Dataraze

  • Home
  • Product
  • Get Started
  • Arrange A Demo
  • Contact
  • News
  • Resources

About Dataraze

Some organisations are satisfied to store hard drives until a sufficient number are gathered, then arrange for an on-site service to shred multiple hard drives. The current method used, only records the serial number of the device before the operator places the drive into the shredding machine. Machines can destroy hundreds of drives per day, so for bulk destruction of low impact level data, this will suffice….

DataRaze has taken a monumental leap forward to offer and deliver real time auditable data and asset management ‘controlled in-house’, on a schedule suitable to the organisation. A ‘chain of custody’ breach during the time elapsing between the removal and storage of the drive and its eventual destruction, is when authorisation, control and responsibility are at their most critical.

DataRaze has been developed to eradicate the flaws with existing internal processes, where data passes along a potentially insecure chain of custody route. It is imperative to safely deliver data bearing media for destruction using as few steps as possible.

DataRaze has taken technology and created a long awaited futureproof secure solution. Secure access to DataRaze via biometric technology ensures only authorised members of the team use the system. Details of the asset, including the department that owned and created the data, will be recorded and reported.

DataRaze allows you to destroy your data when it’s critical for you, recording these actions with digital and video evidence, reporting each destruction occurrence. All evidence of the shred destruction process is recorded.

Features At A Glance

pageicon1QUIET AND QUICK OPERATIONpageicon2FULLY COMPUTERISED
CONTROL OF SHRED FROM START TO FINISH
pageicon3TOUCHSCREEN INTERFACE
pageicon4MULTIPLE OPERATORS, INDIVIDUALLY IDENTIFIEDpageicon5WASTE NOTES PRODUCED AND STOREDpageicon6BIOMETRIC USER CONTROL WITH SECURITY AUTHENTICATION
pageicon7REMOTELY ACCESSIBLE CENTRAL DATABASE OF ALL ACTIVITIESpageicon8ATTRACTIVE CASING TO HIDE ALL COMPONENTSpageicon9MOBILE UNIT FOR EASY DEPLOYMENT
pageicon10EASY ADMINISTRATION VIA WEB INTERFACEpageicon11SHRED PROCESS IS VISIBLE AND TRANSPARENT AT ALL STAGESpageicon12SAFE FOR ALL TO USE, SHREDDER ENCLOSED BEHIND LOCKED PANELS

Organisational Security

Remote Web Access to the DataRaze system ensures that those needing to know that a defective drive has been removed are kept informed, indicating when this occurred and who was responsible. These practices must form part of your internal process to clearly map such events. A ‘cradle to grave’ procedure can be achieved if staff utilise the auditing capabilities of DataRaze to provide much improved security throughout the organisation.

As part of its process, DataRaze will request an expected date of arrival for the drive intended for destruction. Each time a drive is returned to DataRaze a report will alert the Data Controller that the drive has been returned and registered. It will continue to alert the Data Controller of any drives that remain outstanding within the expected date/ period for destruction.

If the date of arrival overruns, then DataRaze would immediately alert the Data Controller that a drive holding data has not been returned or registered as expected, and remains on the “missing” list recorded on the DataRaze system.

Arrange A Demo

Name

Email address

How Can We Help You?

Dataraze

Here to help: 01621 731 526 or email info@dataraze.co.uk
  • Home
  • Product
  • Get Started
  • Contact
  • News
  • Terms & Conditions
  • Privacy Policy

© Dataraze 2014. All rights reserved.