SecureDataRecovery

Last updated

Secure Data Recovery Services
TypePrivately held
Industry Data security
Founded2007;16 years ago (2007)
Headquarters,
U.S.
Area served
Worldwide
Services Data recovery

Digital forensics

Data destruction
Website www.securedatarecovery.com

Secure Data Recovery Services provides data recovery and digital forensics services for a range of storage media, including laptop and desktop computer storage drives, HDD, SSD, RAID arrays, mobile devices, legacy storage systems, digital cameras, flash USB drives, and flash memory cards. [1]

Contents

History

Secure Data Recovery Services began operations in 2007 with the establishment of its first lab facility in Los Angeles, California. [2] Additional labs in Cleveland, Ohio and Toronto, Ontario in Canada, soon followed, each with Class 10 ISO 4 cleanrooms and advanced data security standards and certifications. [3] The company now provides professional data recovery services to companies and organizations around the world. [1]

Secure Data Recovery began offering digital forensics services in 2014, and the company added new products and services including several do-it-yourself Windows-based data recovery software solutions in 2016. [4]

Secure Data Recovery Services maintains more than 250 business partnerships [5] across North America, including the B&H Photo NYC Superstore [6] in downtown Manhattan.

Security certifications and practices

Secure Data Recovery Services undergoes audits and evaluations to maintain a range of professional certifications and to ensure compliance with specific federal and international regulations. [7] All data handling practices within Secure Data Recovery labs are SSAE 18 Type II SOC 1, 2, and 3 audited [8] to verify the safe handling of sensitive or protected information.

Data recovery operations take place in a Class 10 ISO 4 cleanroom, [1] which reduces the risk of damage to sensitive internal drive components from airborne dust or other small particulates. [9] Cleanrooms come in different ratings depending on the industry. Class 100 ISO 5 facilities permit 100 particles per square foot and are commonly used for manufacturing applications in the pharmaceutical and biotechnology sectors. Class 10 ISO cleanrooms filter air to no more than 10 particles per square foot. [10] This cleanroom rating is generally given to manufacturers of semiconductors and other sensitive electronics technology.

Secure Data Recovery Services transfers recovered data on portable devices that are FIPS 140-2 Level 3 validated, a U.S. government computer security standard used to approve cryptographic modules. [11] [12] Secure Data Recovery Services is a member of the General Services Administration (GSA) schedule for approved government contractors [13] , and the company provides data recovery services for local, state, and federal government agencies, as well as for all branches of the U.S. military.

Secure Data Recovery Services complies with the EU/U.S. Privacy Shield Framework [14] administered and reviewed by TRUSTe to ensure privacy protection for the exchange of personal data for commercial purposes between the European Union and the United States. They also maintain compliance with the Payment Card Industry Data Security Standard (PCI-DSS) for all customer transactions to ensure the safe handling, storage, and processing of credit card information.

Manufacturer partnerships

Secure Data Recovery Services maintains professional partnerships with several data storage manufacturers to provide specialized data recovery services that do not endanger existing warranties. Secure Data Recovery Services is a Western Digital Platinum Partner. [15] Other manufacturing partnerships include Glyph, [16] Oyen Digital, [17] and Verbatim. [18]

Awards and achievements

Secure Data Recovery Services is a member of ACRBO, the Association of Computer Repair Business Owners. It is also a member within the IEEE, ISSA and PPA Member and, over the years, the company website has posted over one hundred customer testimonial letters. [19]

In 2012, TopTenReviews rated Secure Data Recovery Services with 10 out of 10 points for its features, security, recovery capabilities, and help and support. [20] In 2015 The website awarded Secure Data Recovery Services the TopTenREVIEWS Gold Award [21] for RAID data recovery companies.

In May 2021, Cyber Defence Magazine named Secure Data Recovery Services the market leader for data recovery. [22]

See also

Related Research Articles

RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both. This is in contrast to the previous concept of highly reliable mainframe disk drives referred to as "single large expensive disk" (SLED).

