High Security Information Assurance · Seamless information assurance – from the time information...

28
Information Security beyond the Endpoint High Security Information Assurance

Transcript of High Security Information Assurance · Seamless information assurance – from the time information...

Page 1: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

Information Security beyond the Endpoint

High Security Information Assurance

Page 2: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

1

In a world where information needs to be accessible from anywhere and at any time,

digital data carriers are of growing importance. The density of data stored on endpoint

devices such as Hard Disk Drives, USB-Sticks, SD-Cards, DVD or Blu-Ray has grown

exponentially over the past decade.

Information security at the endpoint plays a major role in today’s IT world – and endpoint

devices can be a source of major vulnerability for corporate IT. In recent years, governments

around the world have enacted legislation that requires protective measures for various types

of confidential personal information. Violations of these information security laws are no longer

treated as trivial offenses, but are punished with significant fines. In many cases, the most

costly punishment is the damage to a company’s reputation that results from a data security

breach.

Much of the information handled within organizations is considered to be corporate intellectual

property such as patents, business plans or financial statements. Even though this data is not

directly affected by customer confidentiality laws, a security breach can still have disastrous

consequences – what if competitive secrets fall into the hands of the competition? After all,

knowledge is power – and companies need to be able to control their privileged information.

A Pioneer in Information Assurance

AccessControl

Network Security

Page 3: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

2

A fast-changing market has evolved to address the needs of

protecting information at the endpoint. When dealing with

information assurance, IT leaders can choose from a large

variety of solutions like firewalls or access control systems as

they create their organization’s information security protocols.

But what happens when information has reached the end of its

useful life? How can information stored on endpoint devices be

deleted permanently and in accordance with existing information

assurance requirements? Many organizations do not fully answer

this question – and as a result, they are vulnerable in ways that

they may not fully comprehend.

In the field of endpoint data deletion, users of intimus products benefit

from an extensive pool of experience. Starting with data shredders

over 50 years ago, the intimus brand has grown to a complete range

of information assurance equipment. intimus – the Latin name for

a trustworthy confidant – says it all. Our longstanding relationships

with governments and global corporations enable our research and

development to stay one step ahead of legal requirements and

technical changes.

Enterprise Security Overview

PerimeterSecurity

StorageSecurity

Endpoint Security

www.intimus.com

Page 4: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

3

Identifying Perspectives Risk Matrix

Seamless information assurance – from the time

information is created to the day it is destroyed –

is mandatory from a legal standpoint and is

imperative for an organization to reach its goals.

Seamless information assurance is a

multifaceted and complex undertaking.

intimus consulting can help. We start by

making a comprehensive risk analysis.

It is essential to establish and understand

the status quo before offering any specific

recommendations for change.

The intimus risk matrix reveals the likelihood

of risk within an organization as well as the

consequences of a security breach.

Our intimus consulting team engages with our

clients to successfully manage these risks.

Frequent

Likely

Occasional

Remotely Imaginable

Unlikely

Very Unlikely

Dimension of Damage

How information flows through an enterprise:

Creation and collection

Day in, day out, a flood of information is processed

across the enterprise. Even though paper still is the

number one data carrier, electronic media such as

memory sticks or mobile communicators are rapidly

gaining share. Consequently, measures have to be

taken to prevent careless disposal of memos, faxes

or e-mail printouts, and to ensure secure handling

procedures for electronic media.

Usage, processing and storage

Once recorded, information is used, processed,

and stored in several ways. First and foremost, it

is necessary to clearly prescribe the access rights

of individual departments and personnel at the

endpoint.

Deletion or disposal

After use, information has to be disposed of in a

manner compliant with security requirements. Even when information

is no longer required or valued by an organization, it can still be of

great use to third parties. Therefore, management needs to control the

process and must clearly stipulate the protocol for handling data after

it is no longer useful.

Inci

den

t R

isk

Marginal Compromising Critical Disastrous

Crypto

Page 5: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

4

intimus Security Principle

TOP SECRET level

CONFIDENTIAL level

RESTRICTED level

PERSONAL level

PUBLIC

...a Holistic Approach to Effective Information Assurance

Define and establish a concept of progressive security zones based

on the organizational levels and legal requirements:

Top secret level may include the executive suite, financing or engineering.

Confidential level may include sales, marketing or purchasing.

Restricted level may include all other areas that produce large amounts

of internal or external correspondence.

