Saturday, December 3, 2022
HomeGreen BusinessExtra (Knowledge) Than Meets The Eye!

Extra (Knowledge) Than Meets The Eye!


Straightforward query – what number of drives does this server have?


When you counted six, you’d be fallacious. 

Think about this state of affairs in the event you’ve been requested to decommission a server and it’s good to account for the drives within the machine as a part of your inside course of for dealing with knowledge bearing gadgets or media. You’ve eliminated the drives from the entrance of the server, so that you’re all set, proper? You report again into your system of document that these drives have been eliminated and also you ship the machine to your reseller or supplier – then the reporting despatched again to you reveals that there was media nonetheless within the server, and even worse you discover out from whomever bought the unit that they discovered your knowledge on the machine. What offers?

Seeing Is not At all times Believing

Whereas it’s straightforward to account for storage media and gadgets which might be readily obvious and observable, the reality is that many gadgets comprise knowledge that you just simply can’t affirm the presence of with out realizing it’s there. This may be particularly difficult when a server or storage machine is within a rack that’s absolutely cabled up and within the presence of different manufacturing servers, so you’ll be able to’t pull it out to search for your self previous to disposition. With the arrival of smaller kind issue drives equivalent to M.2, EDSFF, mSATA and different flash media equivalent to SD/MicroSD/CompactFlash and so forth., it’s turning into more and more extra widespread to seek out these smaller drives within gadgets as nicely, both connected to the motherboard, on a PCI-E enlargement card, out of band administration machine, and so forth. Configurations and different knowledge may also be contained in non-removable inside storage areas equivalent to NVRAM. It’s not as straightforward as wanting on the entrance of a machine to find out the storage gadgets held therein.

A Sage Buyer Perspective

A Sage buyer skilled this state of affairs not too long ago – the drives from the entrance slots had been eliminated by the shopper; nevertheless upon receipt at our processing heart our technicians discovered a hidden drive within the unit and we inventoried and secured the drive by way of our NIST compliant erasure processes. Regardless of the shopper’s greatest efforts, their staff didn’t fully safe the server earlier than it was faraway from the situation as per their Info Safety staff’s necessities, and doing so would have required disassembling the server and realizing the place to look. Sage supplied the shopper with photographic proof of the drive and supplied a Licensed Knowledge Erasure Report confirming the erasure was carried out and profitable. This whole occasion made for an eye-opening expertise for our shopper and one which additional demonstrates the worth of a mature ITAD supplier, expert in applied sciences supported by the group.

Is Your ITAD Supplier Addressing These Situations?

When choosing an ITAD service supplier, make certain to search for one which has the processes and procedural rigor to function in situations just like the one talked about above, which embody figuring out and sanitizing the information on these gadgets. A mature supplier will likely be one which is aware of about these “gotchas” and maintains a database of merchandise together with the product class, make, and mannequin that acknowledges when a tool is knowledge bearing, even when it isn’t instantly apparent (not all knowledge sanitization is as cut-and-dry as erasing a tough drive!).  Your supplier must also carry out further validation by opening items to confirm that there isn’t inside media inside a tool that could be current however disconnected from a system board, which might be invisible to regular systematic processing of a tool. We hope this steerage may help you to shut gaps that is likely to be current that might unknowingly open you to knowledge leakage/breach dangers. Learn More About Our Managed Services for ITAD



Please enter your comment!
Please enter your name here

Most Popular

Recent Comments