Hard Disk Cloning

Hard Disk Cloning

Data Terminator uses tools such as the PSIClone™ to “clone” hard disks for customers’ usage. The PSIClone™ is packed with useful features for the forensic investigator. Designed with forensic data integrity in mind, a key feature of PSIClone™ is that the user is unable to write to the ‘source’ side of the device. With the included data recovery software, PSIClone has everything you need to perform data recovery right out of the box.

While PSIClone™ is a drive-to-drive cloning and imaging device, it stands out from other such devices because PSIClone™ has the ability to perform a robust compression while imaging a drive thereby allowing you to place images of multiple drives on one dump drive. This saves time and money.

Degaussing Services in Asia

Degaussing Services

Degaussing services are becoming vital services for ending of data life in storage media. Information leakage is a major threat to all organisations. IT departments often spent millions of dollars on access security, anti-virus and intrusion-protection. This security fortress becomes inadequate when dealing with information leakage via data storage sanitization. Data Terminator has the capability, competency and track record to provide organisations with effective data leakage protection solutions.

Data Terminator’s secure data sanitization processes are ISO 9001:2008 certified, the first in its class in Singapore, signifying our commitment and priority to organisations’ security needs.

Data Terminator’s secure data sanitization service covers all forms of electronic data storage media, which includes hard drive, magnetic tape, audio/video tape, optical media, flash media, static storage media, floppy and Zip cartridge, etc.

Besides data sanitization or degausing services, Data Terminator also provides complete IT asset disposal solutions. Our capabilities include the management of the complete disposal process of asset verification, secure data sanitization and asset de-classification, proper destruction and disposal.

Data Terminator provides a high quality degaussing service based on ISO 9001:2008 Certified – Secure Electronic Data Erasure & Destruction Services. We provide a quality checking process to demagnetizes the disk so that all data stored on the disk is permanently destroyed. Thus making the disk impossible to be recovered by any recovery tools available.

Degaussing Services

Kindly contact us for more details.

Or visit our website to find out more

Data Terminator provides focused security solutions and services that secure your data at rest, data in motion and data in use. We provide best degaussing service in Singapore, Hard Disk Crusher, NSA degausser Singapore, DoD degausser Singapore.

Secure Data Destruction

Data Terminator offer various Secure Data Destruction Services

secure data destruction

 

Hard Disk & Tape Sanitization

One of the key solutions to eliminate the risk of data falling into the wrong hands is to degauss hard drives prior to disposal. Hard drive degaussers use powerful magnets or an electromechanical “pulse” to erase data from hard drives. Similarly, tapes should also be properly degaussed before disposal.

In fact, DoD Requirements call for hard drives to be degaussed in an NSA listed Degausser and then physically destroyed prior to disposal.

CD/DVD Optical Media Destruction

Destroying CD/DVD Optical Media doesn’t have to be a problem.

Data Terminator has a variety of machines to meet NSA/CSS Specifications for CD/DVD Optical Media Destruction.

IT Asset Disposal

Proper IT asset disposal is becoming more and more important not just on the environmental issues but also on data confidentiality.

Many organizations do not have the dedicated resources or the bulk quantity to justify the investment of procuring the equipment. They may choose to outsource such destruction and disposal. Outsourcing can be affordable and safe when done properly. If you choose this option, ask what methods will be used, where your items will be kept prior to destruction, or if there are any on-site services, what happens to destroyed waste, and what proof you will get that those items were actually destroyed.

Data security is an ongoing process, by being aware of the threats and understanding the destruction options, you will be in a much better position to protect your business and yourself. You will have complete peace of mind that you have left nothing behind.

Data Terminator provides complete IT asset disposal solutions. Our capabilities include the management of the complete disposal process of asset verification, secure data sanitization and asset de-classification, proper destruction and disposal.

