Type | Privately held |
---|---|
Industry | Data security |
Founded | 2007 |
Headquarters | , U.S. |
Area served | Worldwide |
Services | Data recovery Data destruction |
Website | www.securedatarecovery.com |
Secure Data Recovery Services provides data recovery and digital forensics services for a range of storage media, including laptop and desktop computer storage drives, HDD, SSD, RAID arrays, mobile devices, legacy storage systems, digital cameras, flash USB drives, and flash memory cards. [1]
Secure Data Recovery Services began operations in 2007 with the establishment of its first lab facility in Los Angeles, California. [2] Additional labs in Cleveland, Ohio and Toronto, Ontario in Canada, soon followed, each with Class 10 ISO 4 cleanrooms and advanced data security standards and certifications. [3] The company now provides professional data recovery services to companies and organizations around the world. [1]
Secure Data Recovery began offering digital forensics services in 2014, and the company added new products and services including several do-it-yourself Windows-based data recovery software solutions in 2016. [4]
Secure Data Recovery Services maintains more than 250 business partnerships [5] across North America, including the B&H Photo NYC Superstore [6] in downtown Manhattan.
Secure Data Recovery Services undergoes audits and evaluations to maintain a range of professional certifications and to ensure compliance with specific federal and international regulations. [7] All data handling practices within Secure Data Recovery labs are SSAE 18 Type II SOC 1, 2, and 3 audited [8] to verify the safe handling of sensitive or protected information.
Data recovery operations take place in a Class 10 ISO 4 cleanroom, [1] which reduces the risk of damage to sensitive internal drive components from airborne dust or other small particulates. [9] Cleanrooms come in different ratings depending on the industry. Class 100 ISO 5 facilities permit 100 particles per square foot and are commonly used for manufacturing applications in the pharmaceutical and biotechnology sectors. Class 10 ISO cleanrooms filter air to no more than 10 particles per square foot. [10] This cleanroom rating is generally given to manufacturers of semiconductors and other sensitive electronics technology.
Secure Data Recovery Services transfers recovered data on portable devices that are FIPS 140-2 Level 3 validated, a U.S. government computer security standard used to approve cryptographic modules. [11] [12] Secure Data Recovery Services is a member of the General Services Administration (GSA) schedule for approved government contractors [13] , and the company provides data recovery services for local, state, and federal government agencies, as well as for all branches of the U.S. military.
Secure Data Recovery Services complies with the EU/U.S. Privacy Shield Framework [14] administered and reviewed by TRUSTe to ensure privacy protection for the exchange of personal data for commercial purposes between the European Union and the United States. They also maintain compliance with the Payment Card Industry Data Security Standard (PCI-DSS) for all customer transactions to ensure the safe handling, storage, and processing of credit card information.
Secure Data Recovery Services maintains professional partnerships with several data storage manufacturers to provide specialized data recovery services that do not endanger existing warranties. Secure Data Recovery Services is a Western Digital Platinum Partner. [15] Other manufacturing partnerships include Glyph, [16] Oyen Digital, [17] and Verbatim. [18]
Secure Data Recovery Services is a member of ACRBO, the Association of Computer Repair Business Owners. It is also a member within the IEEE, ISSA and PPA Member and, over the years, the company website has posted over one hundred customer testimonial letters. [19]
In 2012, TopTenReviews rated Secure Data Recovery Services with 10 out of 10 points for its features, security, recovery capabilities, and help and support. [20] In 2015 The website awarded Secure Data Recovery Services the TopTenREVIEWS Gold Award [21] for RAID data recovery companies.
In May 2021, Cyber Defence Magazine named Secure Data Recovery Services the market leader for data recovery. [22]
RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both. This is in contrast to the previous concept of highly reliable mainframe disk drives referred to as "single large expensive disk" (SLED).
A disk image is a snapshot of a storage device's structure and data typically stored in one or more computer files on another storage device. Traditionally, disk images were bit-by-bit copies of every sector on a hard disk often created for digital forensic purposes, but it is now common to only copy allocated data to reduce storage space. Compression and deduplication are commonly used to reduce the size of the image file set. Disk imaging is done for a variety of purposes including digital forensics, cloud computing, system administration, as part of a backup strategy, and legacy emulation as part of a digital preservation strategy. Disk images can be made in a variety of formats depending on the purpose. Virtual disk images are intended to be used for cloud computing, ISO images are intended to emulate optical media and raw disk images are used for forensic purposes. Proprietary formats are typically used by disk imaging software. Despite the benefits of disk imaging the storage costs can be high, management can be difficult and they can be time consuming to create.
