NEW: Antivirus AI Mac is now availableDiscover now →
English
Deutsch Español Français Italiano Português Русский العربية हिन्दी 日本語 简体中文
For Home
Your privacy.
Uncompromised.
Real-time AI security for Android, iPhone, Mac and Windows. Independently certified and multiple award-winning.
Explore our products
AndroidAndroid
Anti Spy newfree
Detect & block spyware
Antivirus AI newfree
Real-time AI protection
Firewall AI free
Control network access
Camera Guard free
Monitor camera in real time
Micro Guard free
Protect microphone from spying
iShredder newfree
Permanently delete data
iOSiOS
iShredder iOS new
Securely delete photos & files
MacMac
Antivirus AI Mac free
Virus protection for macOS
Camera Guard Mac
Monitor camera in real time
iShredder Mac
Certified file deletion
iShredder iOS
Also runs on Apple Silicon Macs
iLocker Mac
Encrypt & lock apps
WindowsWindows
iShredder Windows
Certified data erasure
iShredder Server
For servers & IT teams
iShredder Technical
23 certified erasure standards
For Business
Security for
your organization.
Certified data erasure and security for SMBs, government agencies and enterprises – fully GDPR-compliant.
Explore business solutions
Android & iOS
iShredder Business b2b
Securely wipe multiple devices
iShredder Enterprise
MDM integration & certificates
Windows Server
iShredder Server b2b
Wipe servers & RAID arrays
iShredder Technical
Bootable, 23 certified erasure standards
For Defense
Defense Solutions
Defense Solutions gov
Trusted by government agencies & defense organizations worldwide
About Us
Shaping Security
since 2004.
We protect the privacy of over 8 million people worldwide – independently, transparently, without unnecessary data collection.
Our story
Company
About Protectstar
Who we are & what drives us
Our Philosophy
Security as a human right
Why Protectstar
Certified & award-winning
Your Privacy
How we protect your data
Environment
Our commitment to the planet
Team & Press
Our Team
The people behind Protectstar
Founder's Message
Vision & mission first-hand
Press Center
Media, logos & press kit
Intelligence
Artificial Intelligence
Artificial Intelligence
On-device AI detecting new threats in real time
iShredding
iShredding
23 certified erasure standards
For Home
For Business
About Us
FAQ & SupportBlog
iShredder™ Windows · Server Editions

Erase server data.
Without taking systems offline.

iShredder™ Windows Server securely overwrites files, folders, partitions, free space, and RAID volumes directly on Windows Server. No reboot required. Includes up to 23 erasure methods, CLI automation, and signed audit reports.

23Methods
LiveLive Operation
RAID& External Volumes
CLI& Reports

What normal deletion leaves behind

Deleted does not mean overwritten.

Windows usually removes only the file-system reference. Data remnants can remain in unallocated sectors, shadow copies, cache files, and paging areas until they are deliberately overwritten.

What iShredder Server delivers

Six capabilities. One audit-ready record.

From live erasure to signed reporting, iShredder Server goes beyond conventional deletion tools.

Live Erasure

Runs directly on Windows Server and erases selected data without restarting the server.

Up to 23 Erasure Methods

Server includes 11 methods; Military Server extends this to 23, including methods based on DoD, NATO, BSI, NIST, and Protectstar ASDA.

RAID & External Drives

Supports standard Windows volumes, hardware and software RAID, external server drives, and USB backups.

Signed Audit Reports

Documents volume, method, passes, bytes, timestamps, operator, and verification. Digitally signed for tamper-evident documentation.

Command Line

Built for PowerShell, batch jobs, schedulers, and recurring erasure workflows.

Residual Data Cleanup

Overwrites data remnants in free space, the Recycle Bin, temporary files, paging areas, and browser caches.

Live on Windows Server

When data has to go, the server stays online.

iShredder Server runs as an application on Windows Server. Files, folders, partitions, and free space can be overwritten without restarting the machine. Services and workloads continue running as long as they are not accessing the data currently being erased.

Securely erase files on Windows Server.
  • Runs directly on Windows Server 2016, 2019, 2022, and 2025
  • Files, folders, partitions, free space, temporary files, and browser data
  • Hardware and software RAID, external storage volumes, and USB backups
  • Command line for scripts, schedulers, and automated workflows

The proof

Recoverable before. Verifiably overwritten after.

Normal file deletion usually removes only the reference. iShredder overwrites the affected areas and documents verification in the report.

Before

Recoverable

Recovery possible
After

Verifiably overwritten

Verified

Illustrative visualization. The left side shows possible data remnants after normal file deletion. The right side shows an example representation after an overwrite-based erasure process with verification.

