The first goal is to engage in physical recovery of the data. The challenge is to repair the device to a state that allows an extraction of a data image. Depending upon the nature of the device failure, the image may not be complete.
DriveSavers has technical alliances with their partners that provide engineering information to help repair drives. The technical alliances keep DriveSavers on the cutting edge, but also allow information sharing that helps manufacturers conduct field failure analysis. Technical alliances give DriveSavers access to sensitive IP, and collaborating with these companies requires extensive NDA agreements.
In some cases, DriveSavers recovers devices that do not benefit from technical alliances. Instead, they rely upon intense reverse engineering and their wealth of data recovery experience to extract the data.
DriveSavers has the capability to remove and reattach components to repair devices to facilitate drive image recovery. DriveSavers uses their own unique proprietary tools to recover data.
Once the physical recovery of the data is complete, the image heads to teams of engineers tasked with logical data recovery.
Often logical recovery is much more complex than physical recovery. DriveSavers routinely rebuilds data from not only single devices, but large RAID sets from SAN and NAS deployments. This involves reverse engineering the myriad of proprietary middle-layers employed by different companies.
DriveSavers also routinely deals with encrypted data. They can restore data in its encrypted state and deliver it to the customer, or the customer can provide encryption keys. This allows the engineers to decrypt the data, undertake the necessary repairs, and re-encrypt the data.
Data repair triggers a completely new set of required certifications. To process health information records, DriveSavers has to be HIPPA certified, and dealing with encryption software requires more certifications. Other certifications range from FERPA, NIST, SOX, GLBA, SOC 2, FCRA, and GLBA. Overall, DriveSavers employs 42 compliance and security protocols in day-to-day operations.
PRICING: You can find products similar to this one for sale below.
United States: Find other tech and computer products like this over at Amazon's website.
United Kingdom: Find other tech and computer products like this over at Amazon UK's website.
Canada: Find other tech and computer products like this over at Amazon Canada's website.
Recommended for You
- We at TweakTown openly invite the companies who provide us with review samples / who are mentioned or discussed to express their opinion of our content. If any company representative wishes to respond, we will publish the response here.
Latest News Posts
- Elon Musk teases Model Y for 'S3XY' lineup
- Samsung confirms that the Note7 isn't quite dead yet
- Apple iPhone 6s was the best-selling smartphone of 2016
- Rogue One looks great, even in a fan-made VHS commercial
- Intel working on next-gen Xeon with 32C/64T of power
- N3150-ITX Mini-PCI Express Slot
- Intel Optane Memory: What It Is and Why It Matters
- AnyRactive GoTouch Portable Whiteboard Review
- Gigabyte Aorus z270x Gaming 9 Motherboard Bios Code: bcc0
- New Mobo and my W10 Install?
- Elgato Stream Deck brings tactile control to live content creation
- COLORFUL wins innovation award from Intel
- Composer Olivier Deriviere pioneers real-time generated interactive music for GET EVEN
- BIOSTAR launches compact high-speed storage solution with M200 M.2 SSD
- EpicGear launches MORPHA X RGB fully modular gaming mouse