How do I know which method or algorithm I should use in iShredder™ to securely delete data?
When it comes to securely deleting data with iShredder™, it is important to choose the right erasure algorithm for your specific requirements. Each algorithm is designed for different security standards and may be more or less suitable depending on the type of data to be erased and the desired level of security.
iShredder™ offers more than 20 approved erasure algorithms that exceed international government and military security standards for secure data deletion. Depending on the edition of iShredder™, you have access to different erasure algorithms such as DoD 5220.22-M E, U.S. Air Force (AFSSI-5020), U.S. Army AR380-19, DoD 5220.22-M ECE, BSI/VS-ITR TL-03423 Standard, BSI-2011-VS, BSI TL-03423, NATO Standard, CSEC ITSG-06, HMG InfoSec No.5, DoD 5220.22 SSD, and others.
It is important to note that some erasure algorithms are more secure than others and may be better suited for specific types of data. For SSDs, for example, it is best to use a special erasure algorithm designed specifically for SSD/flash storage.
It is recommended that you read the explanations for the individual erasure algorithms in order to choose the appropriate algorithm that matches your needs and requirements and ensures that all data is completely and securely erased.
As a general rule, the more rounds an erasure algorithm has and the more complex it is, the more securely the data will be erased. However, this also takes significantly more time than an algorithm with only 1 round.
A suitable and secure method that is appropriate for magnetic hard drives, SSDs, and flash storage is the 4-round Protectstar™ ASDA method.
For more information, please visit: https://www.protectstar.com/de/secure-erase