Personal level may include receptions or customer service areas.

Permanently and reliably prevent information from moving from

one level to a lower level.

Destroy information no longer needed inside the relevant security zone

in line with the specific security parameters of the zone itself.

www.intimusconsulting.com

Se

curity zones

SECURITY CONSULTING

Page 6: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

5

Crypto Levels by intimus...In keeping with the high-speed development of the IT world,

digital data carriers are becoming increasingly important.

50 years ago, most sensitive information was recorded only

on paper – today, a large and growing variety of digital

media present a new challenge in secure data disposal.

Governments around the world have been working to define

standards and guidelines regarding the secure deletion of

information on data carriers – and each individual nation is free

to enact its own legislation. Among the most influential new

international standards are the British Standard BS 8470:2006,

NSA / CSS and DIN 32 757, and the brand new European Union

standard, EN 15 713. Many countries worldwide use these

well-known standards as the basis for their own rules and

regulations.

In this new world of competing, conflicting information

assurance standards, where should an IT executive look

for reliable equipment and advice? This is where Crypto

Levels by intimus reside: with our experience and expertise

developed over 50 years in the business, we have formed a

concept that brings all major standards under one roof.

intimus Crypto MatrixCrypto Level 8 9 10 11Hard Copy Storage < 10 mm² < 5 mm² < 3.5 mm² < 1 mm²

European Standard EN 15 713

DIN 32 757

BS 8470:2006

NSA/CSS 02-01

NIST Special Publication 800-88

NATO SDIP-293

Optical Media < 10 mm² < 5 mm² < 3.5 mm² < 1 mm²

European Standard EN 15 713

DIN 32 757

BS 8470:2006

NSA/CSS 04-02

NIST Special Publication 800-88

NATO SDIP-293

Magnetic Media Tape < 2,800 oe > 2,800 oe Physical Physical HDD < 5,000 oe > 5,000 oe Destruction Destruction

DIN 33 858

European Standard EN 15 713

BS 8470:2006

NSA/CSS

NIST Special Publication 800-88

NATO SDIP-293

Solid State Media < 10 mm² < 5 mm² < 3.5 mm² < 1 mm²

European Standard EN 15 713

BS 8470:2006

NSA/CSS 02-01

NIST Special Publication 800-88

NATO SDIP-293

meets the standard exceeds the standard

Page 7: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

6

...for Secret and Top Secret Requirements

British Standard BS 8470:2006

BS 8470:2006 gives recommendations for the management

and control of collection, transportation and destruction of

confidential material to ensure that such material is disposed

of securely and safely. The recommendations apply to a

company’s main business premises and any holding sites.

Particle surface: < 10 mm²

DIN 33 858

This German standard refers to the erasure of data stored

on magnetic media. It defines the minimum requirements

for erasing devices and gives guidelines for the field strength

that needs to be used according to the type of data carrier

being destroyed. This field strength ranges from 350 up

to 5,000 Oe on three levels.

NATO SDIP-293

Within the military alliance of NATO this standard gives rules

for destruction of obsolete media. These items are split up into

paper and non-paper material. Main methods for destruction

are shredding, burning, disintegrating, smelting or degaussing.

Particle surface paper shredding: 5 mm²

NSA/CSS Specification 02-01

To protect national security, military and government

agencies the U.S. National Security Agency (NSA) released

a standard for paper shredders in 2003. NSA/CSS Specification

02-01 outlines the required shred size for document paper

cross cut shredders for government agencies disposing of

Top Secret or classified documents.

Particle surface: < 5 mm²

NIST Special Publication 800-88

While NSA / CSS gives rules for U.S. military or government

agencies, this publication released in 2006 gives guidelines

for media sanitization in U.S. commercial organizations.

Unlike most of the other standards it covers a large scope

of media primarily split into two groups: Hard copy and

electronic. The guideline deals with the trends in data storage

media and how the information can be deleted efficiently

by means of shredding, disintegration, pulverization or even

incineration.

Particle surface shredding: 5 mm²

European Standard EN 15 713

Released in 2009, this regulation now sets a European

standard for information assurance. Replacing the former

DIN 32 757 and BS 8470:2006, it defines requirements for

mechanical secure destruction of confidential material in

8 security levels. High security data destruction happens

at level 8 with a particle size of in average 10 mm² and

a maximum width of 0.8 mm.

