October. 01, 2014
IndiSoft, a global technology firm that develops collaborative technology for the financial, health care and legal industries, has become a certified technology partner in Dell’s Technology Partner Program. By certifying IndiSoft’s patented WipeOut security tool, users of Dell desktops, laptops and tablets can remove sensitive data from a hard drive, external drive and memory/flash drive.
WipeOut, which is available for individual and enterprise use, enables customers to protect their data by securely removing data permanently and providing the following benefits:
- Data protection.
- Compliance with federal requirements for secure data destruction.
- Compliance with organization data disposal and destruction guidelines.
- Protection of personal identifiable data by removing data sensitivity and
- Ensuring that client data is safe and protected.
As a certified Dell technology partner, IndiSoft can deliver a combined solution that can be rapidly adopted by organizations that are in need of managing the electronic data destruction.
"This certification is a significant achievement that highlights the capabilities and usefulness of WIpeOut to any company that wants to securely destroy sensitive information, said Sanjeev Dahiwadkar, CEO and president of IndiSoft. By using our WipeOut security tool, which is also certified by the Department of Defense, with Dell desktop, laptop and tablet platforms, customers can rest assured that they meet federal and data destruction compliance regulations as well as protect client data with every use of WipeOut."
Most people know that files, folders and data deleted go to a recycle bin and is still available for anyone who needs it. Even after deletion data is easy to recover, so it is not safe to just delete. To effectively manage confidentiality and remove sensitive data, users need to have a secure data destruction tool like WipeOut, that leaves no traces of the information. WipeOut has adopted National Institute of Standards and Technology (NIST) standards for computer security and comply with NIST Special Publication 800-36 and Special Publication 800-88.