Up to 23 recognized erasure methods

The right method for every policy.

Server includes 11 methods; Military Server includes up to 23. The right edition depends on your policy: GDPR and ISO evidence, government audits, defense standards, or internal requirements.

Military & Defense

8 methods · NATO, DoD, US Army, USAF, Navy
  • NATO StandardNorth Atlantic Treaty Organization7 passes
  • DoD 5220.22-M ECEU.S. Department of Defense7 passes
  • DoD 5220.22-M E for SSDDoD variant for SSDs & flash4 passes
  • DoD 5220.22-M EU.S. Department of Defense3 passes
  • US Army AR380-19United States Army3 passes
  • USAF AFSSI-5020U.S. Air Force Cryptologic Support Center3 passes
  • NAVSO P-5239-26 (MFM)U.S. Navy, ST506 drives3 passes
  • NAVSO P-5239-26 (RLL)U.S. Navy, SCSI & ATA/IDE3 passes

Government & Public Sector

10 methods · BSI, HMG, NIST, CSEC, RCMP & more
  • German BSI TL-03423German Federal Office for Information Security8 passes
  • BSI-2011-VSBSI, modern variant (July 2011)5 passes
  • NIST SP 800-88 ProfileImplementation aligned with NIST clear/purge concepts and verificationNIST profile
  • Canadian RCMP TSSIT OPS-IIRoyal Canadian Mounted Police7 passes
  • Canadian CSEC ITSG-06Communications Security Establishment Canada3 passes
  • HMG Infosec No. 5 EnhancedUK government, NATO-approved3 passes
  • NCSC-TG-025National Computer Security Center3 passes
  • Russian GOST R 50739-95Russian data erasure standard2 passes
  • Australian ISM 6.2.92Australian Department of Defence1 pass

Protectstar ASDA

1 method · AES-256 · Read-after-write · since 2017
  • Protectstar ASDAAdvanced Secure Deletion Algorithm · 2017 · AES-256, cryptographically strong random values4 passes

Special Profiles for SSD, Flash, and Legacy Media

3 methods · Gutmann, SSD-optimized, random
  • Gutmann MethodPeter Gutmann · 1996 · academic classic35 passes
  • 0xFF for SSDOptimized for SSDs & flash memory1 pass
  • Random ValuesFast profile · for simple overwrites1 pass

NIST SP 800-88 Rev. 2 was published on September 26, 2025, and replaces Rev. 1. iShredder maps NIST-related methods to the procedures currently implemented in the product.

Award

Fortress Cybersecurity Award 2025 for iShredder™.

iShredder™ won the Fortress Cybersecurity Award in 2025. The evaluation focused on technical innovation, alignment with international security standards, performance, and user guidance.

The award places iShredder among international cybersecurity and enterprise technology providers.

Read the background on the award

Built for

For organizations that must prove erasure.

Protectstar technologies are used in more than 100 countries and on millions of devices, including by organizations with high data protection and compliance requirements.

  • Defense
  • Government & Public Sector
  • Banking & Finance
  • Healthcare
  • Forensics
  • Enterprise IT

iShredder™ Windows · Edition Comparison

Three editions. Three scenarios.

Server is built for recurring erasure and audit documentation. Military Server adds extended defense and government standards. Technical is intended for cases where the system drive itself must be erased.

FeatureServerRecommended
Military Server
Bootable
Technical
Secure erasure of files, folders, partitions, and free spaceYesYesYes
Signed audit reportsYesYesYes
RAID, SAS, SATA, NVMe, and external server drivesYesYesYes
Command line for scripts and schedulersYesYesYes
Live erasure during Windows Server operationYesYesNo
Extended military methods (NATO, NAVSO, AFSSI, CSEC)NoYesYes
Bootable from USB drive (outside Windows)NoNoYes
Total recognized erasure methods112323
BuyBuyBuy

System & Requirements

Requirements before you start.

iShredder Server is delivered as a Windows Server application. Here is an overview of the most important supported operating systems, storage scenarios, and file systems.

Operating Systems

Windows Server

  • Windows Server 2016, 2019, 2022, 2025
  • Supported editions: Standard, Datacenter, Essentials
  • Minimal storage requirement for installation
  • Languages: German, English

Storage & Interfaces

RAID, SAS, SATA, NVMe

  • SATA, SAS, SCSI, USB, iSCSI
  • Hardware and software RAID arrays
  • NVMe support depends on controller and driver
  • Defective or locked sectors are documented in the report

Data & File Systems

Files, Folders, Volumes

  • NTFS, ReFS, FAT32, exFAT
  • Files, folders, partitions, free space
  • Temporary directories, paging file, browser caches
  • The system partition itself cannot be erased; iShredder Technical is designed for that scenario

For NVMe drives and modern SSDs, we recommend also using a hardware secure erase provided by the manufacturer whenever available. Effective sanitization on solid-state media also depends on wear leveling and controller behavior.