A disk image is a snapshot of a storage device's structure and data typically stored in one or more computer files on another storage device. Traditionally, disk images were bit-by-bit copies of every sector on a hard disk often created for digital forensic purposes, but it is now common to only copy allocated data to reduce storage space. Compression and deduplication are commonly used to reduce the size of the image file set. Disk imaging is done for a variety of purposes including digital forensics, cloud computing, system administration, as part of a backup strategy, and legacy emulation as part of a digital preservation strategy. Disk images can be made in a variety of formats depending on the purpose. Virtual disk images are intended to be used for cloud computing, ISO images are intended to emulate optical media and raw disk images are used for forensic purposes. Proprietary formats are typically used by disk imaging software. Despite the benefits of disk imaging the storage costs can be high, management can be difficult and they can be time consuming to create.

<span class="mw-page-title-main">Cleanroom</span> Dust-free room for research or production

A cleanroom or clean room is an engineered space, which maintains a very low concentration of airborne particulates. It is well isolated, well-controlled from contamination, and actively cleansed. Such rooms are commonly needed for scientific research, and in industrial production for all nanoscale processes, such as semiconductor manufacturing. A cleanroom is designed to keep everything from dust, to airborne organisms, or vaporised particles, away from it, and so from whatever material is being handled inside it.

<span class="mw-page-title-main">Computer forensics</span> Branch of digital forensic science

Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.

Disk cloning is the process of duplicating all data on a digital storage drive, such as a hard disk or solid state drive, using hardware or software techniques. Unlike file copying, disk cloning also duplicates the filesystems, partitions, drive meta data and slack space on the drive. Common reasons for cloning a drive include; data backup and recovery; duplicating a computer's configuration for mass deployment and for preserving data for digital forensics purposes. Drive cloning can be used in conjunction with drive imaging where the cloned data is saved to one or more files on another drive rather than copied directly to another drive.

Disaster recovery is the process of maintaining or reestablishing vital infrastructure and systems following a natural or human-induced disaster, such as a storm or battle. It employs policies, tools, and procedures. Disaster recovery focuses on information technology (IT) or technology systems supporting critical business functions as opposed to business continuity. This involves keeping all essential aspects of a business functioning despite significant disruptive events; it can therefore be considered a subset of business continuity. Disaster recovery assumes that the primary site is not immediately recoverable and restores data and services to a secondary site.

Data security means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach.

In computing, data recovery is a process of retrieving deleted, inaccessible, lost, corrupted, damaged, or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a usual way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystems, and other electronic devices. Recovery may be required due to physical damage to the storage devices or logical damage to the file system that prevents it from being mounted by the host operating system (OS).

<span class="mw-page-title-main">Digital forensics</span> Branch of forensic science

Digital forensics is a branch of forensic science encompassing the recovery, investigation, examination, and analysis of material found in digital devices, often in relation to mobile devices and computer crime. The term "digital forensics" was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing digital data. With roots in the personal computing revolution of the late 1970s and early 1980s, the discipline evolved in a haphazard manner during the 1990s, and it was not until the early 21st century that national policies emerged.

<span class="mw-page-title-main">Hardware security module</span> Physical computing device

A hardware security module (HSM) is a physical computing device that safeguards and manages secrets, performs encryption and decryption functions for digital signatures, strong authentication and other cryptographic functions. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server. A hardware security module contains one or more secure cryptoprocessor chips.

<span class="mw-page-title-main">IsoBuster</span> Data recovery software

IsoBuster is a data recovery computer program by Smart Projects, a Belgian company founded in 1995 by Peter Van Hove. As of version 3.0, it can recover data from damaged file systems or physically damaged disks including optical discs, hard disk drives, USB flash drives and solid-state disks. It has the ability to access "deleted" data on multisession optical discs, and allows users to access disc images and to extract files in the same way that they would from a ZIP archive. IsoBuster is also often used by law enforcement and data forensics experts.

Security controls are safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets. In the field of information security, such controls protect the confidentiality, integrity and availability of information.

This is a comparison of online backup services.

Secure USB flash drives protect the data stored on them from access by unauthorized users. USB flash drive products have been on the market since 2000, and their use is increasing exponentially. As both consumers and businesses have increased demand for these drives, manufacturers are producing faster devices with greater data storage capacities.

