Blancco Mobile Device Eraser

Total Page:16

File Type:pdf, Size:1020Kb

Blancco Mobile Device Eraser Blancco Mobile Device Eraser The Most Comprehensive Mobile Data Eraser Solution for iOS, Android, Windows Phone and BlackBerry Operating Systems with Advanced Diagnostics for iOS and Android Securely and effectively erase sensitive data on mobile Why Blancco devices to achieve data sanitization and compliance. Blancco Mobile Device Eraser allows organizations, mobile service providers, As the de facto standard mobile device processors, warehouses, retailers and resellers to quickly diagnose device issues and permanently erase all data from smartphones and tablets in data erasure, Blancco from a single solution. Available for iOS, Android, Windows Phone and BlackBerry provides thousands of operating systems, our solution verifies and certifies that sensitive data can’t be exposed after the devices are disposed of, recycled, traded in or resold. organizations with an absolute line of defense against costly security breaches, as well Key Benefits as verification of regulatory Diagnose: iOS and Android device issues within minutes compliance through a 100% • Identify and resolve device performance issues with 32 iOS and 39 Android diagnostics tests tamper-proof audit trail. • Leverage real-time data and analytics to optimize the overall diagnostics Our data erasure solutions process - reducing operational costs have been tested, certified, • Maximize the resale value of second-hand devices approved and recommended Erase: in excess of 40+ iOS, Android, Windows Phone and BlackBerry devices by 18 governing bodies around • Dramatically improve processing times and productivity with little to no the world. No other security manual processes firm can boast this level of • Select from 13 erasure standards, based on your industry and organization’s unique needs, including Aperiodic Random, Crypto Erase and compliance with the most DoD 5520.22M algorithms rigorous requirements set by • Verify the overwriting standard was a success and written to all sectors of the device in line with your elected eraser methodology government agencies, legal authorities and independent Certify: every erasure regardless of device with a Certificate of Erasure testing laboratories. • Provide auditors with tamper-proof reports that contain the data about the device and standard used – keeping you compliant with ISO, PCI DSS, HIPAA and more View Our Certifications • Customize reports based on your policies and procedures • Seamlessly input reports into your existing asset, process management, ticket system and more with our Open API DIAGNOSE ERASE CERTIFY • Up to 32 tests for iOS and 39 tests for • 40+ devices simultaneously • Full transparency of eraser process Android, including call back ensures a seamless audit trail • • Automatic and user-assisted tests • Comprehensive reports include details reinstall, automated passcode bypass, such as target device name and model, • Test duration from 30 sec. to 3 minutes, automatic iOS Activation and iOS Revive IMEI code and storage capacity depending on number of tests deployed • • • Enable or disable customized tests for Factory Reset & Report and Android Smart Reset • Blancco Management Console enables • Remotely access performance data for • report viewing and automated sharing reliable diagnosis automatic start when target device is • Automated report backup in case of power outage or other unexpected local issue prior to start • settings for all target devices to ensure successful completion • Failed target devices can be retried without consuming additional licenses • User Interface supports custom views, sorting and USB port naming INSTALL AUTOMATE SUPPORT • Built on Linux kernel • Independent of host system OS • Access to customer portal including knowledge base • Bootable via CD/DVD, USB or PXE • Process 80+ target devices simultaneously • Product updates/upgrades • Installable to host system hard drive for permanent installation • iOS Activation Lock (Find My iPhone) • iOS (all versions) detection • Automatic update from network • Android (from 2.0 onwards) • Live call test integration • Windows Phone (from 7.0 onwards) • • BlackBerry (5.x, 6.x and 7.x) network from central repository • Language support for English, German, • Detailed statistics directly visible in the Italian, French, Chinese, Japanese and UI (e.g., success rate, top 5 processed Korean* models, volume handling per hour and percentage rates of processed operating systems) *Please ask your Blancco sales representative • Label printing available, with fully for details. customizable print layouts • Admin mode for managing user rights For more information about Blancco Technology Group, please visit www.channel-it.com. Copyright © 2017 Blancco Technology Group. All Rights Reserved. rev 2017.06.
