SuperWiper Desktop 8 NVMe PCIE SSD Multiple Drive Eraser Unit
SuperWiper Desktop 8 NVMe PCIE SSD unit is a standalone, industrial, dedicated hardware for erasing NVMe SSD. The unit is extremely fast and secure, built with the latest hardware technology to achieve the most efficient drive erases, performing at a very high speed, with the ability to erase multiple drives at the same time . The unit supports many erase protocols and different digital storage devices such as NVMe SSD and USB3.0/3.1. The user can erase 8 NVMe SSD and 8 USB3.0/3.1 storage devices at the same time. Speed or erase can reach 200GB/min. The products does not use erase licensing scheme.
The SuperWiper® Desktop 8 NVMe Multi PCIE SSD unit is a standalone, industrial durable built, dedicated hardware to erasing 8 NVMe SSD at the same time in a very efficient way. The unit supports NVMe SSD and USB Flash drives. The unit is extremely fast and the speed of a read from NVMe SSD can reach 200 GB/min and Erase + Verify of NVMe SSD can reach 130GB/min.
The SuperWiper’s erase application is easy to use with touchscreen icons and supports many erase protocols, such as:
1) DoD 5220-22M (ECE) erase specification (with 7 writing passes and one verification pass).
2) DoD Lite 5220-22M (E) erase specification (with 3 writing passes and one verification pass).
3) Security Erase (for SATA drives).
4) Enhanced Security Erase (for SATA drives).
5) Sanitize (3 types to be used with SAS SSD).
6) “User” Defined Erase Settings
7) NVMe-Format/NVMe Secure Erase (for NVMe SSD).
The main difference between using a product with U.2 port (and with Extension cables) vs. using M.2 port and plugging the media directly to the port:
NVMe U.2 port is more versatile and can support three types of NVMe SSD: M.2, U.2, PCIE, while M.2 port is limited to M.2 SSD.
Using the U.2 Extension cables protects the port from overuse of plugging the SSD directly to the port and risking damaging the port. (It’s easy to replace an extension cable than a port!).
Competitors that use NVMe M.2 ports are limited with their supports (Only M.2), and forced to plug the media directly to the port.
U.2 extension cables are very durable and built with high quality, and they exhibit an extreme transfer rate of over 200GB/min.
SuperWiper Desktop 8 NVMe U.2 ports how to erase
Standalone, Secure, No License Scheme, Dedicated NVMe SSD data Eraser, Built with Extreme Performing Hardware, Heavy Duty, Easy to Use, Very Flexible UI. Standalone hardware gives the user consistent performances and is the most secure solution when in combination with Linux OS. No license scheme makes the solution cost-effective. Lifetime free s/w updates and supports. The units run 24/7, 365 days of the year, with no failure.
– Erase Drives using the following Erase Protocols:
– DoD 5220-22M (ECE) erase specification (with 7 writing passes and one pass of verification)
– DoD Lite 5220-22M (E) (3 writing passes and one pass of verification)
– Security Erase Protocol (for SATA drives)
– Enhanced Security Erase Protocol (for SATA drives)
– Sanitize (for SAS SSD – 3 Types)
– NVMe Secure Erase (for NVMe SSD – 3 Types)
– “User” Defined its Erase Settings
– Erase Bitlocker encrypted partitions.
– Hot Pluggable Ports: Each of the unit’s port is hot pluggable. When a session completes, the user can plug another drive and select it to run a new operation.
– Scripting: Easy Scripting can be set and used for a repeat operation.
– Reporting: Detailed logs for drive duplication and drive erase sessions.
– SQL Erase Database: A collection of the erase logs, erase certificates, and drive information.
– Easy export for logs and the database to a USB stick or share it over a network.
– Access/control the unit remotely.
– NIST compliance.
– R.2 ready with self calibration.
Example of an erase operation, or drive diagnostic: Utilize any of the unit’s ports to plug in a drive and run it in separate sessions. The user can plug 8 NVMe SSD and 8 USB drives and run 16 erase sessions at the same time!
Application Main Settings:
HPA/DCO Automatic Supports: The application has the ability to automatically open HPA and DCO areas and resize the drive to its full native capacity in order to erase any “hidden data” (HPA/DCO are special areas on the SATA drive that support this feature).
