Our Services:

Certified Data Destruction Services

Disposal of surplus information technology (IT) equipment without taking appropriate measures to sanitize the data stored on the system’s media can lead to the disclosure of sensitive information, embarrassment, costly investigations, bad publicity, and other negative consequences. Businesses and Federal agencies must establish policies and procedures to ensure the proper destruction of sensitive information.

The Department of Defense set forth protocols to ensure certified data deconstruction sanitation called National Industry Security Program (NISP). Here at KruseCom we value your security and adhere to the NISP program so that all our sanitation projects of data deconstruction are safe and certified to the highest standard possible. This ensures that your data and sensitive information are protected, erased, and undisclosed.

GOVERNING & APPLICABLE LAWS

The Privacy Act of 1974 | The Computer Security Act of 1987 | The Computer Matching and Privacy Protection Act of 1988 |

The Electronic Communications Privacy Act | The Gramm-Leach-Bliley Act | The Health Insurance Portability & Accountability Act (HIPAA)

Remote Erasure Services

In today’s world, working remotely is a common occurrence. Companies lease laptops and desktops for their employees and have to deal with retrieving and replacing those systems due to lease expirations or technology refreshes. That was challenging enough when those assets were in multiple facilities. It now becomes exponentially more difficult now that those assets could be spread out in thousands of homes and offices across multiple countries across the globe.

KruseCom now provides a simple, quick way to for remote erasure capabilities for laptops, desktops, and servers connected to the internet. Based on cloud licensing and secure cloud reporting, this solution allows users located anywhere in the world to execute erasures without the need to have any technical knowledge.


The asset administrator simply creates an equipment take-back job and determines how many assets will be associated with that job and enters it into our secure cloud interface.
Database entries with activation codes are automatically created for that job.
These activation codes can now be automatically emailed to users with instructions for sanitization and return.
As each asset completes its sanitization, the cloud database is updated with those results for real-time reporting.

Features

Completely automated (user enters activation code and hits install)

Capture System Information

Erase to ANY standard or requirement

Erase Laptops, Desktops, Servers

Automated Database, ERP and XCloud injection

Optional Secure PDF Report Generation for User

Optional Asset Burn-in Testing

Optional report fingerprint on storage device

Reporting

Completely Customizable

Device Reports

System Reports

User-Defined Report Fields

User-Defined Report Names

Database, ERP and XCloud injection

The Work Process

On-Site/Off-Site Certified Data Erasure

KruseCom erases hard drive data to Department of Defense standards. The DoD 5220-22M Standard States: Non-Removable “Rigid Disks” or hard drives must be sanitized for reuse by “Overwriting all addressable locations with a character, its complement, then a random character and verify.” The DoD 5220.22-M sensitization method was originally defined by the US National Industrial Security Program (NISP) in the National Industrial Security Program Operating Manual (NISPOM) and is one of the most common sensitization methods used in data destruction software. For data erasure, KruseCom utilizes the Cypher-L Series loose drive erasure device, which is compatible with the most recent NIST 800-88 guidelines for secure media sanitation, including Secure Erase, 1x, 3x, and 7x DoD with verify options, as well as many other methods.


On-Site/Off-Site Certified Data Destruction

When an organization retires their IT equipment they can: recycle, resell, or redeploy it. Either way, removal and destruction of the hard drive is the most complete way to ensure that all data is non-retrievable. Our in house, automatic hard driver crusher (SEM Model 1010) has been evaluated by the NSA/CSS and meets NSA and DoD compliance guidelines for the physical damage of media with a durability rating of 205 drives/hour. The hard drive crusher destroys all hard drives regardless of size, format or type up to 1.85″ high including desktop, laptop and server drives. The SEM hard drive crusher is an ideal way to meet the destroy mandate as part of the DoD’s Degauss and destroy specification. *The SEM Model 0101 Hard Drive Crusher is the only unit with a chamber large enough to fit hard drives mounted with rails or handles from hot-swap trays

Our Unique Value Among Global Service Providers

Many organizations claim to provide ITAD/IT Remarketing services but often outsource these tasks to resellers. This practice can break the chain of custody and increase the risk of data breaches.

At KruseCom, we maintain direct control over the entire ITAD process, ensuring data security and compliance every step of the way, from pickup to compliance & regulatory reporting.

Ready to Elevate Your IT Infrastructure Strategy?

Contact us to learn more about our services.

KruseCom is a data security and regulatory compliance provider offering a full suite of enterprise, GRC, and end-of-lifecycle services. For more information on our corporate structure, please visit us at www.qsgiinc.com.

Quick Links

Contact us

[email protected]

Tel: (561) 629-5713

Copyright ©2024 KruseCom, a QSGI Inc Company | All Rights Reserved | Privacy Policy | Site Map