A new method for data destruction

July 2019 News & Events, Security Services & Risk Management

Xperien is now able to professionally erase data on retired IT assets in compliance with the Protection of Personal Information Act (PoPIA). It offers safe and secure data destruction services and all its data destruction methods are accompanied by certificates that will be required for an audit trail.

It is often assumed that once data has been marked for disposal, it no longer requires much attention. However, it is essential for data security and the protection of personal, proprietary and confidential information that data is permanently destroyed, deleted or erased from devices.

Xperien senior business development manager Bridgette Vermaak says data at end-of-life has now become a huge challenge for most companies, especially with uncontrolled data growth that has resulted in new corporate policies for data storage and retention. “This is largely as a result of new global legislations and regulations.

“Our technicians are able to perform onsite destruction of hard drives and devices using physical destruction. Our mobile shredders are able to handle 300 hard drives or cellphones daily,” she explains.

Degaussing is a process that uses a magnetic charge to eliminate data and it also destroys other components of the hard disk drive – ensuring double protection. Degaussed drives can then be recycled.

“For offsite hard drive destruction we use physical shredding to destroy large quantities of hard drives and devices. It destroys all types of data tape media, mobile phones, libraries and CDs by shredding them into tiny pieces.”

Xperien provides secure lockable strongboxes that can be used to collect hard drives, mobile phones and other devices prior to arrival onsite. These can be used for a destruction or a collection for offsite destruction. To recover value from hard drives and devices with SSD data storage, mainly cellphones and USB sticks, Xperien uses software erasure which eliminates data without physically destroying the asset’s value.

For more information contact Xperien, +27 11 462 8806, bridgette@xperien.co.za, www.xperien.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
Reshaping South Africa’s built environment
Securex South Africa Facilities & Building Management News & Events Commercial (Industry)
FM teams are responsible for the overall operational environment of a building, while security teams focus on protection, control, and incident response. Increasingly, both rely on the same data streams, infrastructure, and digital tools.

Read more...
Banking’s AI reckoning
Financial (Industry) News & Events AI & Data Analytics
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.