You can further inquire following service from Data Terminator: NSA degausser Singapore,US DoD degausser Singapore, Degaussing service in Singapore, Degausser in Singapore, IT security, IT asset disposal, line of sight, on-site, secure data destruction.

 

Enterprise Security Solutions

Enterprise Security Solutions

Enterprise Fraud Management

Enterprise Fraud Management (EFM) is a solution for detection of any suspicious activity or fraud incident in the Enterprise environment.

SSH Communication Security

SSH Communication Security providing an overall coverage for secure access communication on a network. This include monitoring, auditing, and controlling access of the communication.

User Activity Auditing & Monitoring

Keep track of the administrator or end user activity from a centralize management. It also covers user access to remote servers, virtual desktops, or networking devices, and records these activities

Advanced Persistent Threat (APT) Detection

APT detection is a live memory analysis that detects and analyzes threats on compromised endpoints. Contrary to the antivirus or IDS approach of matching suspected malware or traffic patterns with known malware signatures, the live memory analysis agent gives the analyst a view from a centralized console of what is happening inside the computer’s memory. This view can quickly expose a malware infection, regardless of whether a signature exists or not.

Network Access Control

Network Access Control (NAC) provides a network with the mandatory extra layer of protection for all existing security policies. It allows the Network Administrator to configure access parameters for the physical network ports and determine which devices are allowed access. It is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.

DB Security

A Unified Database Solution including: Security, Caching, Auditing and Masking. The solution features a high-availability configuration to ensure business continuity. It has a broad range of security controls to protect databases (potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated network links) against compromises of their confidentiality, integrity and availability.

Endpoint Security.

The End Point Data Protection Suite delivers complete visibility, control, and protection of enterprise endpoints. It provides a comprehensive data protection solution in a single product, with a single management server and a single, lightweight agent.

Secure Storage Devices

Data Terminator offers Secure Storage Devices

Aegis Secure Key – USB 2.0 Flash Drive

Encrypted USB Flash Key with PIN access

Quick Overview

  • Military grade Full-disk AES 256-bit CBC Hardware Encryption
  • PIN activated 7-15 digits – Alphanumeric keypad use a memorable number or word for your PIN
  • Dust and water resistant
  • No software or drivers required
  • OS and platform independent – compatible with Windows, Mac, Linux and embedded systems
  • Works with any USB/USB On-The-Go devices

Aegis Padlock – USB 3.0

Encrypted USB 3.0 Hard Drive with PIN Access

Quick Overview

  • Secure PIN Access
  • Integrated USB 3.0 cable – Data transfer speeds up to 10X faster than USB 2.0
  • Choice of real-time 128-bit or 256-bit Military Grade AES-XTS Hardware Encryption
  • Software free design – No admin rights required
  • Compatible with any OS – Windows, Mac & Linux

Aegis Padlock DT – USB 3.0 Desktop Drive

Encrypted Desktop Hard Drive with PIN Access

Quick Overview

  • Secure PIN Access
  • Choice of real-time 128-bit or 256-bit Military Grade AES-XTS Hardware Encryption
  • Solid Aluminum Enclosure
  • Software free design – No admin rights required
  • Compatible with any OS – Windows, Mac & Linux

 

Apricorn Padlock – USB 2.0

Encrypted Hard Drive with PIN Access

Quick Overview

  • Secure PIN Access
  • Allows up to 10 PIN Passkeys
  • Choice of real-time 128-bit or 256-bit Military Grade AES Hardware Encryption
  • Integrated USB cable
  • Software free design – No admin rights required
  • Compatible with any OS – Windows, Mac & Linux

Aegis Padlock Pro – eSATA | USB 2.0

Encrypted Hard Drive with PIN Access

Quick Overview

  • Secure PIN Access
  • Real-time 256-bit AES Hardware Encryption
  • Ultra-fast eSATA and USB interface for data transfer rates of up to 90MB/sec
  • Software free design – No admin rights required
  • Compatible with any OS – Windows, Mac & Linux

Information leakage prevention service

Information leakage is a major threat to all organisations. IT departments often spent millions of dollars on access security, anti-virus and intrusion-protection. This security fortress becomes inadequate when dealing with information leakage via data storage sanitization. Data Terminator has the capability, competency and track record to provide organisations with effective data leakage protection solutions. Information leakage prevention is critical for your business.

