News & Events

SICW2017

Singapore International Cyber Week 2017 (SICW)

18 – 21 September 2017,  SUNTEC SINGAPORE CONVENTION & EXHIBITION CENTRE Meet Data Terminator at Booth: M24 About the Event: The cyberspace is a necessity, both in the personal and work space. In an increasingly digital world, how individuals, governments and companies protect their digital assets has increasingly become a hot button issue. With cybersecurity issues […]

Print

INTERPOL World Event

What is the event about Fostering Innovation for Global Security Challenges INTERPOL World is a biennial international security trade event owned by INTERPOL – the world’s largest international police organization with 190 member countries. Scheduled to be in Singapore from 14-16 April 2015, INTERPOL Worldwill be held in conjunction with the official opening of the […]

def
RSA Conference 2015 – Asia Pacific & Japa

22 – 24 July, 2015 Marina Bay Sands, Singapore Visit DT-Asia Group at booths E55 & E80 Conference Tracks Cloud and Data Security Data Security covers strategies, practices, and technologies to classify, track and protect data and will cover issues such as compliance, privacy, regulations and big data trends. Cloud Security includes data sovereignty, security architecture […]

personal-data-protection-act
Personal Data Protection Act

The purpose of Personal Data Protection Act is to govern the collection, use and disclosure of personal data by organisations in a manner that recognises both the right of individuals to protect their personal data and the need of organisations to collect, use or disclose personal data for purposes that a reasonable person would consider […]

Facade_4
Cyber Intelligence Asia 2014

Singapore, Singapore 11th March 2014 – 14th March 2014 Grand Copthorne Waterfront Hotel 392 Havelock Road, Singapore 169663 Tel: +65 6733 0880 After the successful launch of our Cyber Intelligence conferences and exhibitions our Asia show is moving to Singapore. With many governments in Asia looking to share knowledge and gain a better understanding of how to […]

Govware_V
23rd GovernmentWare (GovWare) 2014

Join Us at the Premium Infocomm Security Conference Established in Asia! September 23-25, 2014 – Suntec Singapore Int. Convention & Exhibition Center – Join us at Booths G28A, G27 and H27A The Ministry of Home Affairs, Singapore, is proud to present the 23rd GovernmentWare (GovWare) conference & exhibition event. This annual event will be held […]

1
Banking Vietnam Event – May 20th, 2014

Banking Vietnam, organized by State Bank of Vietnam, Vietnam Banks Association and IDG Vietnam is the largest and most influential annual banking conference and expo in Vietnam. On behalf of organizers, we are pleased to invite you to participate in Banking Vietnam 2014 on 20-22 May 2014 at Melia Hotel, Hanoi to enjoy the latest […]

govware2013
Governmentware 2013

Dear Valuable Customers, Data Terminator (DT) is an Information Leakage Protection Specialist in providing solution and services that secure data at rest, data in motion as well as data in use. DT’s new and innovative products and services include: SSH CryptoAuditor provides control, monitor and audit of privilege user access to mission critical servers and […]

informationtechnology-4
Secure Shell key mismanagement poses big risk to your data

Nearly every major network environment today – including governments, large enterprises and financial institutions – uses a version of the Secure Shell data-in-transit protocol, to protect data as it moves throughout the network and allow for administrators to manage systems remotely. Secure Shell works by creating an encryption key pair – one key for the […]

masthead
Save The Date Event: Coverging Threats and Reducing Risks across business units

The converging world of fraud, internal audit, operational risk and compliance require a unified and robust solution as well as “out of the box” thinking. Learn how the Intellinx holistic approach will help you mitigate fraud and manage risk: protecting your assets, your customers and your reputation. SAVE THE DATE Discussion & Networking Cocktail Brought […]

1920x400-slider_TRMG
Technology Risk Management Guidelines by Monetary Authority of Singapore

Cost-Effective Controls for Compliance The Technology Risk Management Guidelines, published by the Monetary Authority of Singapore, present best practices for financial institutions to establish a technology risk management framework and to strengthen system security. This white paper will examine the guidelines, highlight particularly significant and challenging requirements found within, and propose cost-effective solution approaches to […]

10_must_have_network_security_tools-image-689x360
Father of SSH working on new version of crypto standard

