A new method for data destruction

July 2019 News & Events, Security Services & Risk Management

Xperien is now able to professionally erase data on retired IT assets in compliance with the Protection of Personal Information Act (PoPIA). It offers safe and secure data destruction services and all its data destruction methods are accompanied by certificates that will be required for an audit trail.

It is often assumed that once data has been marked for disposal, it no longer requires much attention. However, it is essential for data security and the protection of personal, proprietary and confidential information that data is permanently destroyed, deleted or erased from devices.

Xperien senior business development manager Bridgette Vermaak says data at end-of-life has now become a huge challenge for most companies, especially with uncontrolled data growth that has resulted in new corporate policies for data storage and retention. “This is largely as a result of new global legislations and regulations.

“Our technicians are able to perform onsite destruction of hard drives and devices using physical destruction. Our mobile shredders are able to handle 300 hard drives or cellphones daily,” she explains.

Degaussing is a process that uses a magnetic charge to eliminate data and it also destroys other components of the hard disk drive – ensuring double protection. Degaussed drives can then be recycled.

“For offsite hard drive destruction we use physical shredding to destroy large quantities of hard drives and devices. It destroys all types of data tape media, mobile phones, libraries and CDs by shredding them into tiny pieces.”

Xperien provides secure lockable strongboxes that can be used to collect hard drives, mobile phones and other devices prior to arrival onsite. These can be used for a destruction or a collection for offsite destruction. To recover value from hard drives and devices with SSD data storage, mainly cellphones and USB sticks, Xperien uses software erasure which eliminates data without physically destroying the asset’s value.

For more information contact Xperien, +27 11 462 8806, bridgette@xperien.co.za, www.xperien.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Africa’s opportunity to shape the future of human-centred AI
AI & Data Analytics Security Services & Risk Management
Across the Global South, countries are not yet locked into decades of legacy AI systems, energy-intensive infrastructure, or governance frameworks designed for a different technological era. That creates something rare in technology development: a cleaner slate.

Read more...
AURA appoints Taryn Winer as global head of people
News & Events Security Services & Risk Management
Following its €13,5 million Series B funding round last year and accelerating international expansion, particularly across the United States, AURA has appointed Taryn Winer as global head of people.

Read more...
Gallagher Security releases new fence controllers
Perimeter Security, Alarms & Intruder Detection News & Events
Gallagher Security has announced the release of its new F5 and F6 Fence Controllers, marking the latest generation of enhanced-safety, monitored-pulse fence technology, designed to meet the demands of modern security environments.

Read more...
Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...
The impact of misguided viral campaigns
News & Events Training & Education
For many years, traditional media have been perceived as slower, more inflexible, and less responsive compared to digital platforms. But in an ecosystem flooded with content, its value is becoming clearer: verification, context, and accountability.

Read more...
Understanding the Shared Responsibility Model
Infrastructure Security Services & Risk Management
While the cloud can certainly be a growth enabler in many ways, it can also introduce new security risks. Companies want to have a clear understanding of where their security duties end and where their cloud service provider’s begin.

Read more...
Gallagher Security strengthens KwaZulu-Natal presence
Gallagher News & Events Integrated Solutions
Gallagher Security has reinforced its commitment to the KwaZulu-Natal region with its Command the Future event. The full-day event welcomed over 100 channel partners, end users, and consultants, marking Gallagher’s third major event in Durban.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.