DESTRUCT PRO is a revolutionary, affordable USB device that erases all your files and data from your hard drive, providing a military grade wipe, making it unrecoverable.
Did you know that when you factory reset your computer, it is simple to recover the deleted files. With DESTRUCT PRO's 3 phase cryptographic wipe the files are gone forever.
NIST 800-88 compliance for Media Sanitization – NIST 800-88 is the de facto standard for data destruction on hard disk drives (HDD), solid state drives (SSD) and USB flash memory. In addition to the 3 phase wipe process, DESTRUCT PRO now supports secure erase capabilities including BLOCK ERASE and CRYPTO SCRAMBLE. The new wipe capabilities ensure that data stored in areas of the disk that are not normally accessible get completely destroyed.
EASY TO USE INTERFACE
From when you plug DESTRUCT PRO in, the new interface makes navigating around DESTRUCT PRO easy. No complicated boot sequence or technical knowledge needed. Select either one or multiple hard drives and your computer will be clean and like new.
DESTRUCT PRO's new interface, lets you know if there is a problem with your hard drive and how far along the process it is in the 3 phase Cryptographic wipe.
Once wiped all you have to do is re-install your operating system and your computer is ready to be sold or re-used.
Select 1 or multiple hard drives
Full Virus Removal
Super fast wipe methods. We now support single phase BLOCK ERASE and CRYPTO SCRAMBLE which can wipe an entire drive in seconds. Our in-house test lab have reported a 240GB SanDisk SSD can be wiped using BLOCK ERASE in around 10 seconds. Using third-party data recovery tools they were unable to recover any data from the drive after the fast wipe. (DESTRUCT PRO will never select a 1 phase fast wipe by default)
DESTRUCT PRO now detects the best possible data destruction method for each drive being wiped. Don’t worry about which method to use. DESTRUCT PRO is smart enough to figure that out for you. (Although you can revert back to the DESTRUCT PRO 3 phase data wipe if you prefer).
WHY DESTRUCT PRO?
In the digital age our data has become more valuable than ever. It has become harder to know where our data is stored. A laptop or PC can hold all sorts of personal data that you know of, but there is also data that you never think about. Do you sync files and photos with cloud services like Dropbox, WhatsApp, OneDrive or iCloud? What about your mobile phone, does it sync to your computer sending photos, passwords and more?
Many of us spend hours on the web every week for work and play. To make life easier when switching between devices your web browser will often sync your activities between devices. This includes the current pages you are visiting as well as passwords and other private information.
Online banking and finance are so common place today that many of us never visit the branch. Everything can be done from the comfort of an armchair. All of our digital assets as well as our real world ones are managed and controlled through the devices we surround ourselves with.
So what happens when one of these devices reaches the end of it’s life. Maybe you are upgrading to the latest and greatest, or perhaps it is simply too old and slow. Whether you are gifting, selling or simply throwing an old device away, it has the digital footprints of your life contained within it. These footprints can be used against you if you do not take care to erase them.
Operating systems often have an option to Factory Reset your device back to a clean state, but this does not destroy all of the data. Think of a library with shelves of books and index cards telling you where to find the book you are looking for. When you factory reset your device you are simply destroying the index cards. All of the books are still sitting on the shelves ready to be read.
DESTRUCT PRO ensures that the index cards are destroyed, the books are shredded, the library is torn down and finally the whole lot set on fire. Nothing is coming back after that. Using a 3 pass mechanism DESTRUCT PRO wipes all of the data, then writes cryptographically scrambled data over the top and finally performs a final clean wipe. This ensures that even forensic tools for data recovery will only be able to recover the scrambled data and not your precious files and information.