CoreEraser

CoreEraser’s functionality is divided into Quick Erase, Full Erase and MIL Erase. The first option is most useful when speed is important. Full Erase is more thorough, and MIL Erase offers overwriting features that ensure data is scrubbed from the drive.

Apacer’s CoreEraser Technology provides highly comprehensive drive sanitization measures, developed to securely and thoroughly erase data in operating blocks. The CoreEraser comes in three types of block sanitizations and can be implemented through a software command or hardware architecture.

Quick Erase: Erases the MBR and FAT table that serves as a data allocation and mapping link in the user block immediately after activation. Once the erase command is completed, all the erased data becomes irretraceable.

Full Erase: Full Erase is a more comprehensive function than Quick Erase, where all contents of the user blocks, free blocks, MBR and FAT table are erased after the procedures are completed. The drive will be reinitialized upon the completion of the erase action. The device will behave as a raw disk and cells in the drive will display “FF” or “00”.

MIL Erase: The Military Erase standards were originally created by different branches of the US armed forces. Each branch has its own specification for what constitutes an erased device. Generally speaking, the military erase standards involve erasing the device in question and then performing multiple overwrites using garbage data.

Mil Erase supports a variety of MIL erase standards:

  • NSA 9-12
  • DoD 5220.22-M
  • NSA Manual 130-2
  • USA-AF AFSSI 5020
  • USA-Army 380-19
  • USA Navy NAVSO P-5239-26
  • NISPOMSUP Chap 8, Sect. 8-501
  • IREC (IRIG) 106

Related Technologies
Recommended Products
ATA Secure Erase

When this command is given, an SSD will reset all its storage cells to empty, releasing trapped electrons and restoring the drive to its original state. This operation completely wipes data ...

CoreSecurity2

Apacer’s CoreSecurity2 is a proprietary data protection technology developed to elevate the data security level through customized firmware and prevent data leakage, delivering higher reliab...

CoreDestroyer

The CoreDestroyer functionality is a software function that renders the entire SSD unusable, for cases where the SSD is about to fall into the hands of an unauthorized user.

Instant Keychange

Apacer based the Instant Keychange™ function on AES encryption, and it can be trigged either via hardware or software. Destroying the original key and creating a new one takes less than a se...

Opaque

Apacer has developed the Opaque software as a custom implementation of the TCG Opal 2.0 standard. Its accessible interface allows users to control useful security functions, such as pre-boot...

Signed Firmware

Apacer’s Signed Firmware technology is a secure way to update firmware. By including a digital signature, a firmware update will be authenticated by the Apacer SSD before a firmware update i...

TCG Opal 2.0

TCG Opal handles the encryption/decryption of information within the device without requiring a host, enabling fast encryption/ decryption and minimizing the risk of data leakage without und...

Write Protect

Write Protect can prevent drives from unauthorized data writing via a hardware switch/pin or vendor software command.