Visit our website in dark mode to reduce energy consumption and to reach our goal of becoming CO2-neutral.

How do I know what method/algorithm to use in iShredder™ to delete data securely?

When it comes to securely erasing data with iShredder™, it's important to choose the appropriate erasure algorithm based on your specific needs. Each algorithm is designed to meet different security standards and may be more or less appropriate depending on the type of data you're erasing and the level of security you require.

iShredder™ offers over 20 approved erasure algorithms that exceed international government and military security standards for secure data erasure. Depending on the edition of iShredder, you may have access to different erasure algorithms such as DoD 5220.22-M E, U.S. Air Force (AFSSI-5020), U.S. Army AR380-19, DoD 5220.22-M ECE, BSI/VS-ITR TL-03423 Standard, BSI-2011-VS, BSI TL-03423, NATO Standard, CSEC ITSG-06, HMG InfoSec No.5, DoD 5220.22 SSD and others.

It's important to note that some erasure algorithms are more secure than others and may be more appropriate for certain data types. For example for SSD, for instance, it's best to use a specific erasure algorithm designed for SSD/Flash memory.

It is recommended to read each explanation for each erasure algorithm to select the appropriate algorithm that suits your need and requirement to ensure that all the data is completely and securely erased.

In general, the more cycles the erasure algorithm has and the more complex it is, the more securely the data will be erased. However, this also takes significantly more time than an algorithm with only 1-cycle.

A suitable and secure method that works for magnetic hard drives, SSD, and Flash memory is the 4-Cylces Protectstar™ ASDA method.

For more information, please visit: https://www.protectstar.com/en/secure-erase

Was this article helpful? Yes No
21 out of 23 people found this article helpful