Software data erasure

USE Blancco

See how the destruction process looks like using Blancco and enjoy full security for your data! This reliable software guarantees secure and irreversible data removal from all media.

Blancco is the market leader in data erasure – confirmed by numerous certificates and recommendations. This means you can fully trust our solution.

Blancco not only removes data but also provides detailed reports of the entire process. You can rest easy knowing that your data is safe and inaccessible to unauthorized parties.

Don’t take risks when it comes to data privacy and security. Choose Blancco and secure your information once and for all!


  • Over 24 overwriting standards to choose from.
  • Patented method for erasing data from SSDs.
  • Verification of data erasure accuracy from all disk sectors.
  • Data erasure report – without the possibility of later editing.


    • Data erasure management from a central console.
    • Scalable operations.
    • Efficient performance – regardless of the operating system or hardware manufacturer.

      Compliance with corporate security policies

      • Storing reports in one place – without the possibility of interference.
      • Ability for the corporate security team to view, send, and save reports.
      • Customizable reporting to meet your needs and requirements.


        Software Compliance

        Software provider’s compliance with prevailing legal and technical requirements – possessing necessary certificates, permits, and licenses from governmental bodies and international organizations.


        A comprehensive solution that enables data erasure from various devices such as HDDs, SSDs, and Flash memory.

        Reporting Method

        The report should include device serial numbers, confirm that data has been effectively erased, and record information about the person/company who performed the deletion.

        Comprehensive support

        The service provider should ensure support for various hardware platforms.

        Automation of operations

        Easy-to-use data erasure software. It should perform most tasks automatically so that the client doesn’t need to allocate additional resources.


        Software and resources enabling rapid deletion of large amounts of data help reduce the costs associated with storing unused equipment.

        Data erasure from mobile devices

        In your company, are there more and more mobile devices appearing? There will come a time when data erasure will be necessary. It’s a rather complex operation that requires careful planning. But don’t worry – we have a solution for that!

        SDR-IT utilizes Blancco Mobile Device Eraser software, which effectively erases all data from mobile devices and conducts comprehensive diagnostics.

        Specifically for you:

        • We will perform diagnostics – identifying and resolving performance issues.
        • We will erase data – you have a choice of up to 13 erasure standards, including Aperiodic, random algorithms, Crypto Erase, and DoD 5520.22M.
        • We will prepare a report – you will receive a tamper-proof summary.


          Advantages of using Blanco Mobile Eraser

          • It operates on multiple operating systems – iOS, Android, Windows Phone, and BlackBerry.

          • It swiftly erases data from over 80 mobile devices simultaneously.

          • It automatically selects the fastest and most effective data erasure method.

          • It features reliable tests to resolve device performance issues (battery drain, card failures).

          • It complies with state, federal, and international data privacy regulations, including NIST 800-88 Clear & Purge, GDPR, DOD 5220.22.

          • It reduces processing time through automated testing.

          • It provides data analysis on processed devices.

          • It allows checking of IMEI numbers, FMiP, and carrier locks.

          • It creates a certified audit trail protected against unauthorized manipulation.

            Secure data erasure represents the final step in any comprehensive data security policy.

          Available methods for data erasure at SDR-IT

          Standard Name


          Air Force System Security Instruction 5020

          Erasure rounds: 2 
          Originally defined by the United States Air Force, this 2-pass overwrite is completed by verifying the write.

          Aperiodic random overwrite/Random

          Erasure rounds: 1
          This process overwrites data with a random, instead of static, pattern. Each sector of the drive will contain different data. This process is completed by verifying the write.

          Blancco SSD Erasure

          Erasure rounds: –
          Blancco’s multi-phase, proprietary SSD erasure approach utilizes all supported SSD security protocols. This innovative method includes multiple random overwrites, firmware level erasure, freeze lock removal and full verification.

          Bruce Schneier’s Algorithm

          Erasure rounds: 7
          This 7-step process, presented by security technologist Bruce Schneier, overwrites using 1s, 0s and a stream of random characters.


          Erasure rounds: 4
          This 4-pass system is the original BSI standard defined by the German Federal Office of Information Security.


