east-tec DisposeSecure

east-tec DisposeSecure 5.1

Don't give away sensitive information with computer hardware.

PROS

  • CAPABLE of erasing DATA OVER THE NETWORK
  • stronger wiping security methods
  • Is Operating System & BIOS independent
  • Offers powerful data wiping verification capabilities
  • Provides full review of the wiping results using the built-in Sector Viewer
  • Generates validation reports that meet US Department of Defense requirements

CONS

Don't give away sensitive information with computer hardware.

Don't give away sensitive information, valuable corporate trade secrets, business plans, personal files and letters, or traces of Internet or newsgroup activity with the old computers that you or your company resells, donates, reassigns to different departments or removes from operation. Deleting all the files or even formatting the hard disk is not enough to stop people to restore information using basic recovery programs. east-tec DisposeSecure 5 however removes all traces of data from the computer hard disk, by overwriting and destroying beyond recovery every sector and bit of information. Data is removed according to government and industry standards or custom user security levels. east-tec DisposeSecure 5 can be operated either from a bootable media (USB stick, floppy disk, CD, DVD) to sanitize any drive or partition from the computer, or through the network to sanitize a large number of computers, centralize sanitization logs (reports) on the server and more. The computers can be sanitized regardless of the file system or the operating system. In the latest version, you can also wipe non-system external hard drives directly from Windows, without booting from another device. Whether you want to prevent identity theft, protect your privacy or stop competitors from stealing your sensitive information, east-tec DisposeSecure 5 offers the solution.

For anyone who resells, donates or gives away a computer. By using east-tec DisposeSecure your computer will be like new again. No one will be able to recover your confidential information stored on your computer before running our product.