Tuesday, September 27, 2022
HomeGreen BusinessExtra (Knowledge) Than Meets The Eye!

Extra (Knowledge) Than Meets The Eye!


 

Simple query – what number of drives does this server have?

download-1

If you happen to counted six, you’d be fallacious. 

Think about this situation for those who’ve been requested to decommission a server and it’s worthwhile to account for the drives within the machine as a part of your inner course of for dealing with information bearing units or media. You’ve eliminated the drives from the entrance of the server, so that you’re all set, proper? You report again into your system of document that these drives have been eliminated and also you ship the machine to your reseller or supplier – then the reporting despatched again to you reveals that there was media nonetheless within the server, and even worse you discover out from whomever bought the unit that they discovered your information on the machine. What provides?

Seeing Is not At all times Believing

Whereas it’s straightforward to account for storage media and units which can be readily obvious and observable, the reality is that many units include information that you simply simply can’t affirm the presence of with out understanding it’s there. This may be particularly difficult when a server or storage machine is within a rack that’s absolutely cabled up and within the presence of different manufacturing servers, so you’ll be able to’t pull it out to search for your self previous to disposition. With the appearance of smaller type issue drives akin to M.2, EDSFF, mSATA and different flash media akin to SD/MicroSD/CompactFlash and so forth., it’s turning into more and more extra frequent to seek out these smaller drives within units as nicely, both hooked up to the motherboard, on a PCI-E enlargement card, out of band administration machine, and so forth. Configurations and different information can be contained in non-removable inner storage areas akin to NVRAM. It’s not as straightforward as wanting on the entrance of a machine to find out the storage units held therein.

A Sage Buyer Perspective

A Sage buyer skilled this situation just lately – the drives from the entrance slots had been eliminated by the shopper; nonetheless upon receipt at our processing middle our technicians discovered a hidden drive within the unit and we inventoried and secured the drive via our NIST compliant erasure processes. Regardless of the shopper’s greatest efforts, their group did not utterly safe the server earlier than it was faraway from the placement as per their Info Safety group’s necessities, and doing so would have required disassembling the server and understanding the place to look. Sage offered the shopper with photographic proof of the drive and offered a Licensed Knowledge Erasure Report confirming the erasure was carried out and profitable. This whole occasion made for an eye-opening expertise for our shopper and one which additional demonstrates the worth of a mature ITAD supplier, expert in applied sciences supported by the group.

Is Your ITAD Supplier Addressing These Eventualities?

When choosing an ITAD service supplier, ensure that to search for one which has the processes and procedural rigor to function in situations just like the one talked about above, which embody figuring out and sanitizing the info on these units. A mature supplier will probably be one which is aware of about these “gotchas” and maintains a database of merchandise together with the product class, make, and mannequin that acknowledges when a tool is information bearing, even when it isn’t instantly apparent (not all information sanitization is as cut-and-dry as erasing a tough drive!).  Your supplier also needs to carry out further validation by opening models to confirm that there isn’t inner media inside a tool which may be current however disconnected from a system board, which might be invisible to regular systematic processing of a tool. We hope this steerage will help you to shut gaps that could be current that will unknowingly open you to information leakage/breach dangers. Learn More About Our Managed Services for ITAD



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments