Serving the Critical Data Storage Needs
of Industrial and OEM Customers

FORTASA BLOG

Flash Storage Solutions for Embedded Designs
High Reliability Flash SSDs, Cards and Modules for Industrial Applications

Resolving CompactFlash Card UDMA Compatibility Issues

Posted by Biraj Jamalayam on Tuesday, 08 Apr 2014

CompactFlash cards have been the dominant choice for embedded storage in Industrial Electronic Systems. Attracted by the universal standard in both interface and form factor, the CompactFlash cards have migrated from the storage media predominantly used in consumer devices such as Digital Cameras and MP3 players to Industrial Applications and non-consumer platforms.

Industrial CompactFlash card

In embedded applications, CompactFlash cards are generally used as a higher reliability and more robust storage system to replace traditional Hard Disk Drives. The CompactFlash card includes a TrueIDE interface to emulate the bus interface of the ATA/IDE bus and make Flash storage transparent to the host system.

READ MORE

DOD 5220.22-M Requirement - Secure Data Purge From The Flash Storage Device

Posted by Samuel Nakhimovsky on Wednesday, 19 Mar 2014

DoD 5520.22-M Security Data Purge

Another ubiquitous and popular data sanitization method to safely and securely erase sensitive data from a storage device, including Flash SSDs, is DoD 5220.22-M.  This method was initially defined by the US National Industrial Security Program (NISP) in the National Industrial Security Program Operating Manual (NISPOM) and is one of the most commonly used data sanitization methods used in data destruction software. Another item to note is that the NISPOM does not define any US government standard for data sanitization. The Cognizant Security Authority (CSA) is truly responsible for data sanitization standards.

The DoD 5220.22-M data sanitization method is implemented in the following way in Fortasa Flash SSDs.:

READ MORE

DOD 5220.22-M Requirement - Secure Data Purge From The Flash Storage Device

Posted by Samuel Nakhimovsky on Wednesday, 19 Mar 2014

DoD 5520.22-M Security Data Purge

Another ubiquitous and popular data sanitization method to safely and securely erase sensitive data from a storage device, including Flash SSDs, is DoD 5220.22-M.  This method was initially defined by the US National Industrial Security Program (NISP) in the National Industrial Security Program Operating Manual (NISPOM) and is one of the most commonly used data sanitization methods used in data destruction software. Another item to note is that the NISPOM does not define any US government standard for data sanitization. The Cognizant Security Authority (CSA) is truly responsible for data sanitization standards.

The DoD 5220.22-M data sanitization method is implemented in the following way in Fortasa Flash SSDs.:

READ MORE

NSA Manual 130-12 Requirement - Secure Data Purge From The Flash Storage Device

Posted by Samuel Nakhimovsky on Wednesday, 19 Mar 2014

National Security Agency
Media Sanitization Manual

A more detailed and elaborate data sanitization method to purge resident data from the storage media, including Flash Storage, quickly and securely is defined in NSA Manual, Section 130-12. Currently, the Manual 9-12 supersedes NSA/CSS Manual 130-12.

The NSA method requires the destructive sequence below to overwrite existing information on a hard drive, SSD, Flash card or other storage device. The NSA data sanitization method is defined to be implemented in the following way:

READ MORE

Page