Recommended publications
  • Secure Data Deletion
    Research Collection Doctoral Thesis Secure Data Deletion Author(s): Reardon, Joel Publication Date: 2014 Permanent Link: https://doi.org/10.3929/ethz-a-010411932 Rights / License: In Copyright - Non-Commercial Use Permitted This page was generated automatically upon download from the ETH Zurich Research Collection. For more information please consult the Terms of use. ETH Library Diss. ETH No. 22475 Secure Data Deletion A thesis submitted to attain the degree of DOCTOR OF SCIENCES of ETH ZURICH (Dr. sc. ETH Zurich) presented by Joel Reardon Master of Mathematics, University of Waterloo born 31.07.1983 citizen of Canada accepted on the recommendation of Prof. Dr. Srdjan Capkun,ˇ examiner Prof. Dr. David Basin, coexaminer Prof. Dr. Ari Juels, coexaminer Prof. Dr. Paul Van Oorschot, coexaminer Dr. Alessandro Sorniotti, coexaminer 2014 Abstract Secure data deletion is the task of deleting data from a physical medium so that the data is irrecoverable. This irrecoverability is what distin- guishes secure deletion from regular deletion, which ostensibly deletes unneeded data only to reclaim resources. We securely delete data to prevent an adversary from gaining access to it, and so secure deletion is a natural part of the confidentiality of data. In this thesis, we examine secure deletion in a variety of different systems and different layers: from the hardware level of ensuring a storage medium can efficiently delete data to the system level of deleting data from unreliable and untrusted servers. We examine related work in detail, identify the deficiencies and unsolved problems, and build our own solutions to advance the state of the art.
    [Show full text]
  • Electronic Media Sanitization Standard
    Electronic Media Sanitization Background Computing systems (including desktops, laptops, tablets, networking equipment, cellular phones, smart phones and other devices) store data on a wide variety of storage media (e.g., hard drives, USB flash drives, solid-state drives, floppy disks, CD-ROM's, DVD’s, Blu-Ray’s, tapes, memory, etc.). This data must be securely removed from the media once the data and/or device is no longer required in order to prevent unauthorized disclosure of the data. This is particularly important if the device contains Export Controlled or Restricted data as defined in the Data Governance & Classification Policy. Data could be disclosed through many avenues including computers or equipment sold, recycled or disposed without appropriate media sanitization practices, equipment with storage media returned to vendors as defective or as a trade-in for new equipment, or mobile media not being properly sanitization and or destroyed after use. Standard The NIST Special Publication 800-88r1 - Guidelines for Media Sanitization is used as the primary guide for this document. NIST Special Publication 800- 88r1 explains the need for proper media sanitization, types of sanitization, roles and responsibilities and much more information related to this topic. The Electronic Media Sanitization Standard is mandatory for media that contains Export Controlled or Restricted data and is recommended for media that contains Controlled data. Export Controlled data may have additional sanitization requirements, see Export Controls Office for additional information. Each college or department must adhere to the University General Retention Schedule unless the college or department has an approved unique schedule. When Export Controlled or Restricted data has been stored on media where that media is to be reused or forwarded to UC Surplus Management for appropriate disposition, it is imperative that measures be taken to sanitize the media before it leaves control of the department of responsibility.