Data Terminator’s secure data sanitization processes are ISO 9001:2008 certified, the first in its class in Singapore, signifying our commitment and priority to organisations’ security needs.

Data Terminator’s secure data sanitization service covers all forms of electronic data storage media, which includes hard drive, magnetic tape, audio/video tape, optical media, flash media, static storage media, floppy and Zip cartridge, etc.

Besides data sanitization, Data Terminator also provides complete IT asset disposal solutions. Our capabilities include the management of the complete disposal process of asset verification, secure data sanitization and asset de-classification, proper destruction and disposal.

When a file is erased or deleted from your computer, the actual data in the file is not gone forever. The space utilized by that file is simply marked as “free” for use by other data. The case also applies to hard disks which are spoilt or with bad sectors. The fact is your data is still lurking in those hard disks that have no operational use.

Many people would think that once other data is written in that space, the original data becomes gone forever. However, with data recovery tools readily available, it is now possible to recover data even after it has been written over a few times.

Data Terminator provides secure and comprehensive data sanitization equipment and services with full compliance and quality to give our customers complete peace of mind. The secure data sanitization equipment used are all NSA-certified and our data sanitization process is ISO-certified.

Degaussing FAQs

Q: What is Physical Drive Destruction?

To positively prevent data from recovery; disks can be removed from disk drives and broken up, or even ground to microscopic pieces. DoD 5220.22M recommends degaussing followed by physical destruction of the storage medium (the magnetic disks) for data classified higher than Secret. Even such physical destruction is not absolute if any remaining disk pieces are larger than a single 512-byte record block in size, about 1/125″ in today’s drives. As linear and track densities increases, the maximum allowable size of disk fragments become ever smaller. Destroyed disk fragments of this size can be image restored by magnetic microscopy.

Some storage products are more easily destroyed than hard disk drives, such as magnetic disk data cartridges, tape cartridges, secure USB drives, and optical media.

Q: What is Non-destructive Data Erasure (Data Sanitization)?

Non-destructive data erasure supports wiping and permanently cleaning for all traces of deleted files and folder, administrator documents and other similar files or folders for maintaining computer privacy and enhancing system performance. It deletes all the data, free space, slack space, deleted memory chunks of data even if they’re not existing in a file, removes huge files stored on HDD of Windows OS and any removable media and cannot be recovered or restored by any data recovery software.

Q: What is Sanitization of Data?

Data Sanitization is the process of erasing (sanitizing) or destroying sensitive information in storage devices to meet legal compliance requirements thereby protecting user data from unauthorized use.

Q: What is Degaussing (or Demagnetizing)?

Degaussing is the process for reducing the magnetization of a magnetic storage device to zero by applying a reverse (coercive) magnetizing force, rendering any previously stored data unreadable and unintelligible, and ensuring that it cannot be recovered by any technology known to exist.

Q: What is Coercive Force?

A negative or reverse magnetic force applied for the purpose of reducing magnetic flux density.

Q: What is a degausser?

Degausser is an electrical device or permanent magnet assembly which generates a coercive magnetic force for the purpose of degaussing magnetic storage devices or other magnetic material. In order to be effective in sanitizing data, the degausser needs to be evaluated by an authority (e.g. US DoD, NSA/CSS) to meet the *oersted strength as claimed by the manufacturer.

*Oersted: A cgs unit of magnetic field strength, symbol: Oe. Oersted is a measurement applied to magnetic media.

Q: What is Magnetic Force Microscopy (MFM)?

