed?

Operating systems such as Microsoft Windows XP have only limited endpoint security functionality built-in. Endpoint security is not included in domain controlling and management software, nor in network security solutions such as firewalls. A separate, incremental solution like Safend is required to gain full visibility and granular, flexible control of all endpoints.

Q: What products does Safend offer and what do they do?

Safend Data Protection Suite protects organizations from data leakage and theft with a single software product. It provides complete protection of sensitive data-in-use, data-at-rest and data-in-motion, without sacrificing productivity.

Safend Data Protection Suite consists of Safend Protector with its two add-on modules – Safend Encryptor and Safend Reporter. Safend Protector provides an enterprise grade, client-server management infrastructure for endpoint port control, device control and removable media encryption. Safend Encryptor, a license activated add-on module, expands the product security capabilities to protect the data on the endpoint in case of lost or theft. Safend Reporter add-on module provides visibility into the security status of the organization with automatic report generation. All functionality is provided by a single software product, with a single management server and a single lightweight agent.

Safend Auditor is additional clientless software for immediate risk assessment through endpoint port and device auditing.

Q: Is endpoint security a serious issue?

Endpoint security is a bona fide issue documented by analysts, the media, and organizations that have suffered losses because they did not have an endpoint security solution in place.

While most organizations adequately protect Internet connections via TCP/IP ports (for example, using a firewall), endpoints are often overlooked. An increasing amount of data points to the need to add endpoint protection to any proactive security policy.

Q: What risks are associated with these devices connected at endpoints?

Endpoints can present serious risks to the network and the organization as a whole:

Data Leakage: Large amounts of sensitive information and Intellectual Property can be stolen through endpoints

Infiltration: Malicious code including viruses, worms and Trojan horses can be infiltrated through endpoints

Non-Compliance: Personal information may be exposed at endpoints, leading to non-compliance with data privacy laws such as HIPAA and the Sarbanes Oxley Act.

Secure Storage Devices

Data Terminator offers Secure Storage Devices

Aegis Secure Key – USB 2.0 Flash Drive

Secure Storage Devices data Terminator offers Secure Storage Devices, degaussing services singapore,hard disk destruction singapore,erase hard disk

Encrypted USB Flash Key with PIN access

Quick Overview

  • Military grade Full-disk AES 256-bit CBC Hardware Encryption
  • PIN activated 7-15 digits – Alphanumeric keypad use a memorable number or word for your PIN
  • Dust and water resistant
  • No software or drivers required
  • OS and platform independent – compatible with Windows, Mac, Linux and embedded systems
  • Works with any USB/USB On-The-Go devices

Aegis Padlock – USB 3.0

Encrypted USB 3.0 Hard Drive with PIN Access

Quick Overview

  • Secure PIN Access
  • Integrated USB 3.0 cable – Data transfer speeds up to 10X faster than USB 2.0
  • Choice of real-time 128-bit or 256-bit Military Grade AES-XTS Hardware Encryption
  • Software free design – No admin rights required
  • Compatible with any OS – Windows, Mac & Linux

Aegis Padlock DT – USB 3.0 Desktop Drive

Encrypted Desktop Hard Drive with PIN Access

Quick Overview

  • Secure PIN Access
  • Choice of real-time 128-bit or 256-bit Military Grade AES-XTS Hardware Encryption
  • Solid Aluminum Enclosure
  • Software free design – No admin rights required
  • Compatible with any OS – Windows, Mac & Linux

Apricorn Padlock – USB 2.0

Encrypted Hard Drive with PIN Access

Quick Overview

  • Secure PIN Access
  • Allows up to 10 PIN Passkeys
  • Choice of real-time 128-bit or 256-bit Military Grade AES Hardware Encryption
  • Integrated USB cable
  • Software free design – No admin rights required
  • Compatible with any OS – Windows, Mac & Linux

Aegis Padlock Pro – eSATA | USB 2.0

Encrypted Hard Drive with PIN Access

Quick Overview

  • Secure PIN Access
  • Real-time 256-bit AES Hardware Encryption
  • Ultra-fast eSATA and USB interface for data transfer rates of up to 90MB/sec
  • Software free design – No admin rights required
  • Compatible with any OS – Windows, Mac & Linux

Enterprise Security Solutions

Enterprise Security Solutions

Enterprise Security Solutions, Data Terminator offer various of Enterprise Security Solutions, degaussing services singapore,hard disk destruction singapore,erase hard disk singapore

Enterprise Fraud Management

Enterprise Fraud Management (EFM) is a solution for detection of any suspicious activity or fraud incident in the Enterprise environment.