Particle surface: < 10 mm²

DIN 32 757-1

For almost 30 years the internationally recognised DIN was

the guideline for data security. In total it defined 5 security

levels. The top level 5 specified a maximum particle size

of 10 square millimeters for indecipherable shredding of

obsolete data storage media. This equals over 6,000

individual particles for one sheet of A4 format paper.

DIN 32 757-1 does not adress optical media destruction.

www.intimus.comwww.intimus.com

Page 8: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

7

Content

Intimus security principle

Handling of sensitive information

implies a certain risk in case of

data loss or theft.

intimus security principle offers

a holistic approach to this problem.

Pages 3 - 4

International standards

and regulations

Dealing with information assurance

always means dealing with various

international standards and

regulations, too.

Crypto Levels by intimus

offer a guideline through this topic.

Pages 5 - 6

Magnetic Media

Video Cassettes,

Carbon Tapes,

Hard Disk Drives,

ZIP, DAT, DLT

Degausser, Crusher,

Pages 11 - 12

Secure Erase

Pages 13 - 14

Hard Copy Media

Documents in

small volume

and in high volume

or oversize

Document Shredder

Pages 15 - 20

High Volume Shredder

Pages 21 - 22

Solid State Media

Compact Flash,

SD, USB-Memory Sticks,

EPROM, Routers

Disintegrator

Pages 23 - 24

Dual Shaft Disintegrator

Pages 25 - 26

...for a full list of media, please visit our website www.intimus.com/crypto

Optical Media

CD / DVD, Blu-Ray

Data Grinder

Pages 9 - 10

www.intimus.com

Page 9: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

8

Typical Destruction Methods for Different Types of Media

Ripp

ing,

M

anua

l Cut

ting

Pape

r Shr

eddi

ngSt

rip c

ut

Pape

r Shr

eddi

ngCr

oss

cut /

Lev

el 6

Pape

r Shr

eddi

ngCr

oss

cut /

Lev

el 7

Pape

r Shr

eddi

ngCr

oss

cut /

Lev

el 8

-10

Scra

tchi

ng

Bend

ing,

Br

eaki

ng

CD S

hred

ding

Cros

s cu

t / L

evel

3

CD S

hred

ding

Cros

s cu

t / L

evel

4

CD S

hred

ding

Cros

s cu

t / L

evel

5

CD D

ata

Grin

ding

Mec

hani

cal

Defo

rmat

ion

Drill

ing

Hole

sM

anua

l Cut

ting

HDD

Crus

hing

HDD

Shre

ddin

g

HDD

Disi

nteg

ratio

n

Dega

ussi

ng /

8000

Gau

ss

Dega

ussi

ng /

9000

Gau

ss

Dega

ussi

ng /

8000

Gau

ss

+ H

DD C

rush

ing

Dega

ussi

ng /

9000

Gau

ss

+ H

DD C

rush

ing

Dega

ussi

ng /

8000

Gau

ss

+ H

DD S

hred

ding

Dega

ussi

ng /

9000

Gau

ss

+ H

DD S

hred

ding

Dega

ussi

ng /

8000

Gau

ss

+ H

DD D

isin

tegr

atio

n

Dega

ussi

ng /

9000

Gau

ss

+ H

DD D

isin

tegr

atio

n

Secu

re E

rase

Pow

er S

hred

ding

Strip

cut

Pow

er S

hred

ding

Cros

s cu

t 6

Pow

er S

hred

ding

Cros

s cu

t 7Po

wer

Shr

eddi

ngCr

oss

cut 8

-10

Disi

nteg

ratio

nLa

rge

Scre

en m

ax. 5

mm

Disi

nteg

ratio

nSm

all S

cree

n m

ax. 3

mm

Top Secret

Confidential

Restricted

Personal

Public

Top Secret

Confidential

Restricted

Personal

Public

Top Secret

Confidential

Restricted

Personal

Public

Top Secret

Confidential

Restricted

Personal

Public

Top Secret

Confidential

Restricted

Personal

Public

Top Secret

Confidential

Restricted

Personal

Public

Ty

pes

of M

edia

Sol

id S

tate

So

lid S

tate

Ha

rd C

opy

M

agne

tic

Mag

netic

Op

tical

Ca

rds

HD

D

Tape

s

HDD

Method of destruction

= insufficent

= may not be sufficient

= sufficient

Page 10: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

9

Security is essential.

