Accueil > Applications > Utilitaires et outils
FDM II spe

FDM II spe

Édité par: Gatelink Ltd
Licence: 9.49

Captures d’écran:

Minimum
Système d'exploitation
ArchitectureARM64,x64,ARM,x86
Nos recommandations
Système d'exploitation
ArchitectureARM64,x64,ARM,x86

Description

DEFINITION


File Destroy Manager (FDM) is a professional file shredder with a free disk space sanitization module included.


Unlike all other similar applications, FDM can destroy files whose meta information is saved in specialized file packages.


The application can be used to destroy critical information, design and execute meta-scenarios, protect files and folders from unauthorized access, and as an element of specialized cyber security systems.


FIELD OF APPLICATION


Deleting a file only removes the entry of the file (pointer) from the file index in a file system. Thus, the actual data remains on the drive and can be easily recovered with the help of specialized data recovery tools. You must destroy the data from your storage devices by using a data erasure tool before disposing of them or else donating them to someone. FDM uses some of the most effective standard digital data erasure algorithms used by government organizations and corporate structures, as well as hybrid solutions that are less familiar. One of the main advantages of FDM is the ability to automatically generate control reports. This makes the application an indispensable tool when building cybersecurity systems that meet the requirements of ISOISO/IEC 27001 and ISOISO/IEC 27002. The application's hybrid functions use proven algorithms described in NIST SP 800-88 and NIST SP 800-90A, which include Hash DRBG (Hash Function Based), HMAC DRBG (HMAC Based), and CTR DRBG based on block ciphers in counter mode), as well as some specific solutions used in BS 1443 technology.


TECHNOLOGICAL SOLUTIONS


The correct choice of algorithms and software technologies for the destruction of digital data is a guarantee of the high efficiency and reliability of the application.


The application uses the following algorithms to destroy digital information:


STANDARD ALGORITHMS (basic technologies)


• NIST Special Publication 800-88 • NIST Special Publication 800-90A • NIST Special Publication 800-90B • U.S. Department of Defense DoD 5220.22-M (ECE) • U.S. Department of Defense DoD 5220.22-M (E) • U.S. Department of Defense DoD 5220.28-MSTD • U.S. Army AR 380-19 • U.S. Air Force AFSSI-5020 • Canadian RCMP TSSIT OPS-II • British HMG IS5 • Peter Gutmann • Russian Standard – GOST-R-50739-95


SPECIAL ALGORITHMS (hybrid technologies)


• BS Standard DestroyerHybrid • BS Ultra DestroyerHybrid


Autres contenus plébiscités

Évaluations

Articles

À propos de FDM II spe
We use cookies and other technologies on this website to enhance your user experience.
By clicking any link on this page you are giving your consent to our Privacy Policy and Cookies Policy.