Two Ways To Securely Destroy Solid State Data Drives

Business enterprises are recording a slew in the use of solid-state drives instead of the conventional electromechanical disks. Companies are ditching the use of the spinning platters in electromagnetic in traditional drives and employing the use of memory chips of solid-state disks to store information. However, the new and efficient data storage technique poses an increasing risk. Data destruction and sanitation methods are still novel ideas that many IT specialists are not familiar with. This blog will discuss two solid-state data destruction, and sanitizing practices that are a great way business enterprises can employ to secure sensitive data.

Physical data destruction

Among the solid-state data, destruction methods available are the physical destruction option. These are mechanical devices that physically manipulate a solid-state drive by interfering with its physical properties. The device design includes two spiked plates, each with 90 pins. These pins perforate the solid-state media of solid-state drives destroying all components in the memory chips. Calibration is made on the device to increase the crushing force and power to guarantee optimal data destruction.

Logical data destruction

SSDs have an inbuilt command infrastructure within the firmware to provide for the logical erasure of sensitive data. Data destruction tools and techniques erase data at both the hardware and software level, leaving the SSD devoid of all raw data. An example of a solid-state drive sanitizing tool is the ATA Secure Erase. A Secure Erase command on an SSD built-in controller causes the system to reset its storage cells as void, thus realizing and erasing stored electrons. This process is irreversible and thus guarantees the permanent erasure of sensitive data.

Download Whitepaper

'Download

Product Enquiry

Request Quote


    Button