The Magnetic Force Microscope is a variation of the Atomic Force Microscope, capable of providing high resolution, 3-dimensional images of magnetic fields. Magnetic Force Microscopy (MFM) technology can be used to probe magnetic storage media like hard disk and magnetic tapes for data residue.

If the magnetic data storage media such as hard disks and magnetic tapes have been completely degaussed, there will not be any data residue on the hard disk.

Q: What needs to be sanitised?

CDs and DVDs

Hard Drives

All forms of Magnetic Media, e.g. backup cartridges, tapes, zip disks and floppy disks

Optical and Flash Drives, e.g. thumb drives and memory storage cards

Q: How then to ensure that data are erased securely?

Degaussing – Using secure data destruction equipment such as hard drive degaussers to permanently eliminate data from magnetic media. Hard drive degaussers use powerful magnets or an electromechanical “pulse” to erase data from hard drives. In fact, DoD requirements call for hard drives to be degaussed in an NSA listed Degausser and then physically destroyed prior to disposal.

Shredding – Using secure data destruction equipment to completely pulverize and reduce the media to dust.
Disintegration – Using secure data destruction equipment to destroy bulk materials into particles that cannot be reconstructed.

Q: Does physical destruction of hard disk drives make the data unrecoverable?

Hard disk drives can be removed from the computers, smashed, broken up, drilled holes and even shredded to smaller pieces to prevent the data from being recovered. However, even such physical destruction is not absolute if any remaining disk pieces are larger than a single record block in size, about 1/125″ in today’s drives (Note that as the linear and track density of magnetic recording increases the resulting recoverable pieces of disk must become even smaller if all chances of data recovery after physical destruction alone are to be zero).

By physically destroying the outer surface of the hard disks does not ensure that the data are properly sanitized/degaussed. Data can still be recovered by a process known as MFM (Magnetic Force Microscopy) ‏

Q: Why the need to ensure that electronic data in storage media are securely erased and destroyed?

By simply discarding obsolete or damaged storage media, traces of sensitive information that are being left behind can be recovered easily. This compromises the security of the confidential data.

HDD Hard disk drive Crusher

HDD Hard disk drive Crushers

 

SEM Model 0101 Sledgehammer Hard Drive Crusher

This hard drive “crusher” destroys all hard drives regardless of their size, format or type up to 1.85″ High including desktop, laptop and server drives.

NEW…..In models purchased after 08-15-11 ( Serial number 1404 or greater) hard drives mounted in caddies or with rails or handles  less than 9″ deep that are used in rack mounted server environments can been crushed without having to disassemble the drive  from the caddy, rail or handle.

At the touch of a button, the Model 0101 Sledgehammer Hard Drive Crusher delivers a staggering 12,000 pounds (or 490K PSI ) of force to a conical punch causing catastrophic trauma to the hard drive chassis while destroying the internal platter. The unit is quiet, smooth and virtually vibration free. Destruction takes only 8 seconds ( can destroy up to four laptop drives in one 8 second cycle ).

A safety interlock prevents operation of the hard drive crusher while door is open to protect operators and an emergency e-stop immediately halts operation when pressed.

SEM Model 0100 Sledgehammer Manual Hard Drive Crusher

No power required manual operation. This hard drive crusher meets the physical destruction piece of the NSA Degauss and Destroy Requirements when used with an NSA approved degausser.  Up to Three Tons ( 6,000 Lbs ) of crushing force is exerted on hard drives.  Destruction time is five seconds.