    [Show full text]
  • Unwanted Data
    www.osbplf.org Malpractice Prevention Education for Oregon Lawyers Unwanted Data: How to Properly Destroy Data in Hardware If you have old computers and other office Options for Permanent Data equipment in your law office or home, there is Erasure a good reason they are still with you and not in the dumpster. This article will discuss why you You have two ways to completely destroy should be concerned about the data in your de- data: (1) use specialized software to overwrite the vices and the proper way to dispose of them. data or (2) physically destroy the hard drive. Why It Matters Using Data Sanitization Software Oregon Rule of Professional Conduct 1.6(c) Specialized software tools permanently de- requires lawyers to take reasonable steps to pre- lete files from your computer by overwriting vent the inadvertent disclosure of or unauthorized the information with random data. When this access to client information. To comply with this “data sanitization” method is used, overwritten rule, you need to make sure client data stored data can never be un-deleted with a file recov- in your computer and other media aren’t com- ery tool. Software programs that permanently promised when you get rid of the devices. This delete selected files are called file shredder pro- April 2017 requires you to ensure that data stored on these grams. Software programs that completely erase Issue 131 devices cannot be reconstituted after they leave the entire hard drive, not just selected files, are your control. It’s necessary that you permanently called data destruction programs.
    [Show full text]
  • Guidelines for Media Sanitization
    NIST Special Publication 800-88 Revision 1 Guidelines for Media Sanitization Richard Kissel Andrew Regenscheid Matthew Scholl Kevin Stine This publication is available free of charge from: http://dx.doi.org/10.6028/NIST.SP.800-88r1 C O M P U T E R S E C U R I T Y NIST Special Publication 800-88 Revision 1 Guidelines for Media Sanitization Richard Kissel Andrew Regenscheid Matthew Scholl Kevin Stine Computer Security Division Information Technology Laboratory This publication is available free of charge from: http://dx.doi.org/10.6028/NIST.SP.800-88r1 December 2014 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Willie May, Acting Under Secretary of Commerce for Standards and Technology and Acting Director Authority This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. § 3541 et seq., Public Law 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular A-130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A-130, Appendix III, Security of Federal Automated Information Resources. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority.
    [Show full text]
  • Blancco Mobile Device Eraser User Manual for Version 3.1
    Blancco Mobile Device Eraser User Manual for Version 3.1 www.blancco.com Definitions Item Explanation Android is a mobile operating system which is based on the Linux kernel and is currently being developed by Google. Android's source code is Android released by Google under open source licenses, although the majority of Android devices ultimately ship with a combination of open source and proprietary software. BMDE Blancco Mobile Device Eraser. Acronym for Basic Input/Output System. On PCs, BIOS contains all of the BIOS code required to control (for example) the keyboard, display screen and disk drives. BlackBerry OS is a proprietary mobile operating system developed by BlackBerry BlackBerry Ltd for its BlackBerry line of smartphone handheld devices. Blancco Management Console. Blancco software used to store and BMC/MC manage Blancco erasure reports. Please read the BMC manual for more information. A checksum or hash sum is a fixed-size datum computed from an arbitrary Checksum block of digital data for the purpose of detecting accidental errors that may have been introduced during its transmission or storage. The Central Regulatory Domain Agent for wireless networks. CRDA acts as the helper for communication between the core-software and UI for CRDA regulatory compliance. See http://linuxwireless.org/en/developers/Regulatory/CRDA/ for more information. Cryptographic Erase (CE) is a method to render data on a device unusable by overwriting or changing the key used to encrypt or decrypt the data. Cryptographic Erase Once the CE takes place, the data read back is effectively scrambled and, hence, unreadable, therefore equating to a type of sanitization.
    [Show full text]
  • Recommendation on Data Sanitisation and Data Medium Destruction Techniques
    Data Protection Authority Recommendation on data sanitisation and data medium destruction techniques Information media erasure and destruction guide | Version 1.01 - 23/03/2021 1 1 WARNING: This document is intended to provide additional explanation to the rules in force and does not exempt the controller from its obligations and responsibilities under the GDPR and other applicable texts. Considering its requirements and the risk analysis that it carries out or plans, it shall use one or the other tool and method, given in particular the evolution of knowledge and technologies. The different tools and brands cited in this document are cited for the sole purpose of providing examples. The Authority makes no representation as to their compliance with the GDPR and other regulations or as to their quality and performance. Information media erasure and destruction guide | Version 1.01 - 23/03/2021 2 2 TABLE OF CONTENTS Summary ............................................................................................................................................................................. 6 1. Introduction ..................................................................................................................................... 7 Limitations ................................................................................................................................................................... 9 Target audience.....................................................................................................................................................