SSH Communication Security

SSH Communication Security providing an overall coverage for secure access communication on a network. This include monitoring, auditing, and controlling access of the communication.

User Activity Auditing & Monitoring

Keep track of the administrator or end user activity from a centralize management. It also covers user access to remote servers, virtual desktops, or networking devices, and records these activities

Advanced Persistent Threat (APT) Detection

Enterprise Security Solutions

APT detection is a live memory analysis that detects and analyzes threats on compromised endpoints. Contrary to the antivirus or IDS approach of matching suspected malware or traffic patterns with known malware signatures, the live memory analysis agent gives the analyst a view from a centralized console of what is happening inside the computer’s memory. This view can quickly expose a malware infection, regardless of whether a signature exists or not.

Network Access Control

Network Access Control (NAC) provides a network with the mandatory extra layer of protection for all existing security policies. It allows the Network Administrator to configure access parameters for the physical network ports and determine which devices are allowed access. It is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.

DB Security

A Unified Database Solution including: Security, Caching, Auditing and Masking. The solution features a high-availability configuration to ensure business continuity. It has a broad range of security controls to protect databases (potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links) against compromises of their confidentiality, integrity and availability.

Endpoint Security.

The End Point Data Protection Suite delivers complete visibility, control, and protection of enterprise endpoints. It provides a comprehensive data protection solution in a single product, with a single management server and a single, lightweight agent.

Secure Data Destruction

Data Terminator offer various Secure Data Destruction Services

Secure data destruction data Terminator offer various Secure Data Destruction, degaussing services singapore,hard disk destruction singapore,erase hard disk…

secure data destruction

Hard Disk & Tape Sanitization

One of the key solutions to eliminate the risk of data falling into the wrong hands is to degauss hard drives prior to disposal. Hard drive degaussers use powerful magnets or an electromechanical “pulse” to erase data from hard drives. Similarly, tapes should also be properly degaussed before disposal.

In fact, DoD Requirements call for hard drives to be degaussed in an NSA listed Degausser and then physically destroyed prior to disposal.

CD/DVD Optical Media Destruction

Destroying CD/DVD Optical Media doesn’t have to be a problem.

Data Terminator has a variety of machines to meet NSA/CSS Specifications for CD/DVD Optical Media Destruction.

IT Asset Disposal

Proper IT asset disposal is becoming more and more important not just on the environmental issues but also on data confidentiality.

Many organizations do not have the dedicated resources or the bulk quantity to justify the investment of procuring the equipment. They may choose to outsource such destruction and disposal. Outsourcing can be affordable and safe when done properly. If you choose this option, ask what methods will be used, where your items will be kept prior to destruction, or if there are any on-site services, what happens to destroyed waste, and what proof you will get that those items were actually destroyed.

Data security is an ongoing process, by being aware of the threats and understanding the destruction options, you will be in a much better position to protect your business and yourself. You will have complete peace of mind that you have left nothing behind.

Data Terminator provides complete IT asset disposal solutions. Our capabilities include the management of the complete disposal process of asset verification, secure data sanitization and asset de-classification, proper destruction and disposal.

You can further inquire following service from Data Terminator: NSA degausser Singapore,US DoD degausser Singapore, Degaussing service in Singapore, Degausser in Singapore, IT security, IT asset disposal, line of sight, on-site, secure data destruction.

Degaussing Services in Asia

Degaussing Services

Degaussing services are becoming vital services for ending of data life in storage media. Information leakage is a major threat to all organisations. IT departments often spent millions of dollars on access security, anti-virus and intrusion-protection. This security fortress becomes inadequate when dealing with information leakage via data storage sanitization. Data Terminator has the capability, competency and track record to provide organisations with effective data leakage protection solutions.

Data Terminator’s secure data sanitization processes are ISO 9001:2008 certified, the first in its class in Singapore, signifying our commitment and priority to organisations’ security needs.

Data Terminator’s secure data sanitization service covers all forms of electronic data storage media, which includes hard drive, magnetic tape, audio/video tape, optical media, flash media, static storage media, floppy and Zip cartridge, etc.

Besides data sanitization or degausing services, Data Terminator also provides complete IT asset disposal solutions. Our capabilities include the management of the complete disposal process of asset verification, secure data sanitization and asset de-classification, proper destruction and disposal.