During 2007, 26 billion pieces of optical media (CDs, DVDs and Blu-Ray discs) were

sold worldwide – with an average annual sales increase of approximately 10%. They are

currently the most frequently used media for portable and cost-effective information storage.

Unfortunately, these features – portability, low cost –

that offer such advantages to the user can also lead

to abuse and data theft when these devices reach

their final end-of-life destination. A single disc falling

into the wrong hands could betray state secrets or

damage a company’s prospects for years to come.

The biggest information assurance challenge from

optical media is that the information layers on the disc need to be thoroughly removed.

It’s not good enough to throw away a disc or scratch the surface – only a machine like the

intimus 005S grinds all information layers beyond the point of forensic recovery – thus

ensuring the highest level of information security. The U.S. guidelines for media sanitization

specify grinding as the only sufficient optical media destruction method – and intimus

provides this added degree of safety.

intimus 005S

• Fast, safe and complete erasure

• Simple one-button operation

• Suitable for CD, DVD and Blu-Ray Disks

• NSA-approved security level

• Matching NIST SP guidelines 800-88

• DVD-Splitter included

Optical Media Destruction – Data Grinder

The DVD splitter is part of the standard equipment

CD/DVD/BD can be a cornucopia of information to anyone with a disc drive

The built-in evacuating system clears away the dust particles - keeping the office clean

Page 11: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

10

11CRYPTO

The intimus 005S deploys the patented DATAgrindTM technology which grinds the data layer

on any optical media down to 250 microns – beyond the point of forensic recovery.

In less than one minute, all data on a CD/DVD or Blu-Ray disc is eliminated completely and

permanently. All that remains is a fine dust that is collected by the built-in evacuation system.

Intimus 005S is flexible to use and easy to operate. CDs and Blu-Rays can be processed in only

one step. DVDs need to be split before the data destruction and are processed in two steps.

After grinding, the remains of the discs are recyclable as Polycarbonate.

CRYPTO LEVEL 11

Model intimus 005S

Size of shreds Dust

Grinding depth microns 250

Operation time per disc sec. < 18

Power supply Volts 230

Dimensions L/W/H approx. cm 26/23/11

Weight approx. kg 2.5

Destruction Beyond Forensic Recovery

www.intimus.com

Exceeds DIN and NSA StandardsExceeds DIN and NSA Standards

Page 12: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

11

Digital storage needs maximum protection.

With high storage capacities and many different types of information stored together,

digital media are vulnerable to all kinds of abuse. Modern hard disk drives or magnetic

storage tapes such as LTO or QIC can contain

millions of written pages, together with other confidential

information like pictures, films, financial calculations or

banking data. All of this information is typically secured

during use. But after the information is no longer in use,

merely deleting all the files does not solve the problem.

Most deleted information can easily be restored. Spot tests

made on disposed computers and hard disk drives showed

that more than 80% of all tested hard disk drives had never

been deleted and still contained personal data – and worse,

roughly 50% of this data was hazardous.

Information Destruction on Hard Disk Drives – Degausser

intimus 1000The intimus 1000 physically

destroys hard drives by bending, breaking and mangling the hard

drive and its internal components including data platters.

intimus 9000

• Fast, safe and complete erasure in only one go

• Push button or auto-operation with door activated auto feed

• PCS (Pulse Confirmation System) – audio and visual verification of degauss

• Continuous duty, no cooling cycles necessary

• Clear indication of the operating status with indicator lights and sounds

• Portable with two integrated handles

• Very low magnetic influence to surrounding area

• Meets German standard DIN 33 858 for degaussers

intimus 8000With its compact dimensions,

quiet operation and a 60 second cycle time, the intimus 8000 can fit

right on a desktop.

Short duty cycles, user-friendly operation and continuous mode offer widespread solutions for different security needs.

Page 13: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

12

intimus degaussers rely on APT (Advanced Pulse TechnologyTM). During

the erase an effective quick burst generates a strong and powerful pulse.

This results in 90% lower energy consumption compared to other models.

At the same time they produce an erasing field many times stronger than those

produced by the read/write heads in hard drives and tape drives. The field strength

of an intimus degausser destroys the magnetic structure and ensures that the data

are no longer recoverable by computer or laboratory attacks. Since the technology

does not rely on software, it will also completely and permanently erase failed and

damaged hard drives regardless of the operating system or interface.

