Data Terminator (DT) plays an important role in Singapore’s cybersecurity eco-system of data protection by providing military-standard equipment and professional services for secure electronic data erasure, destruction and IT asset disposal. With acquired knowledge, experience and a proven track record, Data Terminator will continue to provide cost-effective and efficient data sanitization solutions to our customers. Data Terminator has also derived innovative solutions to meet the demand of highly sensitive organizations that require data sanitization to be carried out at sites with operational constraint.
18 – 21 September 2017, SUNTEC SINGAPORE CONVENTION & EXHIBITION CENTRE Meet Data Terminator at Booth: M24 About the Event: The cyberspace is a necessity, both in the personal and work space. In an increasingly digital world, how individuals, governments and companies protect their digital assets has increasingly become a hot button issue. With cybersecurity issues […]
What is the event about Fostering Innovation for Global Security Challenges INTERPOL World is a biennial international security trade event owned by INTERPOL – the world’s largest international police organization with 190 member countries. Scheduled to be in Singapore from 14-16 April 2015, INTERPOL Worldwill be held in conjunction with the official opening of the […]
22 – 24 July, 2015 Marina Bay Sands, Singapore Visit DT-Asia Group at booths E55 & E80 Conference Tracks Cloud and Data Security Data Security covers strategies, practices, and technologies to classify, track and protect data and will cover issues such as compliance, privacy, regulations and big data trends. Cloud Security includes data sovereignty, security architecture […]
The purpose of Personal Data Protection Act is to govern the collection, use and disclosure of personal data by organisations in a manner that recognises both the right of individuals to protect their personal data and the need of organisations to collect, use or disclose personal data for purposes that a reasonable person would consider […]
Singapore, Singapore 11th March 2014 – 14th March 2014 Grand Copthorne Waterfront Hotel 392 Havelock Road, Singapore 169663 Tel: +65 6733 0880 After the successful launch of our Cyber Intelligence conferences and exhibitions our Asia show is moving to Singapore. With many governments in Asia looking to share knowledge and gain a better understanding of how to […]
Join Us at the Premium Infocomm Security Conference Established in Asia! September 23-25, 2014 – Suntec Singapore Int. Convention & Exhibition Center – Join us at Booths G28A, G27 and H27A The Ministry of Home Affairs, Singapore, is proud to present the 23rd GovernmentWare (GovWare) conference & exhibition event. This annual event will be held […]
Banking Vietnam, organized by State Bank of Vietnam, Vietnam Banks Association and IDG Vietnam is the largest and most influential annual banking conference and expo in Vietnam. On behalf of organizers, we are pleased to invite you to participate in Banking Vietnam 2014 on 20-22 May 2014 at Melia Hotel, Hanoi to enjoy the latest […]
Dear Valuable Customers, Data Terminator (DT) is an Information Leakage Protection Specialist in providing solution and services that secure data at rest, data in motion as well as data in use. DT’s new and innovative products and services include: SSH CryptoAuditor provides control, monitor and audit of privilege user access to mission critical servers and […]
Nearly every major network environment today – including governments, large enterprises and financial institutions – uses a version of the Secure Shell data-in-transit protocol, to protect data as it moves throughout the network and allow for administrators to manage systems remotely. Secure Shell works by creating an encryption key pair – one key for the […]
The converging world of fraud, internal audit, operational risk and compliance require a unified and robust solution as well as “out of the box” thinking. Learn how the Intellinx holistic approach will help you mitigate fraud and manage risk: protecting your assets, your customers and your reputation. SAVE THE DATE Discussion & Networking Cocktail Brought […]
Cost-Effective Controls for Compliance The Technology Risk Management Guidelines, published by the Monetary Authority of Singapore, present best practices for financial institutions to establish a technology risk management framework and to strengthen system security. This white paper will examine the guidelines, highlight particularly significant and challenging requirements found within, and propose cost-effective solution approaches to […]
Network World – The Secure Shell (SSH) cryptographic network protocol that’s supported in software for server authentication and machine-to-machine communications is headed for a significant update. “There will be a new version of SSH,” says Tatu Ylonen, CEO of SSH Communications Security, pointing to the IETF draft document that’s recently been made available for public review. Co-authored with others, […]
Everyone has that little voice inside them that wonders in the middle of the night whether or not the front door is locked. Do you get up to check or stay in bed as the worries seep into bad dreams? When it comes to SSH keys, however, most companies don’t even realize that up to […]
SSH Communications Security whose headquarters is in Helsinki, Finland, launches its new product “CryptoAuditor” in Singapore on 24 September 2012. The company has more than 3,000 customers worldwide including service providers and financial institutions and Singapore is the first South-east Asian country to launch the company’s “CryptoAuditor”, a product which is able to audit and […]
LAS VEGAS, NV– (Black Hat 2012 Booth #536) – July 25, 2012 – SSH Communications Security, known the world over as the inventor of the SSH protocol, today announced the launch of its CryptoAuditor™ solution at the Black Hat USA 2012 conference. The new offering helps prevent data loss across encrypted secure shell, RDP and […]
Data-Terminator constantly brings the best in class solution to our customer via the best available platform and this year we successfully showcase our Security and Auditing Tools that is non-intrusive to your environment. This includes leading edge solution from Tectia/SSH, Skybox, Accesslayer, Intellinx and More.