Data Terminator provides a high quality degaussing service based on ISO 9001:2008 Certified – Secure Electronic Data Erasure & Destruction Services. We provide a quality checking process to demagnetizes the disk so that all data stored on the disk is permanently destroyed. Thus making the disk impossible to be recovered by any recovery tools available.

Degaussing Services

Kindly contact us for more details.

Or visit our website to find out more

Data Terminator provides focused security solutions and services that secure your data at rest, data in motion and data in use. We provide best degaussing service in Singapore, Hard Disk Crusher, NSA degausser Singapore, DoD degausser Singapore.

Hard Disk Erasure service in Singapore

Hard Disk Erasure

Hard Disk Erasure is the method of securely remove data from hard disk while keeping the hard drive functioning or reusable. If you need to erase the data on a SCSI, IDE/PATA, SATA, laptop or SAS hard drive and then reuse or recycle hard drive, Data Devices’ line of DOD-approved hard drive erasers overwrite and erase the data on the drive, ensuring complete data security. The DOD-approved application WipeOutoverwrites and erases the drive 8 times. This guarantees the original data on the drive is unrecoverable to Department of Defense specifications. These units come standard with WipeOut Fast, which provides fast and comprehensive erasure. Our line of hard drive erasers and duplicators also supports solid state flash memory.

Data Terminator provides an ISO 9001 Certified for high quality Secure Electronic Data Erasure Services on any storage media such as PATA, SATA, or SCSI. There are many options of hard disk erasure. One of it is Software Erase, by overwriting the sector of the disk with a new value with certain amount of passes to ensure that the data is harder to recover. But we also provides a better option than software erase, “Secure Erase” which initiate the drive internal secure erase command, security erase unit, based on the ATA specification by the T13 technical committee.

If you have any request on data removing / restoring and degaussing, especially Hard Disk Erasure, please contact Data Terminator for a help.

Hard Disk Erasure

  • Kindly contact us for more details.
  • Or visit our website to find out more service and products

You can further inquire following service from Data Terminator: IT asset disposal, line of sight, on-site, secure data destruction,Degaussing service in Singapore, Degausser in Singapore,NSA degausser Singapore,US DoD degausser Singapore,IT security.

What is Degaussing?

Degaussing is a separate process from the computer system. It is a process that utilizes a machine to produce a strong electromagnetic field that destroys magnetically recorded data on a magnetic media. (E.g. hard disk and tape media…)

Who and Why degaussing is needed for your media?

• Radio/Television broadcasters: enables expensive tapes to be re-used.
• Computer departments of corporations: allows re-use of back up tapes and safe disposal of information from PC hard drives.
• Data Storage Companies: data no longer needed can be easily and efficiently erased.
• Defense Organisations: confidential and top secret information can be erased.
• CCTV Operators: allows VHS tapes to be re-used again and again.
• Audio/Video duplicators: allows re-use of any production over runs and returned out of date tapes.
• Financial Services: Banks and insurance companies can use a degausser to re-use magnetic media for voice logging systems.
• Emergency Services: Re-use tapes used in voice logging systems.
• Hospitals: erase sensitive information held on magnetic media, such as patient records no longer required.
• Universities: allows student records that are no longer needed to be erased.

Hard Disk Cloning

Hard Disk Cloning

Hard Disk Cloning, Data Terminator uses tools such as the PSIClone™ to “clone” hard disks for customers’ usage. The PSIClone™ is packed with useful features for the forensic investigator. Designed with forensic data integrity in mind, a key feature of PSIClone™ is that the user is unable to write to the ‘source’ side of the device. With the included data recovery software, PSIClone has everything you need to perform data recovery right out of the box.

hard disk cloning

While PSIClone™ is a drive-to-drive cloning and imaging device, it stands out from other such devices because PSIClone™ has the ability to perform a robust compression while imaging a drive thereby allowing you to place images of multiple drives on one dump drive. This saves time and money.

Degaussing magnetic data storage media

Degaussing magnetic data storage media

Degaussing magnetic data is the process of decreasing or eliminating a remnant magnetic field.

(Wikipedia) Data is stored in the magnetic media, such as hard drives, floppy disks, and magnetic tape, by making very small areas called magnetic domains change their magnetic alignment to be in the direction of an applied magnetic field. This phenomenon occurs in much the same way a compass needle points in the direction of the Earth’s magnetic field. Degaussing, commonly called erasure, leaves the domains in random patterns with no preference to orientation, thereby rendering previous data unrecoverable. There are some domains whose magnetic alignment is not randomized after degaussing. The information these domains represent is commonly called magnetic remanence or remanent magnetization. Proper degaussing will ensure there is insufficient magnetic remanence to reconstruct the data.

