Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

Blancco’s Enterprise Data Erasure Software To Simplify Secure IT Asset Disposal

A new solution from Finland based, Blancco, promises to simplify corporate processes for secure IT asset disposal.

A new solution from Finland based, Blancco, promises to simplify corporate processes for secure IT asset disposal.

Companies often associate the threat of data loss with stolen laptops or other portable media, but many are less aware of a more subtle culprit – their own improper disposal of IT assets. According to the 2009 KPMG “Data Loss Barometer” report, improper disposal of IT assets is the cause of data loss in 12 percent of cases. “It is now considered an information security best practice – and often a legal requirement – to erase data from IT assets flagged for retirement or redeployment before they leave the business premises, even if they are also scheduled for data removal and recycling or resale through an offsite service provider,” said Kim Väisänen, CEO of Blancco.

Blancco Management Console is an online solution designed to handle all aspects of IT asset disposal within a WAN/LAN, including software license distribution, hardware IT asset management and data erasure reporting. The console is installed within five minutes and runs on several platforms. Comprehensive reports can be exported and e-mailed in many different formats, depending on user rights defined by the administrator. Reports can also be created for multiple types of IT assets, such as monitors, printers, copiers, routers and switches.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Compliance

Web scraping is a sensitive issue. Should a third party be allowed to visit a website and use automated tools to gather and store...

Cloud Security

Proofpoint removes a formidable competitor from the crowded email security market and adds technology to address risk from misdirected emails.

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...