Whether you use Tectia SSH, OpenSSH or both, the Universal SSH Key Manager delivers a fully interoperable and scalable solution. It allows you to save time and money by eliminating the complex, manual work required to manage enterprise SSH environments, by reducing the risk of unauthorized access from both internal and external actors, and by […]
Data Terminator is pleased to be once again participating in Governmentware 2011 which will be held from 27 to 29 September 2011 at the Suntec International Convention & Exhibition Centre. Our booths: C21 are located at Hall 403, Suntec Convention Centre.
Data Terminator will be hosting its annual security seminar on 8 June 2011 this year at Suntec City Convention Centre. Come join us at this seminar to find out about: Is it possible to implement Remote Access Monitoring immediately with NO disruption to your network environment? Can you precisely control SSH, RSP, Citrix-ICA, VMware View, […]
Data Terminator is pleased to be once again participating in Governmentware 2010 which will be held from 28 to 30 September 2010 at the Suntec International Convention & Exhibition Centre. Our booths: B15 and B17 are located at Hall 401, Suntec Convention Centre. The theme for this year’s Governmentware is “Strategic Security: Finding the right […]
Through the ISLA Program, (ISC)2 publicly recognizes the ongoing commitment by information security leaders throughout Asia-Pacific to build a highly qualified and ethical workforce, and broaden the public’s awareness of information security. As part of (ISC)2’s Global Awards Program, ISLA aims to recognize the achievements of outstanding information security professionals who have significantly contributed to […]
March 2010 – Proton’s T-4, the newest and currently most powerful degausser on the NSA Evaluated Products List, received another IT endorsement when it was awarded a “Best of FOSE 2010” award at the FOSE conference in Washington, DC on March 24th. The Proton T-4 employs EMP (Electromagnetic Pulse) technology for quick and automatic sanitization […]
Endpoint Protection Vision To be the leader in Information Leakage and Endpoint Protection. Mission To provide our Customers effective and efficient Information leakage Protection solutions to meet their changing needs
IT Asset Disposal Services Core Business IT Asset Disposal Services Data Terminator (DT) is an Information Leakage Protection Specialist providing certified equipment and professional services for secure electronic data erasure, destruction and disposal. Data Terminator’s comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National […]
Data sanitization Value Proposition Data sanitization Data Terminator is able to provide its customers the highest standard for Information Leakage and Endpoint Protection with three distinctive values: Superior Technology Data Terminator has the technology and a full range of equipment to cater to different customers’ needs. Its comprehensive range of secure data destruction equipment and […]
Electronics data erasure and destruction services in Singapore. Electronics data erasure and destruction services in Singapore.Data Terminator is the only ISO Certified company that provide. We adopt the best in class benchmark available in the industry today. They include: US DoD 5220.22-M Compliant on Clearing and Sanitization NSA/CSS 04-02 Compliant on Equipment NIST Compliant […]
Secured Data Destruction Devices Secured Data Destruction Devices Data Terminator offers a comprehensive range of products in the Data Leakage Prevention field.To complement the services that it offers to its customers, Data Terminator also offers a comprehensive range of products in the Data Leakage Prevention field. This testifies its commitment to its customers, by offering […]
Hard disk Degausser Hard disk degausser services singapore,hard disk destruction singapore,erase hard disk singapore,nsa degausser singapore,secured hard drive destruction Proton T-4 Hard disk drive Degausser • T-4 complies with DoD requirements for destroying classified information on magnetic media and is on the NSA EPL. (October 2009) • Independent tests indicate an Effective Magnetic Field (EMF) […]
Whitaker Brothers HDD Hard disk drive Shredders Whitaker Brothers is recognized worldwide as a leader in the data destruction industry with paper shredders and disintegrators/granulators from manufacturers like MBM/Destroyit, Martin Yale and HSM. Over 65 years of experience enables us to respond with products renowned for quality, durability and value as solutions to the ever-changing […]
HDD Hard disk drive eraser protects your identity and other personal information, when buying, selling or throwing your computer away. WipeDrive WipeDrive is an erasure that able to wipe all data from your hard drives in accordance with some well-known standards such as (DoD 5220.22-M, HMG IS5 Baseline, HMG IS5 Enhanced, Canada Ops-II, US Army […]
Hard disk crushers Hard disk Crushers Datastroyer ACD Automatic Crushing Device, HDD Hard disk drive Crusher,degaussing services singapore,hard disk destruction SEM Model 0101 Sledgehammer Hard Drive Crusher This hard drive “crusher” destroys all hard drives regardless of their size, format or type up to 1.85″ High including desktop, laptop and server drives. NEW…..In models purchased after […]
Q: What is Physical Drive Destruction? To positively prevent data from recovery; disks can be removed from disk drives and broken up, or even ground to microscopic pieces. DoD 5220.22M recommends degaussing followed by physical destruction of the storage medium (the magnetic disks) for data classified higher than Secret. Even such physical destruction is not […]