Network World – The Secure Shell (SSH) cryptographic network protocol that’s supported in software for server authentication and machine-to-machine communications is headed for a significant update. “There will be a new version of SSH,” says Tatu Ylonen, CEO of SSH Communications Security, pointing to the IETF draft document that’s recently been made available for public review. Co-authored with others, […]

ssh-740x400
SSH Communications Security Battens Down Encrypted Networks

Everyone has that little voice inside them that wonders in the middle of the night whether or not the front door is locked. Do you get up to check or stay in bed as the worries seep into bad dreams? When it comes to SSH keys, however, most companies don’t even realize that up to […]

ssh_communications_security_logo
SSH Communications Security launches new product

SSH Communications Security whose headquarters is in Helsinki, Finland, launches its new product “CryptoAuditor” in Singapore on 24 September 2012.  The company has more than 3,000 customers worldwide including service providers and financial institutions and Singapore is the first South-east Asian country to launch the company’s “CryptoAuditor”, a product which is able to audit and […]

security_by_iStock.com_Henrik5000
SSH Communications Security Launches CryptoAuditor: Minimally-Invasive Enterprise Privileged User Access Auditing Solution

LAS VEGAS, NV– (Black Hat 2012 Booth #536) – July 25, 2012 – SSH Communications Security, known the world over as the inventor of the SSH protocol, today announced the launch of its CryptoAuditor™ solution at the Black Hat USA 2012 conference. The new offering helps prevent data loss across encrypted secure shell, RDP and […]

2012-06-19-09.34.58
Enterprise 2012

Data-Terminator constantly brings the best in class solution to our customer via the best available platform and this year we successfully showcase our Security and Auditing Tools that is non-intrusive to your environment. This includes leading edge solution from Tectia/SSH, Skybox, Accesslayer, Intellinx and More.  

universal-ssh-key-manager-882x394-KClmKMiV
Universal SSH Key Manager

Whether you use Tectia SSH, OpenSSH or both, the Universal SSH Key Manager delivers a fully interoperable and scalable solution. It allows  you to save time and money by eliminating the complex, manual work required to manage enterprise SSH environments, by reducing the risk of unauthorized access from both internal and external actors, and by […]

govware11_scc-poster
Governmentware Conference and Exhibition 2011

Data Terminator is pleased to be once again participating in Governmentware 2011 which will be held from 27 to 29 September 2011 at the Suntec International Convention & Exhibition Centre. Our booths: C21 are located at Hall 403, Suntec Convention Centre.

p1070606
Data Terminator Seminar 2011 – Control. Audit. Monitor.

Data Terminator will be hosting its annual security seminar on 8 June 2011 this year at Suntec City Convention Centre. Come join us at this seminar to find out about: Is it possible to implement Remote Access Monitoring immediately with NO disruption to your network environment? Can you precisely control SSH, RSP, Citrix-ICA, VMware View, […]

CIO_logo_300x300
GCIO 2011

Date: 19 May 2011 Time: 12pm – 3pm Venue: Suntec Singapore Level 3, RM 325-326

gw10_03
Governmentware Conference and Exhibition 2010

Data Terminator is pleased to be once again participating in Governmentware 2010 which will be held from 28 to 30 September 2010 at the Suntec International Convention & Exhibition Centre. Our booths: B15 and B17 are located at Hall 401, Suntec Convention Centre. The theme for this year’s Governmentware is “Strategic Security: Finding the right […]

logo_dt
ISLA Award 2010

Through the ISLA Program, (ISC)2 publicly recognizes the ongoing commitment by information security leaders throughout Asia-Pacific to build a highly qualified and ethical workforce, and broaden the public’s awareness of information security. As part of (ISC)2’s Global Awards Program, ISLA aims to recognize the achievements of outstanding information security professionals who have significantly contributed to […]

Proton-T-4-Hard-Drive-Degausser-NSA-2-547x547
Proton’s T-4 Automatic Degausser Receives “Best of FOSE 2010” Award

March 2010 – Proton’s T-4, the newest and currently most powerful degausser on the NSA Evaluated Products List, received another IT endorsement when it was awarded a “Best of FOSE 2010” award at the FOSE conference in Washington, DC on March 24th. The Proton T-4 employs EMP (Electromagnetic Pulse) technology for quick and automatic sanitization […]

logo
Vision & Mission Endpoint Protection

Endpoint Protection Vision To be the leader in Information Leakage and Endpoint Protection. Mission To provide our Customers effective and efficient Information leakage Protection solutions to meet their changing needs

data-terminator-logo-trans
Core Business

IT Asset Disposal Services Core Business IT Asset Disposal Services Data Terminator (DT) is an Information Leakage Protection Specialist providing certified equipment and professional services for secure electronic data erasure, destruction and disposal. Data Terminator’s comprehensive range of secure data destruction equipment and services are in compliance to US Department of Defense (DoD) and National […]

