Friday, March 14, 2014

What is DoD Erase?


What is DoD Erase? 

A data sanitization method based on US Department of Defense (DoD5220.22-M) standard that will prevent all software or hardware based file recovery from lifting information from the drive. Disk is sanitized by writing a different pattern to the disk by following
Pass 1: Writes a zero and verifies the write
Pass 2: Writes a one and verifies the write
Pass 3: Writes a random character and verifies the write.



U-Reach’s CT and IT HDD Duplicator Series can help speed up the process in mass disk sanitization. These professional platforms feature high secure level “DoD Erase” that

comply to U.S. (DoD 5220.22-M) standard, data may be cleared by writing any bit pattern to the entire disk once. Our most advanced CT600G (1-5) HDD Duplicator is expandable up to 59 targets by using “ Daisy Chain” as your duplication or sanitization target demand needs. 

However, IT Series HDD Duplicator is not expandable but you have three models to choose from IT300G (1-3), IT700G (1-7) and IT1500G (1-15). Each drive bay is a cable-less direct module connection to our HDD controller. This ensures reliability and impeccable efficiency to provide maximum performance without speed degradation. Both platforms support several data erase methods:
Quick erase, Full erase, DoD Erase 3 pass and Secure
erase along with the features listed below…

  • Duplication mode: Quick copy, All Partitions and Whole HDD 
  • “Compare” function with 100% accuracy of data duplication
  • Support quick copy with MBR, GPT, FAT16/32, NTFS, Mac(HFS, HFS+), Linux (EXT2/EXT3/EXT4) formats.
  • Automatic power control to prevent HDD damage during insertion/removal
  • Optional adapters to support various HDDs: SATA/IDE, HDD/mSATA/eSATA/SSD/iVDR.
  • Innovative Guiding Module Design

Friday, March 7, 2014

What is Secure Erase?





If you keep business, medical, or personal financial information on disks, simple deletion is not enough to protect the data when disposing of the equipment. Besides identity theft,data loss may leave you or your company liable under federal or state laws. How does Secure Erase work?


Secure erase overwrites every single track on the hard drive which includes “bad blocks” based on the ANSI ATA specification that has been approved by NIST 800-88 for secure erase of hard drive up to confidential level. The traditional method is by connecting each hard drive to a computer system to do the tedious task. These old techniques are way too slow and why not use a more reliable method by using U-Reach’s CT & IT HDD Duplicator Series that can help speed up the process in mass secure erase.


CT600G (1-5) HDD Duplicator is expandable up to 59 targets by using “Daisy Chain” as your duplication or secure erase target demand needs.However, IT Series HDD Duplicator is not expandable but you have three models to choose from IT300G (1-3), IT700G (1-7) and IT1500 (1-15).Each drive bay is a cable-less direct module connection to our HDD controller. This ensures
reliability and impeccable efficiency to provide maximum performance without speed degradation. Both platforms support several data erase methods: Quick erase, Full erase, DoD Erase 3 pass and Secure Erase along with the features listed below…

‧Duplication mode: Quick copy, All Partitions and Whole HDD (1:1 bit-for-bit “Compare”
  function with 100% accuracy of data duplication)
‧Support quick copy with MBR, GPT, FAT16/32, NTFS, Mac(HFS, HFS+), Linux
  (EXT2/EXT3/EXT4) formats.
‧Automatic power control to prevent HDD damage during insertion/removal
‧Optional adapters to support various HDDs: SATA/IDE, HDD/mSATA/eSATA/SSD/iVDR.
‧Innovative Guiding Module Design


Wednesday, February 19, 2014

What is the importance of a HDD Event Log Function? How does iSecuLog works?





What is the importance of a HDD Event Log Function?

Government and University officials are required to comply with external regulations, internal policies and security practices. They acknowledge that many business or IT department will be monitoring user access to any systems and applications. Therefore, an HDD Event Log is needed. U-Reach Hard Drive duplicator solution has this function built into the system on a hardware level by connecting to PC Link software in Real-Time. You can easily collect and analyze work status, execute time, HDD info, drive capacity, model, S/N, and Transfer Speed and is protected by U-Reach’s iSecuLog (Anti-Tampering Event Log Report).

How does iSecuLog works?
A unique “Invisible Ink” applied onto the text file report. This protection will ensure the Event Log integrity with 100% accurate yield rate analysis. Without this type of technology, log report is easily tampered by anyone who reads and delivers it. In all environment scenario, this reduces complexity of Event Log, save time and cost, improves information assurance and compliance reporting.


Friday, January 24, 2014

RTECC 2014 (Real-Time Embedded Computing Conference) @ Santa Clara, CA.


A special one-day event at the RTECC 2014 in Santa Clara, CA. U-Reach has met up a couple of clients to continue with our ongoing projects with them. We focused to help them stay on track and meet their goals by providing close support. Many interesting opportunities and a few vendors were in talks with us that were also interested in how technology can be used to make their task easier.  This really helps motivate of what we do here at U-Reach USA.  We are in the midst of evolution in Embedded Computing Technology. Cheers!










Tuesday, January 7, 2014



January 2014, U-Reach USA attends Storage Visions to network with companies that

will create the next generation of hardware and software technology.