A cleanroom or clean room is an engineered space, which maintains a very low concentration of airborne particulates. It is well isolated, well-controlled from contamination, and actively cleansed. Such rooms are commonly needed for scientific research, and in industrial production for all nanoscale processes, such as semiconductor manufacturing. A cleanroom is designed to keep everything from dust, to airborne organisms, or vaporised particles, away from it, and so from whatever material is being handled inside it.
Computer forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the digital information.
Disk cloning is the process of duplicating all data on a digital storage drive, such as a hard disk or solid state drive, using hardware or software techniques. Unlike file copying, disk cloning also duplicates the filesystems, partitions, drive meta data and slack space on the drive. Common reasons for cloning a drive include; data backup and recovery; duplicating a computer's configuration for mass deployment and for preserving data for digital forensics purposes. Drive cloning can be used in conjunction with drive imaging where the cloned data is saved to one or more files on another drive rather than copied directly to another drive.
Disaster recovery is the process of maintaining or reestablishing vital infrastructure and systems following a natural or human-induced disaster, such as a storm or battle. It employs policies, tools, and procedures. Disaster recovery focuses on information technology (IT) or technology systems supporting critical business functions as opposed to business continuity. This involves keeping all essential aspects of a business functioning despite significant disruptive events; it can therefore be considered a subset of business continuity. Disaster recovery assumes that the primary site is not immediately recoverable and restores data and services to a secondary site.
Data security means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach.
In computing, data recovery is a process of retrieving deleted, inaccessible, lost, corrupted, damaged, or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a usual way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystems, and other electronic devices. Recovery may be required due to physical damage to the storage devices or logical damage to the file system that prevents it from being mounted by the host operating system (OS).
Digital forensics is a branch of forensic science encompassing the recovery, investigation, examination, and analysis of material found in digital devices, often in relation to mobile devices and computer crime. The term "digital forensics" was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing digital data. With roots in the personal computing revolution of the late 1970s and early 1980s, the discipline evolved in a haphazard manner during the 1990s, and it was not until the early 21st century that national policies emerged.
A hardware security module (HSM) is a physical computing device that safeguards and manages secrets, performs encryption and decryption functions for digital signatures, strong authentication and other cryptographic functions. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server. A hardware security module contains one or more secure cryptoprocessor chips.
IsoBuster is a data recovery computer program by Smart Projects, a Belgian company founded in 1995 by Peter Van Hove. As of version 3.0, it can recover data from damaged file systems or physically damaged disks including optical discs, hard disk drives, USB flash drives and solid-state disks. It has the ability to access "deleted" data on multisession optical discs, and allows users to access disc images and to extract files in the same way that they would from a ZIP archive. IsoBuster is also often used by law enforcement and data forensics experts.
Security controls are safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets. In the field of information security, such controls protect the confidentiality, integrity and availability of information.
This is a comparison of online backup services.
Secure USB flash drives protect the data stored on them from access by unauthorized users. USB flash drive products have been on the market since 2000, and their use is increasing exponentially. As both consumers and businesses have increased demand for these drives, manufacturers are producing faster devices with greater data storage capacities.
IronKey is the brand name of a family of encrypted USB portable storage devices owned by Kingston Digital, the flash memory affiliate of Kingston Technology Company, Inc.
M-DISC is a write-once optical disc technology introduced in 2009 by Millenniata, Inc. and available as DVD and Blu-ray discs.
Cloud computing security or, more simply, cloud security, refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security.
This is a technical feature comparison of commercial encrypted external drives.
DriveSavers, Inc. is a computer hardware data recovery, digital forensics and electronic discovery firm located in Novato, California. It was founded by CEO Jay Hagan and former company President Scott Gaidano in 1985.
CAINE Linux is an Italian Linux live distribution managed by Giovanni "Nanni" Bassetti. The project began in 2008 as an environment to foster digital forensics and incidence response (DFIR), with several related tools pre-installed.