logo
Value Proposition

Data sanitization Value Proposition Data sanitization Data Terminator is able to provide its customers the highest standard for Information Leakage and Endpoint Protection with three distinctive values: Superior Technology Data Terminator has the technology and a full range of equipment to cater to different customers’ needs. Its comprehensive range of secure data destruction equipment and […]

logo_dt
Benchmark

Electronics data erasure and destruction services in Singapore. Electronics data erasure and destruction services in Singapore.Data Terminator is the only ISO Certified company that provide.   We adopt the best in class benchmark available in the industry today. They include: US DoD 5220.22-M Compliant on Clearing and Sanitization NSA/CSS 04-02 Compliant on Equipment NIST Compliant […]

logo
Secured Data Destruction Devices

Secured Data Destruction Devices Secured Data Destruction Devices Data Terminator offers a comprehensive range of products in the Data Leakage Prevention field.To complement the services that it offers to its customers, Data Terminator also offers a comprehensive range of products in the Data Leakage Prevention field. This testifies its commitment to its customers, by offering […]

t-4-degausser-front-large
HDD Hard disk drive Degaussers

Hard disk Degausser Hard disk degausser services singapore,hard disk destruction singapore,erase hard disk singapore,nsa degausser singapore,secured hard drive destruction Proton T-4 Hard disk drive Degausser • T-4 complies with DoD requirements for destroying classified information on magnetic media and is on the NSA EPL. (October 2009) • Independent tests indicate an Effective Magnetic Field (EMF) […]

105-hard-drive-shredder_1
HDD Hard disk drive Shredders

Whitaker Brothers HDD Hard disk drive Shredders Whitaker Brothers is recognized worldwide as a leader in the data destruction industry with paper shredders and disintegrators/granulators from manufacturers like MBM/Destroyit, Martin Yale and HSM. Over 65 years of experience enables us to respond with products renowned for quality, durability and value as solutions to the ever-changing […]

WipeDrive-SMB-Suite
HDD Hard Disk Drive Eraser

HDD Hard disk drive eraser protects your identity and other personal information, when buying, selling or throwing your computer away. WipeDrive WipeDrive is an erasure that able to wipe all data from your hard drives in accordance with some well-known standards such as (DoD 5220.22-M, HMG IS5 Baseline, HMG IS5 Enhanced, Canada Ops-II, US Army […]

hdd_crusher_with_drive
HDD Hard disk drive Crusher

Hard disk crushers Hard disk Crushers Datastroyer ACD Automatic Crushing Device, HDD Hard disk drive Crusher,degaussing services singapore,hard disk destruction SEM Model 0101 Sledgehammer Hard Drive Crusher This hard drive “crusher” destroys all hard drives regardless of their size, format or type up to 1.85″ High including desktop, laptop and server drives. NEW…..In models purchased after […]

Magnet0873
Degaussing FAQs

Q: What is Physical Drive Destruction? To positively prevent data from recovery; disks can be removed from disk drives and broken up, or even ground to microscopic pieces. DoD 5220.22M recommends degaussing followed by physical destruction of the storage medium (the magnetic disks) for data classified higher than Secret. Even such physical destruction is not […]

information-leakage-prevention
Information leakage prevention service

Information leakage is a major threat to all organisations. IT departments often spent millions of dollars on access security, anti-virus and intrusion-protection. This security fortress becomes inadequate when dealing with information leakage via data storage sanitization. Data Terminator has the capability, competency and track record to provide organisations with effective data leakage protection solutions. Information […]

data-protection
Safend Data Protection Suite

Data Protection Q: What does Safend do? Safend Data Protection Suite protects organizations from data leakage and theft with a single software product providing granular port and device control, transparent hard disk encryption, comprehensive removable media encryption and accurate content control. It provides complete protection of sensitive data-in-use, data-at-rest and data-in-motion, without sacrificing productivity. Q: […]

secure-storage-device
Secure Storage Devices

Data Terminator offers Secure Storage Devices Aegis Secure Key – USB 2.0 Flash Drive Secure Storage Devices data Terminator offers Secure Storage Devices, degaussing services singapore,hard disk destruction singapore,erase hard disk Encrypted USB Flash Key with PIN access Quick Overview Military grade Full-disk AES 256-bit CBC Hardware Encryption PIN activated 7-15 digits – Alphanumeric keypad […]

