Disk Encryption Technology
Disk encryption is an essential security tool that prevents unauthorized computer users from accessing protected files and folders on a hard drive or other device. While there are many different encryption technologies, all use cipher algorithms to scramble data. To decrypt files, users need an appropriate key.
As security experts, we have relevant experience with all common disk encryption tools and algorithms.
Disk-level encryption affects an entire hard drive, solid-state-drive, flash drive or other disk. All data is encrypted, and users typically need to enter a password in order to access any files on the device. In high-security settings, full-disk encryption, filesystem encryption and file-level encryption are commonly used on the same devices to protect sensitive data.
Common software disk encryption tools include:
- Conjurers Encrypter
Some disk-level encryption tools are hardware specific and will not grant access to an unrecognized system; in other words, the encrypted disk can only be decrypted by a single computer. This creates a single point of failure; however, so hardware-specific disk encryption is rare outside of government offices and other high-security environments. Trusted Platform Module (TPM) is a hardware-specific authentication module with safeguards that allow for data recovery if a primary system fails.
Secure Data Recovery Services specializes in data recovery, and we handle thousands of encrypted hard drives, RAID arrays and other devices each year. While encrypted media presents some challenges for data recovery engineers, our teams have a large experience with all disk-level encryption technologies. We offer high recovery rates, fast turnaround times and best-in-class security controls for encrypted media.
Data Recovery Procedures for Encrypted Disks
Whether a device uses hardware or software-based disk encryption, our data recovery team needs to perform in-lab diagnostics to determine the cause of data loss and the extent of media damage before starting recovery procedures. Secure Data Recovery Services offers free media diagnostics for all digital media, and our engineers can provide a turnaround estimate, price quote and media analysis within 24 hours of receiving a damaged device.
Common causes of data loss on encrypted media include:
- Hard Drive Read/Write Head Failures
- Seized Spindle Bearings
- Data Corruption
- Accidental File Deletion
- Unintentional Formatting
- Failed RAID Array Rebuilds
- Bad Sectors
- Controller Board Issues
- Failure to Mount
If your media is physically damaged, our engineers will need to repair the damaged components in order to access data. We perform physical repairs in a Certified Class 10 ISO 4 Cleanroom, a specialized environment that allows fewer than 10 airborne contaminants per cubic foot. This technology protects exposed media components, and we are one of the only data recovery companies to earn and maintain a Class 10 ISO 4 certification.
After repairing physical components, we treat data corruption, deleted files and other logical damage in a secure laboratory. Our specialists make a bit-by-bit clone of your media and work with this clone during logical recovery procedures to maintain the original condition of your media.
Data recovery engineers need to use specialized utilities to recover files from encrypted disks. At Secure Data Recovery Services, we use proprietary software to treat damaged media without decrypting data. We offer custom data recovery services for encrypted disks and can return your data in an encrypted, decrypted or partially decrypted format. To decrypt data, we will need the keys or passwords associated with the disk.
We offer several turnaround options. Our 24/7/365 services provide excellent 48-hour average turnaround times for encrypted devices. Contact our customer service team for more information.
Choosing a Secure Data Recovery Provider
All data recovery companies need to follow appropriate protocols when recovering encrypted media. Secure Data Recovery Services has more security certifications than any other major data recovery provider, and we maintain our excellent laboratory and network controls through third-party audits.
As the first data recovery company to earn a SSAE 18 Type II Certification, we lead our industry in security practices. We are a member of the Information Systems Security Association (ISSA) and a certified General Services Administration (GSA) contractor.
Our other certifications include:
- SAS 70 Certification
- PCI Security Certification
- SSAE 18 Type II Certification
- Green Business Certification
If you lose access to data on an encrypted disk, do not continue to use the device. Turn off the device and contact Secure Data Recovery Services to set up a free media evaluation. We offer online case status monitoring tools, fast case turnarounds, high recovery rates and custom services for devices with disk-level encryption. We provide no-risk diagnostics through dozens of offices throughout the United States.
To schedule a free data recovery evaluation for an encrypted device or system, contact Secure Data Recovery Services today.