NEW: Antivirus AI Mac is now availableDiscover now →
English
Deutsch Español Français Italiano Português Русский العربية हिन्दी 日本語 简体中文
For Home
Your privacy.
Uncompromised.
Real-time AI security for Android, iPhone, Mac and Windows. Independently certified and multiple award-winning.
Explore our products
AndroidAndroid
Anti Spy newfree
Detect & block spyware
Antivirus AI newfree
Real-time AI protection
Firewall AI free
Control network access
Camera Guard free
Monitor camera in real time
Micro Guard free
Protect microphone from spying
iShredder newfree
Permanently delete data
iOSiOS
iShredder iOS new
Securely delete photos & files
MacMac
Antivirus AI Mac free
Virus protection for macOS
Camera Guard Mac
Monitor camera in real time
iShredder Mac
Certified file deletion
iShredder iOS
Also runs on Apple Silicon Macs
iLocker Mac
Encrypt & lock apps
WindowsWindows
iShredder Windows
Certified data erasure
iShredder Server
For servers & IT teams
iShredder Technical
23 certified erasure standards
For Business
Security for
your organization.
Certified data erasure and security for SMBs, government agencies and enterprises – fully GDPR-compliant.
Explore business solutions
Android & iOS
iShredder Business b2b
Securely wipe multiple devices
iShredder Enterprise
MDM integration & certificates
Windows Server
iShredder Server b2b
Wipe servers & RAID arrays
iShredder Technical
Bootable, 23 certified erasure standards
For Defense
Defense Solutions
Defense Solutions gov
Trusted by government agencies & defense organizations worldwide
About Us
Shaping Security
since 2004.
We protect the privacy of over 8 million people worldwide – independently, transparently, without unnecessary data collection.
Our story
Company
About Protectstar
Who we are & what drives us
Our Philosophy
Security as a human right
Why Protectstar
Certified & award-winning
Your Privacy
How we protect your data
Environment
Our commitment to the planet
Team & Press
Our Team
The people behind Protectstar
Founder's Message
Vision & mission first-hand
Press Center
Media, logos & press kit
Customer Voices
What our users say
Intelligence
Artificial Intelligence
Artificial Intelligence
On-device AI detecting new threats in real time
iShredding
iShredding
23 certified erasure standards
For Home
For Business
About Us
FAQ & SupportBlog

Defense starts with data.

Independent since 2004. Internationally recognized.
Solutions trusted by government agencies and armed forces.
Offline, auditable, mission‑ready.

Guiding Principle

Our mission is simple: protect information before it becomes a liability.
For more than twenty years, we’ve built solutions that work when it matters with no cloud dependency and auditable proof for inspections. Minimal. Rugged. Reliable.

Four Commitments

Fast. Built‑in presets: NIST 800‑88, IEEE 2883‑2022, BSI‑CON.6.

Offline. Air‑gapped, field‑ready, no telemetry.

Auditable. Verified processes, signable reports.

Scalable. From a single depot drive to entire fleets.

iShredder™ Defense for Drones

Mission data is valuable but dangerous in the wrong hands.
iShredder™ Defense for Drones renders it irreversibly unusable: fast, standards‑aligned, with auditable proof.

Status: In development. Not available for purchase

Early Access: Join the waitlist. We prioritize units ready for evaluation.

When a drone lands, the real safeguarding begins: mission data, video streams, telemetry, black‑box logs. iShredder™ Defense for Drones makes this data irreversibly unusable. With 20+ secure erasure methods, NIST SP 800‑88 presets, and digitally signable erasure reports for audits.

Why this solution stands out

Protectstar logo

Mission‑ready presets:

NIST 800‑88 (Clear/Purge/Destroy) · IEEE 2883‑2022 · BSI‑CON.6 · DoD 5220.22‑M / HMG IS5 (legacy compatibility).

NSA/CSS 9‑12 is presented as a destruction workflow (with EPL reference).

Protectstar logo

Broad coverage:

Secure erasure of HDD/SSD, removable media, and memory cards; support for NVMe SanitizeATA Secure Erase/EnhancedSCSI SANITIZEeMMC Secure Erase/TrimSD‑ERASE.

Protectstar logo

Proof included:

Digitally signable erasure reports with method, LBA coverage (incl. HPA/DCO/OP), timestamps, and device IDs. Ideal for chain‑of‑custody and audits.

Protectstar logo

Platforms

Windows, macOS, iOS and Android. Built for depot workstations and controller tablets.

How it works in the depot
(Windows/macOS)

iShredder operates fully offline and prioritizes hardware‑level purge commands — such as NVMe Sanitize, ATA Secure Erase/Enhanced, SCSI SANITIZE, eMMC Secure Erase/Trim, or SD‑ERASE. It then verifies LBA coverage (including HPA/DCO/OP). The report includes method, timestamps, and device IDs for chain‑of‑custody.
For random‑pattern overwrites, iShredder uses a cryptographically secure RNG (e.g., NIST SP 800‑90A DRBG). Optional FIPS 140‑3‑capable builds with CAVP‑validated DRBGs are available; formal validation will be listed by certificate ID.

  • Connect

    Connect

    Attach the mission SSD/HDD or card via a verified adapter or service port.

  • Next
  • Select profile

    Select profile

    Choose the classification profile (e.g., NIST Purge / IEEE 2883 Purge / BSI profile).

  • Next
  • Erase & attest

    Erase & attest

    iShredder performs the appropriate sanitize/crypto‑erase or verified overwrite and generates a digitally signable erasure report.

Standards & Guidelines

In the U.S./DoD, NIST SP 800‑88 Rev. 1 is the baseline (Clear/Purge). For classified media, NSA/CSS 9‑12 applies; approved destruction devices are listed on the EPL. In Germany/EU, practice follows BSI IT‑Grundschutz CON.6, selecting the method by protection needs - for SSDs, device‑/command‑specific sanitization is preferred. In the UK, see NCSC “Secure sanitisation of storage media.” In the NATO context, the NATO Security Policy sets the guardrails; specific erasure patterns are defined nationally.

Preset recommendation:

  • Unclassified/FOUO:NIST/IEEE Clear
  • Sensitive/Secret:NIST/IEEE Purge (e.g., NVMe Sanitize / ATA Secure Erase) + verification
  • Top Secret / NATO Secret:Destruction workflow per NSA/CSS 9‑12/EPL or national guidance
Contact

Early Access
& Pilot Program

iShredder™ Defense for Drones is in development.