Built-in safeguards check the stored power before each erase cycle, ensuring

complete erasure every time. A field strength meter, audible tones and lighted

push buttons report the status of the degausser to the user.

CRYPTO LEVEL 7 8

Model intimus 8000 intimus 9000

Media Hard disk drives up to 25 mm Hard disk drives up to 42 mm Standard and laptop drives Standard and laptop drives Tape cartridges incl. DLT, LTO, Tape cartridges incl. DLT, LTO, QIC, 3590, 8 mm and more QIC, 3590, 8 mm and more

Media size / erasing area size 171/114/25 mm 71/114/42 mm

Degausser system Capacitive discharge Capacitive discharge

Duty cycle 60 sec. Continuous duty

Magnetic field 8,000 Oe, 0.8 Tesla 9,000 Oe, 0.9 Tesla

Erasing time depending on user interaction min 60 sec. min 12 sec.

Power consumption (at 230V) Standby 0.2 A / Standby 0.2 A / charging 4.0 A / erase 0.5 A charging 7.0 A / erase 0.5 A

Dimensions in operating position L/W /H 31 x 45 x 19 cm 31 x 58 x 48 cm

Weight approx. 19 kg approx. 38 kg

Technical changes and color variances reserved.

Complete and Permanent Erasure of Information

www.intimus.com

Meets NIST Standard

View through Magnetic Force Microscopeleft = before, right = after degaussing

8CRYPTO

7 CRYPTO

Page 14: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

13

Information Erasure on Hard Disk Drives – Secure Erase

Maximum productivity: Process up to 4 drives simultaneously (2 x SATA, 2 x PATA)

intimus Hammer SE

• Destroys all data on up to four PATA/SATA hard drives simultaneously without destroying the drive

• Hard drives may be re-used - promoting better environmental stewardship

• Verifies that the data has been removed

• Generates a stored or printed audit trail

• Wipes and clones drives in a single operation

• Useable as a stand-alone device or in connection with any standard PC (via USB)

• Portable, stand-alone device delivers additional functionality when used with the CPR Toolbox software application (included).

Developed by hard disk drive (HDD) manufacturers,

firmware-based Secure Erase is a standard technology

embedded in most ATA/SATA hard drives.

When activating this command with intimus Hammer SE,

the HDD is completely purged back to the original status, with

all data eliminated. While the command is implemented, the

HDD is assigned a random password that locks the drive down.

It will not unlock until the Secure Erase procedure is complete.

The intimus Hammer SE is faster, more secure, and far more

energy-efficient than any software overwriting solution.

The National Institute of Standards and Technology (NIST) has established new standards

for electronic media sanitization that ranks Secure Erase, like degaussing, at the highest

security level that does not involve actual physical destruction.

Page 15: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

14

8CRYPTO

The intimus Hammer SE implements firmware-based erasure

command to completely purge all data from parallel ATA (PATA)

and serial ATA (SATA) hard drives.

This easy to use, one-step device connects to up to four hard drives

via standard cables and erases data at speeds up to 4.0 GB per minute.

For onsite data purging, the

compact, portable product

operates as a stand-alone device...

or connect to the CPR Toolbox

software utility (included) for

additional functionality.

CRYPTO LEVEL 8

Model intimus Hammer SE

Drive interfaces Parallel ATA (PATA) Serial ATA (SATA)

Host interface USB 2.0

Max. transfer rate up to 4.0 GB / minute

Input voltage + 12 VDC

Max. input current 3.5 A

Voltage to drives + 12 VDC, 5+ VDC

Device addressing support 28 bit & 48 bit supported

Max. transfer mode UDMA mode 4

Supported devices ATA 4 through ATA 7

Dimensions L/W/H 10.5 x 10.6 x 3.6 cm

Weight approx. 0.3 kg

Digital Shredding – Ready for Re-use

www.intimus.com

Meets NIST Standard

Page 16: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

15

High Security Paper Shredding – at the Deskside

When high security paper documents

are no longer needed:

When selecting a shredder, you need to

consider where it will be used. The highest

level of data protection for high security

documents such as patents, business plans or

financial statements can only be guaranteed

when the machines needed for document

disposal are within reach of the user.

This category of high security shredders offers deskside machines

for one or up to 5 users.

These shredders are engineered for high security shredding capability,

while also offering a user-friendly design and low noise level. Users can

shred documents quietly without disturbing the work of others nearby.

