The first goal is to engage in physical recovery of the data. The challenge is to repair the device to a state that allows an extraction of a data image. Depending upon the nature of the device failure, the image may not be complete.
DriveSavers has technical alliances with their partners that provide engineering information to help repair drives. The technical alliances keep DriveSavers on the cutting edge, but also allow information sharing that helps manufacturers conduct field failure analysis. Technical alliances give DriveSavers access to sensitive IP, and collaborating with these companies requires extensive NDA agreements.
In some cases, DriveSavers recovers devices that do not benefit from technical alliances. Instead, they rely upon intense reverse engineering and their wealth of data recovery experience to extract the data.
DriveSavers has the capability to remove and reattach components to repair devices to facilitate drive image recovery. DriveSavers uses their own unique proprietary tools to recover data.
Once the physical recovery of the data is complete, the image heads to teams of engineers tasked with logical data recovery.
Often logical recovery is much more complex than physical recovery. DriveSavers routinely rebuilds data from not only single devices, but large RAID sets from SAN and NAS deployments. This involves reverse engineering the myriad of proprietary middle-layers employed by different companies.
DriveSavers also routinely deals with encrypted data. They can restore data in its encrypted state and deliver it to the customer, or the customer can provide encryption keys. This allows the engineers to decrypt the data, undertake the necessary repairs, and re-encrypt the data.
Data repair triggers a completely new set of required certifications. To process health information records, DriveSavers has to be HIPPA certified, and dealing with encryption software requires more certifications. Other certifications range from FERPA, NIST, SOX, GLBA, SOC 2, FCRA, and GLBA. Overall, DriveSavers employs 42 compliance and security protocols in day-to-day operations.
PRICING: You can find products similar to this one for sale below.
United States: Find other tech and computer products like this over at Amazon's website.
United Kingdom: Find other tech and computer products like this over at Amazon UK's website.
Canada: Find other tech and computer products like this over at Amazon Canada's website.
Recommended for You
- We at TweakTown openly invite the companies who provide us with review samples / who are mentioned or discussed to express their opinion of our content. If any company representative wishes to respond, we will publish the response here.
Latest News Posts
- Nanomaterial charges phones, electric cars in SECONDS
- Qualcomm's next-gen Snapdragon 845 teased
- Star Citizen Alpha 3.0 lets you land on the moon
- Intel Core i9-7960X benchmarks: 16C/32T 'Skylake-X' CPU
- Intel's new Core i7-8700K CPU detailed, 6C/12T @ 4.3GHz?
- How to make one network using 2 routers
- Lian-Li DK02 Watercooling and dimensions
- ASUS X200 CA 1.0 should camera appear in system in control panel?
- How to upgrade the BIOS to GA-UD23-B3?
- Baby Driver Movie Review
- Atari announces Blade Runner 2049 partnership with NECA and Audiowear, launching wearable technology that blurs the line between fashion and future
- BIOSTAR introduces the world's first 8-slot PCI-e mining motherboard with the TB250-BTC+
- HyperX unveils HyperX Alloy Elite and TKL HyperX Alloy FPS Pro mechanical gaming keyboards
- Toshiba Memory Corporation develops world's first 3D flash memory with TSV technology
- ADATA releases XPG GAMMIX line with S10 PCIe Gen3x4 NVMe 1.2 SSD and D10 DDR4