VerifyIT is an R2v3 compliant Verification solution, designed to compliment the R2v3 certification and bolster post-erasure security.
At Cedar, we understand the importance of verifying data erasure to ensure no data remnants remain.
VerifyIT generates cloud-based, digitally-signed, tamper-proof reports of the verification process.
Cloud-based Reporting.
Digitally Signed.
Tamper Proof.
Access anywhere, anytime.
Method Name | # | Method Description | Verification Pattern |
---|---|---|---|
Automatic | 1 | Analyses the pattern of the disk on the fly, checking for discernible data, or not-repeated characters. | Automatic |
Zeros | 1 | Verify all bytes are Binary Zeros. | 00 |
Ones | 1 | Verify all bytes are Binary Ones. | FF |
Zeros and Ones | 1 | Verify all bytes are alternating Zeros and Ones. | 55 |
Ones and Zeros | 1 | Verify all bytes are alternating Ones and Zeros. | AA |
See our world leading data erasure software in action, call our team for a demo now!
Book a Demo!