<span class="mw-page-title-main">IronKey</span> Brand of USB devices

IronKey is the brand name of a family of encrypted USB portable storage devices owned by Kingston Digital, the flash memory affiliate of Kingston Technology Company, Inc.

<span class="mw-page-title-main">M-DISC</span> Write-once optical disc technology

M-DISC is a write-once optical disc technology introduced in 2009 by Millenniata, Inc. and available as DVD and Blu-ray discs.

<span class="mw-page-title-main">Cloud computing security</span> Methods used to protect cloud based assets

Cloud computing security or, more simply, cloud security, refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security.

This is a technical feature comparison of commercial encrypted external drives.

<span class="mw-page-title-main">DriveSavers</span>

DriveSavers, Inc. is a computer hardware data recovery, digital forensics and electronic discovery firm located in Novato, California. It was founded by CEO Jay Hagan and former company President Scott Gaidano in 1985.

<span class="mw-page-title-main">CAINE Linux</span>

CAINE Linux is an Italian Linux live distribution managed by Giovanni "Nanni" Bassetti. The project began in 2008 as an environment to foster digital forensics and incidence response (DFIR), with several related tools pre-installed.

References

  1. 1 2 3 "The Best Hard Drive Recovery Services of 2021". business.com. Retrieved 2021-11-05.
  2. "Their Story Chats At RSA Conference San Francisco 2019 | Mike Vanoverbeke, SecureData — ITSPmagazine ITSPmagazine| At the Intersection of Technology, Cybersecurity, and Society". ITSPmagazine. Retrieved 2021-11-05.
  3. Agar, Robert (2020-04-21). "Top 5 Hard Drive Data Recovery Services (2021)". Pandora Recovery. Retrieved 2021-11-05.
  4. "SecureData - CNET Download". Download.com. Retrieved 2021-11-05.
  5. Parker, Jacob (2020-08-28). "Verbatim and Secure Data Recovery announce a new partnership". TechRadar. Retrieved 2021-11-05.
  6. "Visit the Tech Corner | B&H Photo Video". www.bhphotovideo.com. Retrieved 2021-11-05.
  7. "Top 12 BEST Data Recovery Services (2021 Review)". www.softwaretestinghelp.com. Retrieved 2021-11-10.
  8. SSAE 18 SOC 2 Type II & SOC 3 Certified | www.securedatarecovery.com
  9. "Best Hard Drive Data Recovery Services (That You Can Actually Afford!)". Handy Recovery. 2020-11-11. Retrieved 2021-11-10.
  10. "Clean Room Classifications (ISO 8, ISO 7, ISO 6, ISO 5) | Mecart". MECART Cleanrooms. 2018-05-25. Retrieved 2021-11-10.
  11. Puneet (2020-09-23). "FIPS 140-2 Overview and Compliance Requirements" . Retrieved 2021-11-10.
  12. "FIPS 140-2 Level 3 Validated Data Handling Practices". Secure Data Recovery Services. Retrieved 2021-11-10.
  13. "GSA eLibrary Contractor Information". www.gsaelibrary.gsa.gov. Retrieved 2021-11-10.
  14. "Privacy Shield". www.privacyshield.gov. Retrieved 2021-11-10.
  15. "Data Recovery". support-en.wd.com. Retrieved 2021-11-22.
  16. "Warranty | Glyph". www.glyphtech.com. Retrieved 2021-11-22.
  17. "Oyen Digital: Data Recovery Services". oyendigital.com. Retrieved 2021-11-22.
  18. "Verbatim Partners with SecureData for Data Recovery Services". www.verbatim.com. Retrieved 2021-11-22.
  19. Secure Data Recovery Customer Testimonial Letters Archived 2013-01-27 at the Wayback Machine
  20. "Secure Data Recovery 2013 | Compare the Best RAID Data Recovery Services - TopTenREVIEWS". 2012-12-27. Archived from the original on 2012-12-27. Retrieved 2021-11-10.
  21. "Secure Data Recovery Review 2015 | Compare the Best RAID Data Recovery Services". 2015-07-03. Archived from the original on 2015-07-03. Retrieved 2021-11-10.
  22. "Global InfoSec Awards for 2021 – Winners | Cyber Defense Awards" . Retrieved 2021-11-10.