    [Show full text]
  • Guide to Digital Privacy at the U.S. Border
    Digital Privacy at the U.S. Border PROTECTING THE DATA ON YOUR DEVICES AND IN THE CLOUD Sophia Cope, Staff Attorney Amul Kalia, Analyst Seth Schoen, Senior Staff Technologist Adam Schwartz, Senior Staff Attorney MARCH 8, 2017 ELECTRONIC FRONTIER FOUNDATION EFF.ORG 1 Table of Contents Digital Privacy at the U.S. Border.............................................................................................1 EXECUTIVE SUMMARY....................................................................................................5 PART 1: DIGITAL PRIVACY GUIDE FOR TRAVELERS...............................................9 What is the Border?..............................................................................................................9 Risk Assessment Factors.......................................................................................................9 Factors about You..............................................................................................................................9 Factors About Your Data and Devices............................................................................................10 Before You Arrive at the Border..........................................................................................11 Talk to Your Employer....................................................................................................................11 Minimize the Data Tat You Carry Across the Border..................................................................12 Protect What You Carry
    [Show full text]
  • As a Potential Privacy Violation
    Digital Privacy at the U.S. Border PROTECTING THE DATA ON YOUR DEVICES Sophia Cope, Staff Attorney Amul Kalia, Analyst Seth Schoen, Senior Staff Technologist Adam Schwartz, Senior Staff Attorney DECEMBER 2017 ELECTRONIC FRONTIER FOUNDATION EFF.ORG 1 Table of Contents ..................................................................................................................................................1 Digital Privacy at the U.S. Border.............................................................................................1 EXECUTIVE SUMMARY.................................................................................................... PART 1: DIGITA# PRIVACY GUIDE F%R TRAVE#ERS...............................................& 'hat i( the Border)..............................................................................................................& Ri(* A((es(+ent Factor(.......................................................................................................& $actor( a-o.t Yo...............................................................................................................................& $actor( A-o.t Yo.r Data a,d Device(............................................................................................10 Before Yo. Arrive at the Border..........................................................................................11 Tal* to Yo.r Em1loyer....................................................................................................................11 Mi,i+i2e
    [Show full text]
  • Blancco Mobile
    BLANCCO MOBILE User Manual for Windows 7 (Professional, Ultimate or Enterprise) www.blancco.com TABLE OF CONTENTS Contact and Legal Information ................................................................................................. 4 Notice to Users ................................................................................................................ 4 Introduction ........................................................................................................................... 5 Overview ......................................................................................................................... 5 System Requirements ....................................................................................................... 5 Licensing ......................................................................................................................... 5 Getting Help .................................................................................................................... 6 Online Help ..................................................................................................................... 6 Technical Support ............................................................................................................ 6 Chapter 1: Installation ............................................................................................................ 7 Installing Blancco Mobile..................................................................................................
    [Show full text]
  • Blancco Mobile Device Eraser Advanced Mobile Data Erasure for Your Mobile Devices
    Blancco Mobile Device Eraser Advanced Mobile Data Erasure for your Mobile Devices Blancco Mobile Device Eraser enables organizations Why Blancco to securely and efficiently wipe any sensitive data on mobile devices to comply with the most stringent data As the de facto standard sanitization standards and achieve compliance. in data erasure, Blancco Blancco mobile and phone wiping software allows organizations, mobile service provides thousands of providers and resellers to permanently erase all data from smartphones and tablets running on iOS, Android, Windows Phone and BlackBerry operating organizations with an absolute systems. Blancco is the most comprehensive and trusted data erasure solution line of defense against costly on the market, ensuring sensitive data is not exposed after mobile devices are disposed of, recycled, traded in or resold. security breaches, as well as verification of regulatory compliance through a 100% Key Benefits tamper-proof audit trail. Fast and Effective Erasure Our data erasure solutions • Conduct high-speed erasure of up to 50 iOS, Android, Windows Phone and BlackBerry devices at once to improve processing time and productivity. have been tested, certified, • Instantaneous USB connectivity ensures you’re up and running without delay. approved and recommended 100% Tamper-Proof Erasure Certification by 18 governing bodies around • Provides a digitally signed proof of data erasure certificate for audit trail the world. No other security purposes firm can boast this level of • Compliant with state, federal and international data privacy regulations compliance with the most and guidelines, including ISO 27001 and ISO 27040. rigorous requirements set by Flexible and User-Friendly Interface government agencies, legal • Closely monitor ongoing erasure and diagnostic processes to improve authorities and independent success rate and reduce turn-around time.
