iShredder™ is the most popular data eraser for iOS, Android, Windows, Mac, and Windows Server. Since 2010, this secure deletion software has won numerous awards and is used by more than 4,000,000 users, in over 100 countries worldwide.
iShredder™ uses data shredding techniques that go beyond international standards. Its data deletion is so secure that government agencies and defense ministries trust, and use this robust process.
It is easy to restore supposedly deleted files from memory on your Apple™ device – files containing notes, passwords, address book, photos, videos, calendars and more.
Before you sell or give away your iPhone, iPad, or iPod touch, you'll need to make sure that all your personal files on the device have been blitzed beyond recovery.
You might think you've deleted those photos and videos on your devices, but anyone can restore those manually deleted files from the free space on your device until the free space itself has been overwritten using secure deletion algorithms.
It takes just three simple steps to prepare your iOS device for selling or just securely overwrite the free space using patented security standards, making it impossible to recover any deleted data.
1. Connect your device
2. Choose the method
3. Begin to shred
When you delete a file or a photo, the operating system removes the reference to that data but doesn’t eliminate the actual information on your memory. It just plainly marked as free so that another file can come and use those blocks.
With the award-winning free space erase option in iShredder™ iOS®, you can wipe the unused disk space securely so that deleted data cannot be recovered.
Data erasure is overwriting the data in every sector. This will make recovering the data impossible.
After erasing your data, iShredder™ will generate a report which you could use for the audit trail, the proof of erasure. It provides auditable and verifiable assurance that all data was sanitized in compliance with published standards such as GDPR, UK Government InfoSec No. 5, U.S. DoD, NIST 800-88.
iShredder™ iOS surpasses international standards used by state and military organizations in secure deletion. Each algorithm has been analyzed by authorities and independent organizations to make sure it really does what it says on the tin – data destruction beyond redemption.
Depending on the edition, the software comes with deletion algorithms such as DoD 5220.22-M E, US Air Force (AFSSI-5020), US Army AR380-19, DoD 5220.22-M ECE, BSI/VS-ITR TL-03423 Standard, BSI-2011-VS, CSEC ITSG-06, NATO Standard, Gutmann, HMG InfoSec No.5, DoD 5220.22 SSD and others.
iShredder™ surpasses international standards used by state and military organizations in secure file deletion with a wide selection of tried-and-trusted state-of-the-art deletion algorithms. Each algorithm has been analyzed by authorities and independent organizations to make sure it really does what it says on the tin – data destruction beyond redemption.
iShredder™ comes with deletion algorithms such as DoD 5220.22-M E, US Air Force (AFSSI-5020), US Army AR380-19, BSI-2011-VS, DoD 5220.22-M ECE, BSI/VS-ITR TL-03423, CSEC ITSG-06, NATO Standard, Gutmann, HMG InfoSec No.5, DoD 5220.22 SSD and others.
With the latest European General Data Protection Regulation (EU GDPR), new requirements for the secure deletion of data have arrived, which applies to all companies.
If sensitive information falls into the wrong hands, this can result in a serious loss of revenue, penalties, or damage to reputation. In addition to the GDPR Art.17 "Right to erasure (‘right to be forgotten’)", please see article: https://gdpr-info.eu/art-17-gdpr/ - data protection laws prescribe a thoroughly documented destruction of data. Personal data is no longer required, for which there is no legal basis for long-term storage, and must be permanently and securely removed from the IT systems.
iShredder™ offers all possibilities for complete protection of sensitive information, and GDPR-compliant data deletion, including detailed erasure reports.
11 erasing methods in total
18 erasing methods in total