SecureDataRecovery

Last updated

Secure Data Recovery Services
Company typePrivately held
Industry Data security
Founded2007;17 years ago (2007)
Headquarters,
U.S.
Area served
Worldwide
Services Data recovery

Digital forensics

Data destruction
Website www.securedatarecovery.com

Secure Data Recovery Services provides data recovery and digital forensics services for a range of storage media, including laptop and desktop computer hard drives, HDD, SSD, RAID arrays, mobile devices, legacy storage systems, digital cameras, flash USB drives, and flash memory cards. [1]

Contents

History

Secure Data Recovery Services began operations in 2007 with the establishment of its first lab facility in Los Angeles, California. [2] Additional labs in Cleveland, Ohio and Toronto, Ontario in Canada, soon followed, each with Class 10 ISO 4 cleanrooms and advanced data security standards and certifications. [3] The company now provides professional data recovery services to companies and organizations around the world. [1]

Secure Data Recovery began offering digital forensics services in 2014, and the company added new products and services including several do-it-yourself Windows-based data recovery software solutions in 2016. [4]

Secure Data Recovery Services maintains more than 250 business partnerships [5] across North America, including the B&H Photo NYC Superstore [6] in downtown Manhattan.

Security certifications and practices

Secure Data Recovery Services undergoes audits and evaluations to maintain a range of professional certifications and to ensure compliance with specific federal and international regulations. [7] All data handling practices within Secure Data Recovery labs are SSAE 18 Type II SOC 1, 2, and 3 audited [8] to verify the safe handling of sensitive or protected information.

Data recovery operations take place in a Class 10 ISO 4 cleanroom, [1] which reduces the risk of damage to sensitive internal drive components from airborne dust or other small particulates. [9] Cleanrooms come in different ratings depending on the industry. Class 100 ISO 5 facilities permit 100 particles per square foot and are commonly used for manufacturing applications in the pharmaceutical and biotechnology sectors. Class 10 ISO cleanrooms filter air to no more than 10 particles per square foot. [10] This cleanroom rating is generally given to manufacturers of semiconductors and other sensitive electronics technology.

Secure Data Recovery Services transfers recovered data on portable devices that are FIPS 140-2 Level 3 validated, a U.S. government computer security standard used to approve cryptographic modules. [11] [12] Secure Data Recovery Services is a member of the General Services Administration (GSA) schedule for approved government contractors, [13] and the company provides data recovery services for local, state, and federal government agencies, as well as for all branches of the U.S. military.

Secure Data Recovery Services complies with the EU/U.S. Privacy Shield Framework [14] administered and reviewed by TRUSTe to ensure privacy protection for the exchange of personal data for commercial purposes between the European Union and the United States. They also maintain compliance with the Payment Card Industry Data Security Standard (PCI-DSS) for all customer transactions to ensure the safe handling, storage, and processing of credit card information.

Manufacturer partnerships

Secure Data Recovery Services maintains professional partnerships with several data storage manufacturers to provide specialized data recovery services that do not endanger existing warranties. Secure Data Recovery Services is a Western Digital Platinum Partner. [15] Other manufacturing partnerships include Glyph, [16] Oyen Digital, [17] and Verbatim. [18]

Awards and achievements

Secure Data Recovery Services is a member of ACRBO, the Association of Computer Repair Business Owners. It is also a member of the IEEE, ISSA and PPA.[ citation needed ]

In May 2021, Cyber Defence Magazine named Secure Data Recovery Services the market leader for data recovery. [19]

See also

Related Research Articles

<span class="mw-page-title-main">Paper shredder</span> Device used to cut paper into pieces

A paper shredder is a mechanical device used to cut sheets of paper into either strips or fine particles. Government organizations, businesses, and private individuals use shredders to destroy private, confidential, or otherwise sensitive documents.

A disk image is a snapshot of a storage device's structure and data typically stored in one or more computer files on another storage device.

<span class="mw-page-title-main">Live CD</span> Complete, bootable computer installation that runs directly from a CD-ROM

A live CD is a complete bootable computer installation including operating system which runs directly from a CD-ROM or similar storage device into a computer's memory, rather than loading from a hard disk drive. A live CD allows users to run an operating system for any purpose without installing it or making any changes to the computer's configuration. Live CDs can run on a computer without secondary storage, such as a hard disk drive, or with a corrupted hard disk drive or file system, allowing data recovery.

Data security means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach.

Records management, also known as records and information management, is an organizational function devoted to the management of information in an organization throughout its life cycle, from the time of creation or receipt to its eventual disposition. This includes identifying, classifying, storing, securing, retrieving, tracking and destroying or permanently preserving records. The ISO 15489-1: 2001 standard defines records management as "[the] field of management responsible for the efficient and systematic control of the creation, receipt, maintenance, use and disposition of records, including the processes for capturing and maintaining evidence of and information about business activities and transactions in the form of records".

In computing, data recovery is a process of retrieving deleted, inaccessible, lost, corrupted, damaged, or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a usual way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystems, and other electronic devices. Recovery may be required due to physical damage to the storage devices or logical damage to the file system that prevents it from being mounted by the host operating system (OS).

Information security standards or cyber security standards are techniques generally outlined in published materials that attempt to protect the cyber environment of a user or organization. This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks.

<span class="mw-page-title-main">Hardware security module</span> Physical computing device

A hardware security module (HSM) is a physical computing device that safeguards and manages secrets, performs encryption and decryption functions for digital signatures, strong authentication and other cryptographic functions. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server. A hardware security module contains one or more secure cryptoprocessor chips.