Information leakage is a major threat to all organisations. IT departments often spent millions of dollars on access security, anti-virus and intrusion-protection. This security fortress becomes inadequate when dealing with information leakage via data storage sanitization. Data Terminator has the capability, competency and track record to provide organisations with effective data leakage protection solutions. Information […]
Data Protection Q: What does Safend do? Safend Data Protection Suite protects organizations from data leakage and theft with a single software product providing granular port and device control, transparent hard disk encryption, comprehensive removable media encryption and accurate content control. It provides complete protection of sensitive data-in-use, data-at-rest and data-in-motion, without sacrificing productivity. Q: […]
Data Terminator offers Secure Storage Devices Aegis Secure Key – USB 2.0 Flash Drive Secure Storage Devices data Terminator offers Secure Storage Devices, degaussing services singapore,hard disk destruction singapore,erase hard disk Encrypted USB Flash Key with PIN access Quick Overview Military grade Full-disk AES 256-bit CBC Hardware Encryption PIN activated 7-15 digits – Alphanumeric keypad […]
Enterprise Security Solutions Enterprise Security Solutions, Data Terminator offer various of Enterprise Security Solutions, degaussing services singapore,hard disk destruction singapore,erase hard disk singapore Enterprise Fraud Management Enterprise Fraud Management (EFM) is a solution for detection of any suspicious activity or fraud incident in the Enterprise environment. SSH Communication Security SSH Communication Security providing an overall […]
Data Terminator offer various Secure Data Destruction Services Secure data destruction data Terminator offer various Secure Data Destruction, degaussing services singapore,hard disk destruction singapore,erase hard disk… Hard Disk & Tape Sanitization One of the key solutions to eliminate the risk of data falling into the wrong hands is to degauss hard drives prior to disposal. […]
Degaussing Services Degaussing services are becoming vital services for ending of data life in storage media. Information leakage is a major threat to all organisations. IT departments often spent millions of dollars on access security, anti-virus and intrusion-protection. This security fortress becomes inadequate when dealing with information leakage via data storage sanitization. Data Terminator has […]
Hard Disk Erasure Hard Disk Erasure is the method of securely remove data from hard disk while keeping the hard drive functioning or reusable. If you need to erase the data on a SCSI, IDE/PATA, SATA, laptop or SAS hard drive and then reuse or recycle hard drive, Data Devices’ line of DOD-approved hard drive […]
Hard Disk Cloning Hard Disk Cloning, Data Terminator uses tools such as the PSIClone™ to “clone” hard disks for customers’ usage. The PSIClone™ is packed with useful features for the forensic investigator. Designed with forensic data integrity in mind, a key feature of PSIClone™ is that the user is unable to write to the ‘source’ […]
Degaussing magnetic data storage media Degaussing magnetic data is the process of decreasing or eliminating a remnant magnetic field. (Wikipedia) Data is stored in the magnetic media, such as hard drives, floppy disks, and magnetic tape, by making very small areas called magnetic domains change their magnetic alignment to be in the direction of an […]
Data erasure Data erasure (also called data clearing or data wiping) is a software-based method of overwriting data that completely destroys all electronic data residing on a hard disk drive or other digital media. Permanent data erasure goes beyond basic file deletion commands, which only remove direct pointers to data disk sectors and make data […]
The purpose of Personal Data Protection Act is to govern the collection, use and disclosure of personal data by organisations in a manner that recognises both the right of individuals to protect their personal data and the need of organisations to collect, use or disclose personal data for purposes that a reasonable person would consider […]
Hard Disk Erasure DT provides an ISO 9001 Certified for high quality Secure Electronic Data Erasure Services on any storage media such as PATA, SATA, or SCSI. There are many options of erasure. One of it is Software Erase, by overwriting the sector of the disk with a new value with certain amount of passes […]
DT provides a high quality degaussing service based on ISO 9001:2008 Certified – Secure Electronic Data Erasure & Destruction Services. We provide a quality checking process to demagnetizes the disk so that all data stored on the disk is permanently destroyed. Thus making the disk impossible to be recovered by any recovery tools available. Kindly […]
Hard Disk & Tape Sanitization One of the key solutions to eliminate the risk of data falling into the wrong hands is to degauss hard drives prior to disposal. Hard drive degaussers use powerful magnets or an electromechanical “pulse” to erase data from hard drives. Similarly, tapes should also be properly degaussed before disposal. In […]
Information leakage is a major threat to all organisations. IT departments often spent millions of dollars on access security, anti-virus and intrusion-protection. This security fortress becomes inadequate when dealing with information leakage via data storage sanitization. Data Terminator has the capability, competency and track record to provide organisations with effective data leakage protection solutions. Data […]
Data Terminator is a trusted brand in Data Leakage and End-of-Life Data Protection. Our processes are ISO 9001:2015 and ISO 14001: 2015 certified. Our mission is to provide our Customers effective and efficient Data Leakage Prevention solutions. Read more..
Quick Links
Contact us