Clearly arranged controls for maximum ease of use

Strategy papers, technical drawings, contracts – perfectly

destroyed next to the desk

intimus 302 HS, 302 SF, 402 HS

• Low noise level

• Automatic start/stop with light barrier

• Auto-stop and reverse key for quick elimination of paper jams

• Illuminated indicators for standby, basket full, door open and paper jam

• Electronics equipped with microcontroller

• 402 HS: Mounted on rollers for flexible use

402 HS WB

• Equipped with extra large basket

intimus 502 HS, 502 MHS, 502 SF

• Automatic start/stop with light barrier – “M” model is operated manually with a multifunction key

• Auto-reverse and reverse key for quick elimination of paper jams

• Illuminated indicators for standby, basket full, door open and paper jam

• Electronics equipped with microcontroller

• Sealed, dust-free design – castors for portable use

Page 17: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

16

8CRYPTO

9CRYPTO

Highly functional, reliable and technically advanced –

peak performance thanks to leading technology.

Data shredders are distinguished by their feed characteristics and

by the geometry of their cutting cylinders. Both of these factors are

absolutely essential for good performance.

At the heart of a high security cutting block, the cutting cylinders

interact with other high precision components and represent the basic

core of the data shredder.

Each cutting cylinder is equipped with hundreds of precision-ground

special cutters. A shredder with a High Security cutting system

shreds a single sheet of A4 format paper into nearly 6,500 pieces.

Confidential Information Destroyed Within Reach

CRYPTO LEVEL 8 8 8 9 9

Model intimus 302 HS 402 HS 502 HS 302 SF 502 SF

402 HS WB 502 MHS

Size of shreds mm 0.8 x 12 0.8 x 12 0.8 x 12 0.8 x 4.5 0.8 x 4.5

Shredding capacity 70 g/m² * sheets 5-6 5-6 8-10 3-4 5-6 Cutting speed 70 g/m² ** m/sec. - sheets/min. 0.1 - 121 0.1 - 121 0.15 - 283 0.1 - 81 0.14 - 170

Shredding capacity 80 g/m² * sheets 4-5 4-5 7-9 3-4 4-6 Cutting speed 80 g/m² ** m/sec. - sheets/min. 0.1 - 101 0.1 - 121 0.14 - 255 0.1 - 81 0.14 - 170

Working width / Paper format mm / DIN 240 / A4 240 / A4 260 / A4 240 / A4 260 / A4

Catch basket volume l 32 37 / WB55 65 32 65

Power consumption / Power supply kW / Volts 0.55 / 230 0.55 / 230 1.1 / 230 0.55 / 230 1.1 / 230

Noise level db (A) 52 52 56 52 56

Dimensions L/W/H approx. cm 39/28/64 39/28/74 49/38/87 39/28/64 49/38/87 WB 39/35/82

Weight approx. kg 20 21 / WB 25 43 20 43 * based on DIN A4 paper. Sheet capacities vary depending on quality, weight, grain of paper and sufficient power supply. It may be lower if the voltage is below the rated/nominal value. ** theoretical average sheets per minute. www.intimus.com

Meets DIN Level 5 Exceeds DIN Level 5 / Meets NSA Level

Page 18: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

17

intimus 602 HS, 602 SF, 007 SX, 702 SF

• Automatic start/stop with light barrier

• Auto-reverse and reverse key for quick elimination of paper jams

• Illuminated indicators for - standby, - basket full, - door open - and paper jam

• Electronics equipped with microcontroller

• Sealed, dust-free design – castors for portable use

intimus 007 SE, 007 SF

• Automatic start/stop with light barrier – 007 SE manual, with multi-function button

• Auto-reverse and reverse key for quick elimination of paper jams

• Illuminated indicators for - standby, - basket full, - door open - and paper jam

• Electronics equipped with microcontroller – except 007 SE

• Mobile, sealed, dust-free cabinet

High Security Paper Shredding – at the Department

Maximum security combined with high capacity.

More than 40 years ago, the lengendary intimus 007

was born. The name is the clue to its functionality:

a data shredder which fulfills the increasingly complex

security requirements of governments and military agencies,

as well as R&D departments in all industrial sectors.

Still today, intimus 007 shredders can be considered

the standard for high security shredding around the world.