<span class="mw-page-title-main">IsoBuster</span> Data recovery software

IsoBuster is a data recovery computer program by Smart Projects, a Belgian company founded in 1995 by Peter Van Hove. As of version 3.0, it can recover data from damaged file systems or physically damaged disks including optical discs, hard disk drives, USB flash drives and solid-state disks. It has the ability to access "deleted" data on multisession optical discs, and allows users to access disc images and to extract files in the same way that they would from a ZIP archive. IsoBuster is also often used by law enforcement and data forensics experts.

Security controls are safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets. In the field of information security, such controls protect the confidentiality, integrity and availability of information.

This is a comparison of online backup services.

<span class="mw-page-title-main">M-DISC</span> Write-once optical disc technology

M-DISC is a write-once optical disc technology introduced in 2009 by Millenniata, Inc. and available as DVD and Blu-ray discs.

Cloud computing security or, more simply, cloud security, refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security.

This is a technical feature comparison of commercial encrypted external drives.

Managed Trusted Internet Protocol Service (MTIPS) was developed by the US General Services Administration (GSA) to allow US Federal agencies to physically and logically connect to the public Internet and other external connections in compliance with the Office of Management and Budget's (OMB) Trusted Internet Connection (TIC) Initiative.

<span class="mw-page-title-main">DriveSavers</span>

DriveSavers, Inc. is a computer hardware data recovery company located in Novato, California. It was founded by former CEO Jay Hagan and former company President Scott Gaidano in 1985.

Cloud computing is used by most people every day, but there are issues that limit its widespread adoption. It is one of the fast developing area that can instantly supply extensible services by using internet with the help of hardware and software virtualization. Cloud computing biggest advantage is flexible lease and release of resources as per the requirement of the user. Its other advantages include efficiency, compensating the costs in operations and management. It curtails down the high prices of hardware and software

Amazon Neptune is a managed graph database product published by Amazon.com. It is used as a web service and is part of Amazon Web Services (AWS). It was announced on November 29, 2017. Amazon Neptune supports popular graph models property graph and W3C's RDF, and their respective query languages Apache TinkerPop's Gremlin, openCypher, and SPARQL, including other Amazon Web Services products.

<span class="mw-page-title-main">CAINE Linux</span> Linux distribution

CAINE Linux is an Italian Linux live distribution managed by Giovanni "Nanni" Bassetti. The project began in 2008 as an environment to foster digital forensics and incidence response (DFIR), with several related tools pre-installed.

Statement on Standards for Attestation Engagements no. 18 is a Generally Accepted Auditing Standard produced and published by the American Institute of Certified Public Accountants (AICPA) Auditing Standards Board. Though it states that it could be applied to almost any subject matter, its focus is reporting on the quality of financial reporting. It pays particular attention to internal control, extending into the controls over information systems involved in financial reporting. It is intended for use by Certified Public Accountants performing attestation engagements, the preparation of a written opinion about a subject, and the client organizations preparing the reports that are the subject of the attestation engagement. It prescribes three levels of service: examination, review, and agreed-upon procedures. It also prescribes two types of reports: Type 1, which includes an assessment of internal control design, and Type 2, which additionally includes an assessment of the operating effectiveness of controls. Published April 2016, SSAE 18 and all previous standards it supersedes are represented in section AT-C of the AICPA Professional Standards, with most sections becoming effective on May 1, 2017.

References

  1. 1 2 3 "The Best Hard Drive Recovery Services of 2021". business.com. Retrieved 2021-11-05.
  2. "Their Story Chats At RSA Conference San Francisco 2019 - Mike Vanoverbeke, SecureData — ITSPmagazine ITSPmagazine- At the Intersection of Technology, Cybersecurity, and Society". ITSPmagazine. Retrieved 2021-11-05.
  3. Agar, Robert (2020-04-21). "Top 5 Hard Drive Data Recovery Services (2021)". Pandora Recovery. Retrieved 2021-11-05.
  4. "SecureData - CNET Download". Download.com. Retrieved 2021-11-05.
  5. Parker, Jacob (2020-08-28). "Verbatim and Secure Data Recovery announce a new partnership". TechRadar. Retrieved 2021-11-05.
  6. "Visit the Tech Corner - B&H Photo Video". www.bhphotovideo.com. Retrieved 2021-11-05.
  7. "Top 12 BEST Data Recovery Services (2021 Review)". www.softwaretestinghelp.com. Retrieved 2021-11-10.
  8. SSAE 18 SOC 2 Type II & SOC 3 Certified | www.securedatarecovery.com
  9. "Best Hard Drive Data Recovery Services (That You Can Actually Afford!)". Handy Recovery. 2020-11-11. Retrieved 2021-11-10.
  10. "Clean Room Classifications (ISO 8, ISO 7, ISO 6, ISO 5) - Mecart". MECART Cleanrooms. 2018-05-25. Retrieved 2021-11-10.
  11. Puneet (2020-09-23). "FIPS 140-2 Overview and Compliance Requirements" . Retrieved 2021-11-10.
  12. "FIPS 140-2 Level 3 Validated Data Handling Practices". Secure Data Recovery Services. Retrieved 2021-11-10.
  13. "GSA eLibrary Contractor Information". www.gsaelibrary.gsa.gov. Retrieved 2021-11-10.
  14. "Privacy Shield". www.privacyshield.gov. Retrieved 2021-11-10.
  15. "Data Recovery". support-en.wd.com. Retrieved 2021-11-22.
  16. "Warranty - Glyph". www.glyphtech.com. Retrieved 2021-11-22.
  17. "Oyen Digital: Data Recovery Services". oyendigital.com. Retrieved 2021-11-22.
  18. "Verbatim Partners with SecureData for Data Recovery Services". www.verbatim.com. Retrieved 2021-11-22.
  19. "Global InfoSec Awards for 2021 – Winners - Cyber Defense Awards" . Retrieved 2021-11-10.