WhiteCanyon Software

[vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern”][vc_column][vc_column_text]

About

WhiteCanyon Software has provided data security software since 1998. WipeDrive Enterprise, their flagship product, securely erases hard drives, SSDs, NVMe and mobile devices. The wipe procedure is Common Criteria certified to ensure proper data eradication and an audit report is provided for each sanitized drive.  The WipeDrive audit report can be used for internal asset management reports and ERP systems.

 

Large global organizations have discovered that WipeDrive can be pre-configured for uniform distribution throughout their organizations. This pre-configuration of settings ensures that all departments implement the correct erasure pattern, all reports are identical and an additional 32 settings can be set by management to meet their internal Data Security Policy requirements.

 

WhiteCanyon Software also provides SecureClean for file and folder level erasure in Windows and SystemSaver for Windows User data clearing. For more information on data sanitization tools, contact the WipeDrive Sales Team at 1 (800) 920-8162.[/vc_column_text][vc_empty_space height=”12px”][vc_column_text]

Address

947 South 500 East Suite 300
American Fork, UT 84003
United States[/vc_column_text][vc_empty_space height=”12px”][vc_column_text]

Phone

1.800.920.8162[/vc_column_text][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern”][vc_column][vc_empty_space height=”22px”][vc_column_text]

Downloads & Videos

[/vc_column_text][vc_empty_space height=”6px”][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern”][vc_column width=”1/6″][/vc_column][vc_column width=”5/6″][vc_empty_space height=”12px”][vc_column_text]

Data Erasure Statutes by State

[/vc_column_text][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern”][vc_column width=”1/6″][/vc_column][vc_column width=”5/6″][vc_empty_space height=”12px”][vc_column_text]

DoD 5220.22-M Relevancy & the Evolution of Wipe Standards

[/vc_column_text][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern”][vc_column width=”1/6″][/vc_column][vc_column width=”5/6″][vc_empty_space height=”12px”][vc_column_text]

Crypto Erase and Data Erasure: A Patent for the IT Asset Management Cycle Whitepaper

[/vc_column_text][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern”][vc_column width=”1/6″][/vc_column][vc_column width=”5/6″][vc_empty_space height=”12px”][vc_column_text]

WipeDrive 9 NIST SP 800-88 Compliance

[/vc_column_text][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern”][vc_column width=”1/6″][/vc_column][vc_column width=”5/6″][vc_empty_space height=”12px”][vc_column_text]

NIST 800-88 vs DoD 3-pass: What Is The Best Method?

[/vc_column_text][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern”][vc_column width=”1/6″][/vc_column][vc_column width=”5/6″][vc_empty_space height=”12px”][vc_column_text]

NIST SP 800-88 Compliance

[/vc_column_text][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern”][vc_column width=”1/6″][/vc_column][vc_column width=”5/6″][vc_empty_space height=”12px”][vc_column_text]

Does You Data Erasure Software Address The DCO Correctly?

[/vc_column_text][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern”][vc_column width=”1/6″][/vc_column][vc_column width=”5/6″][vc_empty_space height=”12px”][vc_column_text]

Why Does the IT Industry Hesitate to Embrace Data Erasure?

[/vc_column_text][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern”][vc_column width=”1/6″][/vc_column][vc_column width=”5/6″][vc_empty_space height=”12px”][vc_column_text]

Issues with Degaussing Solid State Drives

[/vc_column_text][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern”][vc_column width=”1/6″][/vc_column][vc_column width=”5/6″][vc_empty_space height=”12px”][vc_column_text]

WipeDrive Enterprise vs Physical Destruction

[/vc_column_text][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern”][vc_column width=”1/6″][/vc_column][vc_column width=”5/6″][vc_empty_space height=”12px”][vc_column_text]

HIPAA Compliance

[/vc_column_text][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern”][vc_column width=”1/6″][/vc_column][vc_column width=”5/6″][vc_empty_space height=”12px”][vc_column_text]

Case Study – Citi

[/vc_column_text][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern”][vc_column width=”1/6″][/vc_column][vc_column width=”5/6″][vc_empty_space height=”12px”][vc_column_text]

High Volume Erasure Appliance – Case Study

[/vc_column_text][/vc_column][/vc_row][vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern”][vc_column][vc_empty_space height=”6px”][vc_column_text]

Connect With Us

[/vc_column_text][vc_empty_space height=”12px”][/vc_column][/vc_row]

Category
Provider Member
Tags
Disposal/End of Life Tools/Services, Mobile Asset Management Tools/Services, Other Tools/Services, Security Tools/Services