In an ever-changing, ever-more-competitive marketplace,

high security shredders need to do more than just reduce

printed documents into illegible pieces. They must also

demonstrate economical performance characteristics, and must be easy to use.

The most important performance characteristics include cutting capacity and

working width.

For this reason, intimus high security shredders are available in sizes to fit

departmental requirements, meaning they offer performance in sheet capacity

and are fit for centralized use.

Large paper tray can be folded away

to save space

Business Plans, Customer Profiles, Personnel Files – can be securely destroyed with a reliable department shredder

Page 19: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

18

8CRYPTO

9CRYPTO

intimus 007 SE, 007 SF

• Automatic start/stop with light barrier – 007 SE manual, with multi-function button

• Auto-reverse and reverse key for quick elimination of paper jams

• Illuminated indicators for - standby, - basket full, - door open - and paper jam

• Electronics equipped with microcontroller – except 007 SE

• Mobile, sealed, dust-free cabinet

Professional Security for Larger Volumes and Sizes

CRYPTO LEVEL 8 8 8 9 9 9

Model intimus 602 HS 007 SX 007 SE 602 SF 702 SF 007 SF

Size of shreds mm 0.8 x 12 0.8 x 12 0.7 x 9.5 0.8 x 4.5 0.8 x 4.5 0.8 x 4.5

Shredding capacity 70 g/m² * sheets 8-10 15-17 12-14 5-6 8-10 8-10 Cutting speed 70 g/m² ** m/sec. - sheets/min. 0.14 - 283 0.15 - 515 0.23 - 651 0.14 - 170 0.23 - 465 0.23 - 465

Shredding capacity 80 g/m² * sheets 7-9 13 - 15 10-12 4-5 7-9 7-9 Cutting speed 80 g/m² ** m/sec. - sheets/min. 0.14 - 255 0.15 - 455 0.23 - 558 0.14 - 141 0.23 - 418 0.23 - 418

Working width / Paper format mm / DIN 405 / A3 405 / A3 300 / A3 405 / A3 405 / A3 300 / A3

Catch basket volume l 130 135 175 130 175 175

Power consumption / Power supply kW / Volts 1.1 / 230 1.9 / 230 1.9 / 230 1.1 / 230 1.9 / 230 1.9 / 230

Noise level db (A) 54 60 70 54 52 70

Dimensions L/W/H approx. cm 66/43/102 66/50/102 70/55/112 66/43/102 66/56/105 70/55/112

Weight approx. kg 60 91 142 54 90 142 * based on DIN A4 paper. Sheet capacities vary depending on quality, weight, grain of paper and sufficient power supply. It may be lower if the voltage is below the rated/nominal value. ** theoretical average sheets per minute.

www.intimus.com

The cutting cylinders of intimus high security data

shredders are equipped with hundreds of precision-

ground special cutters. A shredder with an SF-cutting

system shreds a single sheet of paper into more than

17,000 individual pieces.

Each cutting cylinder is the outcome of a highly advanced

engineering and production process. Two plain pieces of

special quality steel are turned into a pair of highly precise

cutting cylinders interacting with each other like Swiss

clockwork. Once the precision level is guaranteed, the

process of production is finalized with a hardening process

that makes the cylinders resistant against the wear and

tear of many years in operation.

Meets DIN Level 5 Exceeds DIN Level 5 / Meets NSA Level

Page 20: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

19

intimus 007 SL

• Automatic start/stop with light barrier

• Auto-reverse and reverse key for quick elimination of paper jams

• Illuminated indicators for - standby, - basket full, - door open - and paper jam

• Electronics equipped with microcontroller

• Mobile, sealed, dust-free cabinet

Top Secret Level Paper Shredding

The “chaotic cut”: Thousands of illegible

particles irregular in size

Keeps Top Secret correspondence from getting into the wrong hands

The first shredder that exceeded the latest NSA standard

when it was released in 2003 was the intimus 007 SL.

Driven by the US standard and with the future in mind, Martin Yale

focused on how to develop cutting technologies that even exceeded

the NSA requirements. With impressive results: while standard

technologies would shred one piece of DIN A4 paper into 6,000 to

17,000 pieces, the intimus 007 SL tears it into up to 30,000 pieces.

With its unique performance, its low noise operation level and what

is called its 3CT (3-Cylinder-Technology), the 007 SL is in a class of its own: three cutting cylinders

(instead of only two) cut the paper into tiny pieces only 1.5-5 mm in length.