          Erasure rounds: 1 
          Defined by the German Federal Office for Information Security, this process begins by removing hidden drives (HPA/ DCO if existing) and overwriting with aperiodic random data. The next step triggers a firmware based command dependent on the type of drive. The last step is to verify the write.


          Erasure rounds: 2 
          The BSI-GSE adds one extra step to the BSI-GS. After the first overwrite, an additional overwrite with aperiodic random data is added before moving on to the last two steps.

          CESG CPA – Higher Level

          Erasure rounds: 3 
          The UK government’s National Technical Authority for Information Assurance standard is a 3-pass process with a verification after each step.

          Cryptographic Erasure (Crypto Erase)

          Erasure rounds: –
          This method uses the native command to call a cryptographic erasure, which erases the encryption key. While the encrypted data remains on the storage device itself, it is effectively impossible to decrypt, rendering the data unrecoverable. Because this method uses the native commands as defined by the manufacturer, it is only available if supported by the drive being erased.

          DoD 5220.22-M

          Erasure rounds: 3 
          Published by the U.S. Department of Defense (DoD) in the National Industrial Security Program Operating Manual (also known as DoD document #5220.22-M), it specified a process of overwriting hard disk drives (HDDs) with patterns of ones and zeros. The process required three secure overwriting passes and verification at the end of the final pass.

          DoD 5220.22-M ECE

          Erasure rounds: 7
          This method is an extended (7-pass) version of the DoD 5220.22-M. It runs the DoD 5220.22-M twice, with an extra pass (DoD 5220.22-M (C) Standard) sandwiched in between.

          Extended Firmware Based Erasure

          Erasure rounds: 3 
          This Blancco-defined standard adds an overwrite as the first step and then follows the standard Firmware Based Erasure, making this a 3-step process.

          Firmware Based Erasure

          Erasure rounds: 2 
          This Blancco-defined standard is a 2-step process triggers a firmware command that is dependent on the drive type. The last step of the process is to verify the write.

          HMG Infosec Standard 5, Higher Standard

          Erasure rounds: 3 
          Used by the British Government, this 3-pass overwrite adds one additional write. Like the baseline standard, this process is completed by verifying the write.

          HMG Infosec Standard 5, Lower Standard

          Erasure rounds: 1 
          Used by the British Government, this 1-pass overwrite consists of writing a zero pattern. This process is completed by verifying the write.

          IEEE 2883-2022 Clear

          Erasure rounds: 0-2 
          Developed by the IEEE Standards Association, IEEE Clear requires the removal/erasure of certain areas (such as hidden areas, depopulated storage elements, or cache zones, if existing). The data is then sanitized (via a firmware-based command or overwritten) and verified.

          IEEE 2883-2022 Purge

          Erasure rounds: 0-2 
          Developed by the IEEE Standards Association, IEEE Purge requires the removal/erasure of certain areas (such as hidden areas, depopulated storage elements, or cache zones, if existing). The data is then sanitized (via a firmware-based command) and verified. 

          National Computer Security Center (NCSC-TG-025)

          Erasure rounds: 3 
          Defined by the US National Security Agency, this 3-pass system includes a verification after each pass of 0s, 1s and a random character.

          Navy Staff Office Publication (NAVSO P-5239-26)

          Erasure rounds: 3 
          Published by the US Navy, this 3-pass system uses a specified character (and its complement) and a random character. The process is completed by verifying the write.

          NIST 800-88 Clear

          Erasure rounds: 0-2 
          The National Institute of Standards and Technology Clear requires the removal of hidden areas (HPA/DCO, if existing). The data is then overwritten and verified.

          NIST 800-88 Purge

          Erasure rounds: 0-2 
          This method requires the removal of hidden areas (HPA/DCO, if existing). A firmware-based command is triggered depending on the type of drive, and the last step is the verify the write.

          NSA 130-1

          Erasure rounds: 3 
          Defined by the National Security Agency, this method uses a 3-pass overwrite: writes a random character, writes another random character and writes a known value. This process is completed by verifying the write.

          OPNAVINST 5239.1A

          Erasure rounds: 3 
          Defined by the US Navy, this process is completed by verifying the write after a 3-pass overwrite—the first a random byte and static overwrite for the last two.