Erasure via Degaussing magnetic data may be accomplished in two ways: in AC erasure, the medium is degaussed by applying an alternating field that is reduced in amplitude over time from an initial high value (i.e., AC powered); in DC erasure, the medium is saturated by applying a unidirectional field (i.e., DC powered or by employing a permanent magnet). A degausser is a device that can generate a magnetic field for degaussing magnetic storage media

Degaussing magnetic data

Irreversible damage to some media types

Many forms of generic magnetic storage media can be reused after degaussing, including audio reel-to-reel tape, VHS videocassettes, and floppy disks. These older media types are simply a raw medium which are overwritten with fresh new patterns, created by fixed-alignment read/write heads.
For certain forms of computer data storage, however, such as modern hard drives and some tape backup drives, degaussing renders the magnetic media completely unusable and damages the storage system. This is due to the devices having an infinitely variable read/write head positioning mechanism which relies on special servo control data (e.g. Gray Code) that is meant to be permanently embedded into the magnetic media. This servo data is written onto the media a single time at the factory using special-purpose servo writing hardware.

The servo patterns are normally never overwritten by the device for any reason and are used to precisely position the read/write heads over data tracks on the media, to compensate for sudden jarring device movements, thermal expansion, or changes in orientation. Degaussing magnetic data indiscriminately removes not only the stored data but also the servo control data, and without the servo data the device is no longer able to determine where data is to be read or written on the magnetic medium. The medium must be low-level formatted to become usable again; with modern hard drives, this is generally not possible without manufacturer-specific and often model-specific service equipment.

Data Terminator provides focused security solutions and services that secure your data at rest, data in motion and data in use. We provide best degaussing service in Singapore, Hard Disk Crusher, NSA degausser Singapore, DoD degausser Singapore.

You can further inquire following service from Data Terminator: Degaussing service in Singapore, Degausser in Singapore,NSA degausser Singapore,US DoD degausser Singapore,IT security, IT asset disposal, line of sight, on-site, secure data destruction.

Data erasure

Data erasure

Data erasure (also called data clearing or data wiping) is a software-based method of overwriting data that completely destroys all electronic data residing on a hard disk drive or other digital media.

data erasure

Permanent data erasure goes beyond basic file deletion commands, which only remove direct pointers to data disk sectors and make data recovery possible with common software tools. Unlike degaussing and physical destruction, which render the storage media unusable, data erasure removes all information while leaving the disk operable, preserving IT assets and the environment.

Software-based overwriting uses a software application to write patterns of pseudo-random meaningless data onto all of a hard drive’s sectors. There are key differentiators between data erasure and other overwriting methods, which can leave data intact and raise the risk of data breach or spill, identity theft and failure to achieve regulatory compliance. Many data eradication programs also provide multiple overwrites so that they support recognized government and industry standards. Good software should provide verification of data removal, which is necessary for meeting certain standards.

To protect data on lost or stolen media, some data erasure applications remotely destroy data if the password is incorrectly entered. Data erasure tools can also target specific data on a disk for routine erasure, providing a hacking protection method that is less time-consuming than software encryption. Hardware encryption built into drive firmware and integrated controllers is now a popular solution with no degradation in performance at all.

The firmware can encrypt at 256-bit full AES encryption faster than the drive electronics can write the data. Drives with this capability are known as self-encrypting drives (SED) and are present on most modern laptops and are increasingly used in Enterprise to protect data. Changing the encryption key will make all the drive data inaccessible so is an easy and very fast method of achieving 100% data erasure. Theft of an SED will induce physical asset loss, but data on the drive is inaccessible without the decryption key which is not stored on the drive.

Data Terminator provides focused security solutions and services that secure your data at rest, data in motion and data in use. We provide best degaussing service in Singapore, Hard Disk Crusher, NSA degausser Singapore, DoD degausser Singapore, hard disk destruction singapore,erase hard disk singapore,secured hard drive destruction singapore, Malaysia, Indonesia, Thailand and Vietnam.

Data Terminator is a trusted brand in Data Leakage and End-of-Life Data Protection. Our processes are ISO 9001:2015 and ISO 14001: 2015 certified. Our mission is to provide our Customers effective and efficient Data Leakage Prevention solutions. Read more..

SiteLock

Contact us