Bad Sectors Handling: The user can select to skip bad sectors/blocks or abort the operation when encountering bad sectors/blocks on the source drive.
Drives Detection Methods: The user can select to scan and detect connected drives in parallel, or scan and detect drives sequentially (it takes a longer time to detect, but it gives the user the ability to identify a bad port or a bad drive).
Application Updates: The application can easily be updated via a USB thumb drive and displays a special update application screen.
GUI: The application is designed with large, straightforward, easy-to-navigate icons. In a few clicks, the user can be up and running.
Application Main Operation:
Erase data from selected drives
Complete or Quick Format
HASH selected drives
Drive Erase Protocols:
DoD 5220-22M (ECE) Mode: It used seven passes/iterations to rewrite the drive and use the last 8th pass/iteration for complete verification.
DoD Lite 5220-22M (E) Mode: It used three passes/iterations to rewrite the drive and use the last 4th pass/iteration for complete verification.
Security Erase Mode: It uses the internal firmware of the drive to perform internal drive erases. The erase operation overwrites all the user’s data areas with binary zeroes. It is the most efficient operation and saves time from running the entire DoD erase with eight erase iterations. It has a built-in verification process (it is supported by SATA drives that MFG after the year 2000).
Enhanced Security Erase Mode: It is very similar to the Security Erase mode. It is the recommended erase mode for drives that are supported by this mode. The Enhanced Security Erase mode writes pre-determined data patterns (set by the manufacturer) to all the user’s data areas, including sectors that are no longer in use due to reallocation.
“User” Erase Mode: The user can define the erase parameters. (The final pattern of the data that will be written on the drive, the number of erase iterations, and the verification mode: none, complete, partial, all of which is randomly verified up to 10% of the areas on the drive).
Sanitize Erase Mode: Supported primarily by SAS SSD. There are three types:
Erase: It rewrites the media with a selected fill pattern (It is the same as a regular erase)
Block Erase: Similar to SATA Security Erase
“Crypto” Erase: The drive f/w encrypts the data and throws away the encryption key.
NVMe Erase Mode: Supported by NVMe SSD. There are three types:
NVMe Format: It is a low-level format
NVMe Security “Crypto” Erase: (for drives that support it) it fills the drive after the erase using random data, so the user cannot run an Erase Verify after the erase. It is similar to the “Crypto” Erase mode of Sanitize or Enhanced Security Erase.
NVMe Security User Erase (for drives that support it): It is the same as SATA Security Erase
NIST Compliance: Security Erase, Enhanced Security Erase, DoD erase, Sanitize, and NVMe erase protocols are all NIST 800-88 compliant. The “User” erase mode is NIST compliant only when the user enables the full verification option.
R.2 compliance: With the use of the unit’ port calibration utility.
Erase Drives with ATA passcode: The application will erase drives that are password protected with supplied passcode. The user must insert the passcode in the Security Erase setting before running the erase operation.
Erase SED Drives: The application will be able to erase drives that are password protected with supplied passcode. The user must insert the passcode in the “drive info screen” or use the default key printed on the drive.
Erase BitLocker Volume: Enable the user to open the volume before erase with the supplied passcode or the encryption file.
Erase Netapp/EMC drives formatted 520: Ability to reformat a drive back to 512 bytes per sector, erase the drive and reformat it back to 520 bytes per sector. (Also ability to update OEM f/w for some of those drives if the f/w file is available)
Important step ensuring drive erase is completed and needed for NIST certification.
Verification pass: Some erase protocols automatically include a verification pass.
Standalone verification: It can be used on drives that were previously erased by other method
Complete or Quick Drive Format:
Supported Formats: NTFS, FAT, exFAT, HFS+, EXT4.
Drive Diagnostics Operation:
Drive Diagnostics tests and S.M.A.R.T. drive tests: If the user intends to erase a drive for re-use purposes, it is recommended to run some “Health test” on the drive before the erase process. There are four available types of tests:
Read-Verify: Supported by all storage protocols.
Short Test (2-5 minutes): Scans random areas on the drive.
Extended Full Test (Can take hours): Scans the entire drive.
S.M.A.R.T attribute: Ability to Quickly “Weed out” bad drives using S.M.A.R.T. attributes.
HASH Operation: (Purpose/use of this operation is to calculate a HASH value on the erased drive and compare it to a known value based on the drive size as another way to verify erase).