    [Show full text]
  • Commonwealth of Virginia
    ITRM Standard SEC514-05 Removal of Commonwealth Data from Electronic Media Standard July 1, 2019 COMMONWEALTH OF VIRGINIA Information Technology Resource Management Standard Removal of Commonwealth Data from Electronic Media Standard Virginia Information Technologies Agency Page i ITRM Standard SEC514-05 Removal of Commonwealth Data from Electronic Media Standard July 1, 2019 ITRM Publication Version Control ITRM Publication Version Control: It is the User's responsibility to ensure they have the latest version of this ITRM publication. Questions should be directed to VITA’s Enterprise Architecture (EA) Division. EA will issue a Change Notice Alert and post on the VITA Website, provide an email announcement to the Agency Information Technology Resources (AITRs) and Information Security Officers (ISOs) at all state agencies and institutions as well as other parties PPEA considers interested in the change. This chart contains a history of this ITRM publication’s revisions. Version Date Purpose of Revision Original N/A Base Document Revision 2.1.0 10/28/2003 SEC2003-02-1 Rev 0 (10/28/2003) Revision 2.1.1 03/08/2004 Supersedes SEC2003-02-1 Rev 0 Revision 3 3/15/2008 Supersedes SEC2003-02-1 Rev 1. This revision reflects legislative changes that expanded the CIO’s information security responsibilities to include Judicial, Legislative and Independent Agencies branches of government, and Institutions of Higher Education. In addition, appendix B (Non-Disclosure Agreement) and appendix C (Data Removal Quality Assurance Form) along with several minor changes were made to reflect current industry practices and to amplify requirement statements. Also this change reflects the new numbering structure for all PSGs.
    [Show full text]
  • Analysis of Data Remanence After Factory Reset, and Sophisticated Attacks on Memory Chips
    ANALYSIS OF DATA REMANENCE AFTER FACTORY RESET, AND SOPHISTICATED ATTACKS ON MEMORY CHIPS Mariia Khramova, Sergio Martinez Blancco Technology Group Abstract: Considering the amount of data stored on smartphones, it is critical that none of the user information is retrievable in case of device resell or disposition. Data security on disposed devices is one of the key enablers for device lifetime extension and, consequently, for making electronics more sustainable. Factory Reset, being default data wipe solution offered by Android, has already been challenged by researchers from University of Cambridge back in 2015. That has been the first comprehensive study and probably one of the most recognized works on evaluation of Android Factory Reset performance. The study proved that default erasure process is failing to securely sanitize the storage on Android versions from Gingerbread to Jelly Bean (v.2.3 – 4.3). However, despite frequent updates of Android OS, there was no further research conducted to reexamine Factory Reset reliability on newer devices and OSes. Our study has brought this line of research to the new level and investigated the changes of Factory Reset effectiveness over the past years. In addition, we have evaluated the robustness of in-built Android sanitization against attacks of different degree of sophistication including chip-level data read on one of the best-selling smartphones in history Samsung Galaxy S4 (80 Million units) [1]. The results show that Android Factory Reset logical sanitization has generally improved making user data more difficult to recover. However, default erasure process is still failing to irretrievably erase the data, which allowed us to retrieve the user data directly from the NAND flash bypassing the controller.
    [Show full text]