Protect your critical information using our professional solutions.Deleting digital data is never secure. This requires the use of specialized solutions for guaranteed destruction of digital data. Deleting files only removes pointers (indexes) in the file system. In this way, the actual data remains on the device and can be easily recovered using software and hardware data recovery solutions. Therefore, it is important that data from devices where it is physically stored is completely deleted through specialized data deletion applications before disposing them off or else donating them to someone. Rely on practical experience in protecting digital information.We offer reliable solutions that are easy to use. |
|
Unlike other similar solutions, FDM allows control and documentation of processes in real time, processing of file packages, as well as working with databases of package information. This makes the application an indispensable tool when building cybersecurity systems that meet the requirements of ISO - ISO/IEC 27001 and ISO - ISO/IEC 27002.
The application's hybrid functions use proven algorithms described in NIST SP 800-88 and NIST SP 800-90A, which include Hash DRBG (Hash Function Based), HMAC DRBG (HMAC Based), and CTR DRBG (based on block ciphers in counter mode), as well as some specific solutions used in BS-1443 technology.
Note: The development process complies with the requirements set out in ISO/IEC 15408-1, which guarantees high reliability.
Working with the application is very similar to that of File Explorer. Users can choose between many encryption algorithms. Settings can be saved, which allows customization of the system.
Files and Folders Destruction Manager
FDM II