Parallel HASH: Supports SHA1, MD5, SHA2.
HASH Segments: Calculate HASH on the part of a drive.
CPU threads: Enable this feature allows the application to optimize a parallel HASH calculation.
Logs and Erase Certification: The application generates extensive erase log files and erases certifications (option to save to NIST 800-88 format) that are easy to export to USB flash drives. The user can add his company logo to the erase certification and add additional info on the erase runs append to the certificate.
Log file naming: Options to select the log file name based on erasing date, drive serial and model, drive model and serial, media ID, and user input.
XML: Saves the SMART test before and after erasing.
SQL Log files Database: The user is able to manage the log files in one SQL database that can be easily exported.
Bad sectors locations save on the log file: with the use of some settings.
Labels: Printing labels for each erased drive, from the erase database of from the erase menu.
Method of Parallel Operations:
Multiple Session Operation:
Drive Detection Application Screen: All drives and storage devices connected to the unit will be scanned and displayed on a screen called “The Detection Screen”. The user can tap on each drive model to get detailed drive information on that drive, or to perform a specific operation on that drive (resizing, unlocking).Also, the user can select that drive to run a session.
Continuous Mode: The user can run continuous erase operations with multiple erase sessions with minimal speed degradation. Each storage device attached to the unit can be selected to run in independent erase sessions. Each erase session does run independently of each other and can run simultaneously to maximize the use of the machine. When an erase session is completed regardless of the status of the other running sessions, the user can replace that storage device with another one and start a new erase session – it is a continuous operation with minimal downtime.
Multiple Sessions Application Screen: All running sessions are displayed in one “Application Screen”. The “Application Screen” shows the name of the session, the operation of the session, the error or abortion flag, the progress completion bar, and the successful completion flag. The user can abort a session, tap on a session to monitor its real-time running progress, and get the specific detailed setting for that run. It is a straightforward way to view, navigate, and control the sessions.
For Erase Operation: The total erase time depends on the drive makes/model and size, and it does not matter how many drives are connected to the unit since the CPU of the unit is powerful, built-in with many cores and the SuperWiper application utilizes those cores efficiently!
The Unit’s User Configuration: This feature allows the administrator of the unit to set specific operations with specific settings and allows the user to secure it with a lock password (This feature needs to be requested at the time of purchasing the main unit – it is needed for security purposes).
Tasks Scripting: The user can create a script enable the application to run sequential and parallel operations. There are no limitations on the number of scripts and operations.
Language Supports: Easy to implement translations for new languages. (Korean and Chinese are supported).
Settings: The user can save its setting, load a saved setting, or tap on the default setting. Set time and day: The user can set the Date and Time. Warranty: One year on the main unit, not include cables and accessories Built-in the US: The units are built and tested in the US. Supplied:8 U.2 to M.2 NVMe adapters and 8 U.2 male to female extension cables.
Main Hardware Features:
Form Factor: Desktop style.
CPU: i9 Latest generation.
Display: 10″ touchscreen, color LCD display.
Hardware: Very high-quality, high performing components; some with military specifications.
OS: Linux Ubuntu 64 bit.
Security: Linux OS (Linux is less targeted by malware).
Dedicated Secure Unit: Erases and Formats storage devices (HDD, SSD, USB storage devices, and Multi Media Cards).
Storage controller: 8 Ports NVMe Storage Controller supporting NVMe interfaces with a maximum data rate of 250GB/min.
48bit LBA Addressing: Supports drives with sizes up to 256TB.
Supports Storage Protocols and Interfaces: NVMe, SATA, e-SATA enclosures, IDE, USB2.0, USB3.0, USB3.0, MMC, and M.2 (SATA).
Supports Form Factors: 3.5″, 2.5″, ZIF, 1.8″, Micro-SATA, Mini-SATA, and M.2 storage devices.
Erase Multi-Media Cards: Supports SD/CF/Memory Stick/microSD with the use of a Multi-Media Card reader via a USB port.
Main Native Ports:8 U.2 NVMe ports(supplied with 8 U.2 to M.2 Extension cables and 8 U.2 to M.2 Adapters), one e-SATA, 10 USB3.0/3.1 Power Characteristics:A universal auto switching(110/220v) 750W UL/CE/PSE power supply.