The auction is for the purchase of 100 licenses.
Each license is valid for erase one drive.
Blancco Drive Eraser is software designed for the secure erasure of data from various devices, including PCs, laptops, servers, and storage environments. Its primary purpose is to ensure that data is completely and irreversibly deleted, which is particularly crucial in managing sensitive or confidential information.
Key Uses:
Overall, Blancco Drive Eraser is used by businesses and organizations that require effective IT asset disposal management, ensuring that all data is permanently wiped to protect privacy and prevent unauthorized access.
Blancco Drive Eraser is a world-leading solution for secure data deletion, highly regarded and recognized in the industry. This is confirmed by numerous patents, compliance with industry standards (e.g., NIST, Common Criteria), and the extensive experience of Blancco Technology Group in the field of data protection. With advanced features, scalability, and a wide range of supported hardware, Blancco Drive Eraser is not only the best but also the most recognized program for secure data deletion in the world.
CONTACT US FOR ADDITIONAL INFORMATION
Standard method (using a boot image): Blancco Drive Eraser software runs from a medium (CD, USB). After launching, the program detects the hard drives and SSDs in the laptop. The user selects the drives for data deletion and the data wiping standard (e.g., compliant with NIST 800-88). The program overwrites the data according to the selected standard and then verifies its deletion. Upon completion of the process, a report is generated that confirms the data deletion.
The process of erasing servers using PXE and RAID dismantling begins by booting Blancco Drive Eraser from a network image. The software detects the drives and then, if necessary and supported, disassembles the RAID array, providing access to individual physical drives. Finally, the user selects the drives and erasure standard, receiving a report confirming data erasure from each drive after the process completes.
The Blancco Drive Eraser report provides detailed information about the hardware on which data erasure was performed, a thorough description of the erasure process including the standard used and verification results, and any custom information added by the user. Additionally, the report may include hardware test results and error details. The report is digitally signed to ensure its authenticity and integrity.
By purchasing Blancco Drive Eraser, you receive temporary access to the Blancco cloud, a platform that provides centralized management of the data wiping process. In the Blancco cloud, you will find tools for creating and managing workflows, remote monitoring of processes, and generating and storing reports. Access to these features, including software updates and support materials, is limited to the duration of the license for Blancco Drive Eraser.
To fully utilize the Blancco Drive Eraser license and access advanced features such as remote management and report generation, an internet connection is required. In the absence of internet access, an additional purchase and installation of a HASP Key are necessary to enable the software to operate in offline mode.
| Erasure Standard Name | Erasure Standard Overwriting Rounds |
| Air Force System Security Instruction 5020 | 4 |
| Aperiodic random overwrite | 1 |
| Blancco SSD Erasure | 2+ (standard including a firmware based erasure step) |
| Bruce Schneier's Algorithm | 7 |
| BSI-2011-VS | 1-2 (standard including a firmware based erasure step) |
| BSI-GS | 1-2 (standard including a firmware based erasure step) |
| BSI-GSE | 2-3 (standard including a firmware based erasure step) |
| BSI-GSK | 1 |
| CESG CPA – Higher Level | 3 |
| Sanitize Cryptographic Erasure | 0 (erases data by generating a new encryption key for the drive) |
| DoD 5220.22-M | 3 |
| DoD 5220.22-M ECE | 7 |
| IEEE 2883-2022 Clear | 0-1 (standard including a firmware based erasure step) |
| IEEE 2883-2022 Purge | 0 (standard including a firmware based erasure step) |
| NIST 800-88 Clear (you can select the Overwriting type) | 0-1 (standard including a firmware based erasure step) |
| NIST 800-88 Purge | 0 (standard including a firmware based erasure step) |
| NIST 800-88 | 0-1 (standard including a firmware based erasure step) |
| Firmware Based Erasure | 0 (standard including a firmware based erasure step) |
| Extended Firmware Based Erasure | 1 (standard including a firmware based erasure step) |
| HMG Infosec Standard 5, Higher Standard | 3 |
| HMG Infosec Standard 5, Lower Standard | 1 |
| National Computer Security Center (NCSC-TG-025) | 4 |
| Navy Staff Office Publication (NAVSO P-5239-26) | 3 |
| NSA 130-1 | 3 |
| OPNAVINST 5239.1A | 3 |
| Peter Gutmann's Algorithm | 35 |
| U.S. Army AR380-19 | 3 |
| RCMP TSSIT OPS-II | 8 |
| Random byte overwrite (3x) | 3 |
| TCG Cryptographic Erasure | 1 |