Shred it like a Pro!
Another breakthrough from
the market leader in data
erasure of iOS devices
With military grade security,
sends unwanted files to the Nirvana
on the Apple™ devices with ease.
Selling or giving away
your Apple™ devices?
You'll want to destroy all the files on it first – without a trace.
Before you sell or give away your iPhone, iPad, or iPod touch,
you'll need to make sure that all your personal files on the
device have been blitzed beyond recovery.
It's dead easy to restore supposedly deleted files from the
memory on your Apple™ device these days – files containing
notes, passwords, address book, photos, videos, calendars,
bookmarks and more.
Deletion without trace
in three easy steps
You might think you've deleted those photos and videos on your devices but anyone can restore those manually deleted files from the free space on your device until the free space itself has been overwritten using secure deletion algorithms.
It takes just three simple steps to overwrite that free space using patented security standards, making it impossible to rescue any deleted files.
First, open iShredder™
Second, select a secure deletion algorithm
Third, start the deletion process
Like a state-of-the-art paper shredder,
this tiny program goes beyond
international security standards.
iShredder™ surpasses international standards used by state and military organizations in secure file deletion with a wide selection of tried-and-trusted state-of-the-art deletion algorithms.
Each algorithm has been analysed by authorities and independent organizations to make sure it really does what it says on the tin – data destruction beyond redemption.
Depending on the edition, the iShredder™ package comes with deletion algorithms such as DoD 5220.22-M E, US Air Force (AFSSI-5020), US Army AR380-19, DoD 5220.22-M ECE, BSI/VS-ITR TL-03423 Standard, BSI-VS-2011, NATO Standard, Gutmann, HMG InfoSec No.5, DoD 5220.22 SSD and others.
Available in four editions
|Secure free space deletion|
|Standard secure deletion algorithms pre-installed|
|Additional secure deletion algorithms such as HMG InfoSec No.5 and DoD 5220.22-M ECE|
|State-of-the-art algorithms for erasing flash memory|
|Highly secure deletion algorithms such as DoD 5220.22-ME for SSD, BSI/VS TL-03423 ITR, Gutmann and Protect™ SDA|
|Quality deletion algorithms such as US Air Force (AFSSI-5020), BSI-VS-2011|
|Technical support by e-mail|
|Optimized for Apple iPhone®/iPod® touch|
|Optimized for Apple iPad®|
|New Wiping Method Package incl.||Optional||Optional|
Apple AppStore Volume Purchasing
for your Business
Whether you’re providing apps to ten employees or ten thousand, the Volume Purchase Program makes it simple to buy, and distribute the ProtectStar apps your business needs.
Please note that ProtectStar sells on a per device basis, not on a per user basis. For every single device in your company you need to purchase one license.