Datastroyer ACD Automatic Crushing Device

Hard Drive Destruction

Basic Specs of the Datastroyer ACD Automatic Crushing Device

    • Hard drive sizes: 1”, 0.65”, 1.65”, laptop and 1.8”
    • Typical Commercial Drives: approx. 4 lbs. exertions
    • Hardened (Heavy Shielded): approx. 12 lbs. exertion
    • Operating time: approx. 8 seconds or less per drive, dependent on operator
    • Destruction method: bends platter, damages heads, motor and circuit board
    • Power: 100 to 250 VAC
    • 50 or 60 Hz (specify voltage when ordering)

Weight: approx. 49 lbs (shipping weight approx. 64 lbs)

  • Dimensions: 21″H x 7.25″W x 11-5/8″D (13″W with handle)

Features of the Datastroyer ACD Automatic Crushing Device

  • Rugged Design
  • Tested and used by the NSA and DOD for destroying hard drives
  • Green and Environmentally-friendly
  • adapters available to accommodate additional drives
  • automatic operation for hands free hard drive destruction
  • If power goes out, manual crank can continue destruction
  • One year parts warranty

Datastroyer MCD Manual Crushing Device

Hard Drive Destruction

Basic Specs of the Datastroyer MCD Manual Crushing Device

  • Hard drive sizes: 1”, 0.65”, 1.65”, laptop and 1.8”
  • Typical Commercial Drives: approx. 4 lbs. exertions
  • Hardened (Heavy Shielded): approx. 12 lbs. exertion
  • Operating time: approx. 8 seconds or less per drive, dependent on operator
  • Destruction method: bends platter, damages heads, motor and circuit board
  • Weight: approx. 35 lbs (shipping weight approx. 50 lbs)
  • Dimensions: 16″H x 7.25″W x 9.25″D

 

Features of the Datastroyer MCD Manual Crushing Device

  • Rugged Design
  • Tested and used by the NSA and DOD for destroying hard drives
  • Green and Environmentally-friendly
  • No power required
  • easy hand crank operation
  • One year parts warranty



HDD Hard Disk Drive Eraser

WipeDrive

WipeDrive is an erasure that able to wipe all data from your hard drives in accordance with some well-known standards such as (DoD 5220.22-M, HMG IS5 Baseline, HMG IS5 Enhanced, Canada Ops-II, US Army AR380-19, US Air Force 5020, German VSITR, NAVSO P-5239-26, NCSC-TG-025, Russian GOST P50739-95) making it unrecoverable.

By completely erase your hard drive, it protects your identity and other personal information, when buying, selling or throwing your computer away. It may also improve your system performance.

Hammer

• NIST Approved – Hammer erasure tool is compliant with NIST 800-36 and 800-88

• Supports Multiple Devices At One Time – Hammer erasure tool is able to process up to 4 hard disks at once

• All-In-One Device – Hammer erasure tool can not only erase, but also, partition, format and image source data to each of the drives.

The Hammer is a hard disk drive erasure tool. The device will securely erase all data written to the attached drives, up to 4 drives at once.

Both PATA and SATA interfaces are supported. Secure Erase is implemented allowing guaranteed, uninterrupted erasure of all data stored on the media.

If a drive does not support the secure erase command, NIST 800-36 and 800-88 compliant data erase methods are used.

Once each connected device is erased, the user can configure the system to partition, format and image source data to each of the drives.

Once the process has been started, the Hammer will execute each step until complete.

Hammer is a one step tool that will erase all data from a drive and prepare the drive to be redeployed into service.

Features:

• Secure Erase / Pattern Erase
• Auto Partitioning / Auto Formatting
• Auto Image Copy
• NIST 800-88 Compliant / NIST 800-36 Compliant
• SATA and PATA interfaces
• High Speed UDMA transfers
• Verify after complete
• Portable
• Up to Four Drives at one time
• USB 2.0 for storing and printing verification logs

Benefits

• Provides peace of mind that confidential data will not fall into the wrong hands.

• Meets data sanitization standards set by the US National Institute of Standards and Technology (NIST) and The US Department of Defense

 

HDD Hard disk drive Shredders

Whitaker Brothers HDD Hard disk drive Shredders

Whitaker Brothers is recognized worldwide as a leader in the data destruction industry with paper shredders and disintegrators/granulators from manufacturers like MBM/Destroyit, Martin Yale and HSM. Over 65 years of experience enables us to respond with products renowned for quality, durability and value as solutions to the ever-changing security needs of our customers and the evolving field of data storage.