GDPR & Audit

Every erasure. Documented and traceable.

The GDPR requires personal data to be erased in certain cases and requires controllers to demonstrate compliance with data protection principles. iShredder Server supports this documentation with signed reports covering method, volume, result, timestamp, and operator.

  • Supports technical evidence in GDPR-related processes. Documents erasure processes under Art. 17 (right to erasure) and Art. 5 (accountability) with method, storage medium, result, timestamp, and operator.
  • Audit support. Reports can support internal audits, ISO 27001 processes, data protection reviews, and government procedures.
  • Digitally signed. Subsequent changes to the report become detectable.
How Protectstar handles data itself
GDPR/DSGVO-Compliant Data Erasure

What the erasure report contains

Each report includes typical fields for technical evidence:

  • Device ID
  • Serial number
  • Windows version
  • Method
  • Number of passes
  • Verification
  • Timestamp
  • Operator

Important notice before you start

Once started, an erasure process is designed for permanent data removal. Volume, path, affected applications, backups, and method should be reviewed carefully before approval.

Licenses & Care Plan

Two editions. Two license terms.

Server for GDPR, ISO, and government audits. Military Server for extended military methods. 3-year licenses include the Care Plan with premium support and upgrades.

Server

iShredder™ Server

For ongoing compliance and audit processes: live erasure on Windows Server with 11 recognized methods, signed reports, and CLI automation.

US$149

1 year · or US$299 for 3 years with Care Plan

  • 11 recognized erasure methods
  • Live on Windows Server 2016, 2019, 2022, 2025
  • RAID, external drives, USB backups
  • Signed audit reports & command line
Select Server
Recommended

iShredder™ Military Server

For government agencies, defense, and stricter internal policies: all Server features plus up to 23 methods, including NATO, NAVSO, AFSSI, and CSEC.

US$199

1 year · or US$399 for 3 years with Care Plan

  • 23 recognized erasure methods
  • Extended military methods (NATO, NAVSO, AFSSI, CSEC)
  • All features of the Server edition
  • Signed audit reports & command line
Select Military Server

Frequently Asked Questions

Answers before you buy.

Server includes 11 methods and covers typical evidence requirements for GDPR, ISO, and government audits. Military Server includes up to 23 methods, including NATO, NAVSO P-5239-26, USAF AFSSI-5020, and CSEC ITSG-06.

If a policy or contract requires one of these standards, Military Server is the right edition. For standard GDPR and ISO 27001 workflows, Server is usually the right edition.

Yes. Server installs as an application on Windows Server and works during live operation. Active workloads, services, applications, and login sessions continue running as long as they do not involve the same files currently being erased.

A file opened by another process is logged in the report as "in use." Once released, it can be erased again, or the operation can be moved to a maintenance window.

Server includes a command-line mode. Paths, method, and report options are passed as arguments and can be integrated into PowerShell scripts, batch jobs, or Windows Task Scheduler. Every operation creates a signed report regardless of how it is launched.

Typical use cases include nightly maintenance windows, scheduled offboarding workflows, regular free-space cleanup, and automated GDPR erasures from a ticketing system.

Server works at the logical level of the Windows file system. Hardware and software RAID arrays are supported as long as Windows sees them as regular volumes. This applies to RAID 1, RAID 5, RAID 6, RAID 10, and common Storage Spaces configurations.

SATA, SAS, SCSI, USB, and iSCSI are supported. NVMe depends on the controller and driver. External server drives and USB backups are treated like regular volumes.

No. As long as Windows is running, parts of the system partition are locked: registry hives, the Master File Table, the paging file, and shadow copies. Server can overwrite files, folders, partitions, and free space, but not the partition on which Windows Server itself is running.

If a server's system drive itself must be erased, for example before device disposal or re-imaging, iShredder™ Technical is designed for that purpose. Technical boots from USB outside the system and can also overwrite the system partition in a verifiable way.

The reports are digitally signed and document host name, volume, path, method, number of passes, bytes, verification result, timestamp, and operator. This allows them to support internal audits, data protection reviews, ISO 27001 processes, and technical evidence requirements.

Whether a report is accepted as evidence in a specific proceeding is decided by the responsible authority. The reports provide the key technical evidence fields for that purpose.

For Audit, IT, and Compliance

The server stays online. The data goes. Verified.

iShredder™ Windows Server overwrites data directly on Windows Server and creates signed reports for audits, data protection, and automated IT processes.