Verified Device Erasure scans the SSD to verify the type of blocks and whether data has been erased. To address these gaps, the company’s patented technology is included in its Verified Device Erasure, firmware-based verification capability. ![]() An additional challenge, specifically with SSDs, is wear leveling and the need to have additional blocks to move data around that are often not scanned when an erasure verification command is issued. As a result of this type of research, the NSA issued guidance requiring SSDs to be destroyed.ĭrives can falsely report that the data was wiped due to incorrectly implemented commands, bad sectors, hardware failures, erasure program failures, human error and more. Research by CPR Tools determined that 42% of SSDs had recoverable sensitive (not just PII) data on them. Storage devices provide a response indicating the erase command was completed successfully, in theory, wiping all data. Before endpoints and drives are transitioned, they follow industry best practices to wipe drives using technologies such as ATA Secure Erase or paying for managed services to perform certified drive wipes. IT leaders know this and take data removal seriously when a device is being repurposed or EOLed. ![]() Failure to protect sensitive and critical data including PII, intellectual property, trade secrets, and classified information is a violation of laws including HIPAA, GDPR, and CCPA, and is a risk to national security. Organizations have a responsibility to always protect data on endpoints, including when they are transitioned from one employee to another, are retired, or donated to charities. ![]() has been assigned a patent ( 11581048) developed by Tony Fessel, VP, e ngineering, Fort Myers, FL, for “ method and system for validating erasure status of data blocks.
0 Comments
Leave a Reply. |