Whitaker Brothers105 Hard Drive Shredder

(Single Stage with No Conveyor)

Basic Specs of the 105  Shredder

  • Cutting Size: 20mm x 30-50mm (random length)
  • Voltage: 3 x 220 V/ 60 Hz
  • Weight: 1870 lbs
  • Dimensions: 54″H x 46″W x 71″D

Features of the 105

  • A high performance hard drive/magnetic tape shredder that can handle CDs, DVDs and USB sticks as well!
  • Multi-functional operating and display element for continuous and reverse operation.
  • Capacity rates are dependent upon hard drive size, thickness, and proper power.
  • Energy-efficient motors designed for high throughput.
  • Automatic stop and reverse in the event of a jam.
  • 2 years parts warranty, 90 days labor.

SEM Hard Drive Shredder

When it comes to the fast, safe, easy hard drive shredding, nothing outperforms the Jackhammer™ Hard Drive Shredder from SEM.
Designed with Operator Safety, Ease-of-Use and Mobility in mind, the SEM Model 0302-1.0 Jackhammer Hard Drive Shredder from SEM will shred up to 2,000 drives per hour at an end particle size of just 1.0″ wide.  It is also ideal for shredding optical media and other small electronic devices such as cell phones, blackberries, Printed Circuit Boards (PCBs), memory sticks, PDAs, and similar electronic data storage devices.
This slow speed, high torque hard drive shredder uses specially designed saw tooth hook cutters to chew up to 25 hard drives in a minute and features the following:
  • Take-away Conveyor with vulcanized rollers
  • Take-away Conveyor cover for added protection
  • Non metallic collection bin
  • Modified in-feed chute dimensions for operator safety
  • Safety curtain flaps
  • Easy access clean out panels
  • Sturdy lockable casters
  • Exterior powder coated paint
  • Integrated Hour Meter
  • 2 year warranty
  • OPTIONAL ~ HEPA Air Filtration System
  • OPTIONAL ~ Fork Pockets

Model 0300 Hard Drive Shredder – 1.5″ Particle Size

Low to medium volumeuse in an Office Environment – shreds up to 500 drives per hour.

Model 0301 Hard Drive Shredder-1.5″ Particle Size

Medium to high volume use – shreds up to 2,000 hard drives per hour.

Model 0302-1.5 Hard Drive Shredder-1.5″ Particle Size

Medium to high volume – shreds up to 2,500 Hard Drives per hour.

Model 0302-1.0 Hard Drive Shredder – 1.0″ Particle Size

Medium to high volumehard drive shredding – up to 2,000 Hard Drives per hour.

Model 0302-.75 Hard Drive Shredder-.75″ Particle Size

Medium to high volumehard drive shredding – up to 1,500 Hard Drives per hour.

SEM Model 0304-1.5 Hard Drive Shredder-1.5″ Particle Size

Extreme high volume – shreds up to 3,500 Hard Drives per hour.

SEM Model 0304-1.0 Hard Drive Shredder – 1.0″ Particle Size

Extreme high volume hard drive shredding – up to 3,000 Hard Drives per hour.

SEM Model 0304-.75 Hard Drive Shredder .75″ Particle Size

Extreme high volumehard drive shredding – up to 2,500 Hard Drives per hour.

About us

Data Terminator provides focused security solutions and services that secure your data at rest, data in motion and data in use. We provide best degaussing service in Singapore, Hard Disk Crusher, NSA degausser Singapore, DoD degausser Singapore.

Contact us

DT Asia Group

A: 21 Bukit Batok Crescent #13-72 WCEGA Tower, Singapore 658065
T: (65) 6266 2877
E: enquiry.dps@dtasiagroup.com