banner_services
Enterprise Security Solutions

Enterprise Security Solutions Enterprise Security Solutions, Data Terminator offer various of Enterprise Security Solutions, degaussing services singapore,hard disk destruction singapore,erase hard disk singapore Enterprise Fraud Management Enterprise Fraud Management (EFM) is a solution for detection of any suspicious activity or fraud incident in the Enterprise environment. SSH Communication Security SSH Communication Security providing an overall […]

secure-data-destruction
Secure Data Destruction

Data Terminator offer various Secure Data Destruction Services Secure data destruction data Terminator offer various Secure Data Destruction, degaussing services singapore,hard disk destruction singapore,erase hard disk… Hard Disk & Tape Sanitization One of the key solutions to eliminate the risk of data falling into the wrong hands is to degauss hard drives prior to disposal. […]

Degaussing_services
Degaussing Services in Asia

Degaussing Services Degaussing services are becoming vital services for ending of data life in storage media. Information leakage is a major threat to all organisations. IT departments often spent millions of dollars on access security, anti-virus and intrusion-protection. This security fortress becomes inadequate when dealing with information leakage via data storage sanitization. Data Terminator has […]

hard-disk-erasure
Hard Disk Erasure service in Singapore

Hard Disk Erasure Hard Disk Erasure is the method of securely remove data from hard disk while keeping the hard drive functioning or reusable. If you need to erase the data on a SCSI, IDE/PATA, SATA, laptop or SAS hard drive and then reuse or recycle hard drive, Data Devices’ line of DOD-approved hard drive […]

hard-disk-clone
Hard Disk Cloning

Hard Disk Cloning Hard Disk Cloning, Data Terminator uses tools such as the PSIClone™ to “clone” hard disks for customers’ usage. The PSIClone™ is packed with useful features for the forensic investigator. Designed with forensic data integrity in mind, a key feature of PSIClone™ is that the user is unable to write to the ‘source’ […]

degauss
Degaussing magnetic data storage media

Degaussing magnetic data storage media Degaussing magnetic data is the process of decreasing or eliminating a remnant magnetic field. (Wikipedia) Data is stored in the magnetic media, such as hard drives, floppy disks, and magnetic tape, by making very small areas called magnetic domains change their magnetic alignment to be in the direction of an […]

data-erasure
Data erasure

Data erasure Data erasure (also called data clearing or data wiping) is a software-based method of overwriting data that completely destroys all electronic data residing on a hard disk drive or other digital media. Permanent data erasure goes beyond basic file deletion commands, which only remove direct pointers to data disk sectors and make data […]

personal-data-protection-act
Personal Data Protection Act

The purpose of Personal Data Protection Act is to govern the collection, use and disclosure of personal data by organisations in a manner that recognises both the right of individuals to protect their personal data and the need of organisations to collect, use or disclose personal data for purposes that a reasonable person would consider […]

The-key-to-simple-data-storage-security
Secure Erasure

Hard Disk Erasure DT provides an ISO 9001 Certified for high quality Secure Electronic Data Erasure Services on any storage media such as PATA, SATA, or SCSI. There are many options of erasure. One of it is Software Erase, by overwriting the sector of the disk with a new value with certain amount of passes […]

mzgnetizing-879x400
Degaussing Services

DT provides a high quality degaussing service based on ISO 9001:2008 Certified – Secure Electronic Data Erasure & Destruction Services. We provide a quality checking process to demagnetizes the disk so that all data stored on the disk is permanently destroyed. Thus making the disk impossible to be recovered by any recovery tools available. Kindly […]

secure-data-destruction
Secure Data Destruction

Hard Disk & Tape Sanitization One of the key solutions to eliminate the risk of data falling into the wrong hands is to degauss hard drives prior to disposal. Hard drive degaussers use powerful magnets or an electromechanical “pulse” to erase data from hard drives. Similarly, tapes should also be properly degaussed before disposal. In […]

Brand7OurServices1
Our Services

Information leakage is a major threat to all organisations. IT departments often spent millions of dollars on access security, anti-virus and intrusion-protection. This security fortress becomes inadequate when dealing with information leakage via data storage sanitization. Data Terminator has the capability, competency and track record to provide organisations with effective data leakage protection solutions. Data […]

Data Terminator is a trusted brand in Data Leakage and End-of-Life Data Protection. Our processes are ISO 9001:2015 and ISO 14001: 2015 certified. Our mission is to provide our Customers effective and efficient Data Leakage Prevention solutions. Read more..

SiteLock

Contact us