Ever since this model was launched in 2003, it has become a trusted ally for clandestine

government services worldwide. No technology has been developed that can reconstruct a

document shredded by an intimus 007 SL.

Page 21: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

20

10CRYPTO

www.intimus.com

intimus 007 SL

• Automatic start/stop with light barrier

• Auto-reverse and reverse key for quick elimination of paper jams

• Illuminated indicators for - standby, - basket full, - door open - and paper jam

• Electronics equipped with microcontroller

• Mobile, sealed, dust-free cabinet

When the intimus 007 SL was first developed, the Martin Yale engineers were the

industry’s pioneers in looking for a shredder whose technology made it impossible to

recover a document once shredded.

It turned out that the key to success was to create shredded pieces that have a shape that brings

any software to its limit. Martin Yale’s insight was that the more irregularly-shaped the pieces are,

the less likely it is that they will be recoverable.

At this point 3CT (3-Cylinder-Technology) by intimus was born. During the shredding process

the document first runs through the first pair of cutting cylinders. After that it is led towards the

second cut. This results in particles with variable lengths between 1.5 up to 5 mm.

This is the only way to guarantee a lasting “unrecoverable” result, even after many

years of use.

For Ultimate Paper Security

CRYPTO LEVEL 10

Model intimus 007 SL

Size of shreds mm 0.65 x 1.5-5

Shredding capacity 70 g/m² * sheets 10-12 Cutting speed 70 g/m² ** m/sec. - sheets/min. 0.1 - 242

Shredding capacity 80 g/m² * sheets 9-10 Cutting speed 80 g/m² ** m/sec. - sheets/min. 0.1 - 202

Working width / Paper format mm / DIN 300 / A3

Catch basket volume l 175

Power consumption / Power supply kW / Volts 2.0 / 230

Noise level db (A) 70

Dimensions L/W/H approx. cm 70/55/112

Weight approx. kg 170 * based on DIN A4 paper. Sheet capacities vary depending on quality, weight, grain of paper and sufficient power supply. It may be lower if the voltage is below the rated/nominal value. ** theoretical average sheets per minute.

Exceeds DIN Level 5 and NSA Standard

Page 22: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

21

intimus VZ 14.00/5

• Two steps in one run: conveyor belt connects the pre- and after shredder

• 8 ton baler compresses particles into compact bales

• Audible “bale completed” signal

• Push-button ejection of the bale - directly into an environmentally compatible plastic sack

High Security Paper Shredding – Large-scale Systems

The feeding section work table offers a comfortable width for undisturbed shredding work

Seamless data protection is (now) child’s play.

When high volumes peak, adequate shredding capacity

must be available to enable fast and efficient disposal

of medical records, personnel files or court records that

are no longer required. Shredders that are too weak

or too slow cost valuable time and make shredding a

tedious, disliked job - thus harboring the risk of sensitive

documents being disposed of intact out of convenience.

Sheet capacity and cutting speed are inadequate

yardsticks to measure the effectiveness of large-scale shredders. What needs to be

considered when dealing with large-scale systems is the necessary throughput

volume in kg/hour. This can easily be determined from the weight of the

documents to be shredded every day combined with the time frame

envisioned for shredding.

For improved working conditions. Dust is inevitably generated when shredding paper. The dust extractor removes dust at the critical points to prevent it from escaping into the ambient air (This is an optional feature).

Page 23: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

22

8CRYPTO

8CRYPTO

Top Secret Shredding in High Volume

The VZ 14.00/5 Shredder/Baler Combination is an intimus®POWER heavy duty shredder

that fulfills top security standards.

Comprising a pre-shredder of 6 x 50 mm cutting width followed by a cross-cut shredder of 2 x 4.5 mm

cutting width, an hourly output of up to approx. 150 kg is achieved (depending on feed rate and material

to be shredded).

Once pre-shredded, the material drops straight onto a conveyor belt and is transported along the shortest

route to the follow-up security shredding system. Only this combination of pre- and after-shredder makes

such a high throughput at a top security level possible.

The 2 x 4.5 mm cutting system guarantees compliance with EN 15 713 security level 7 – thanks to the

subsequent compaction of the fine shreds in the integrated bale press, it is even possible to meet the

requirements of security level 8.

left = Paperright = Banknotes

CRYPTO LEVEL 8

Model intimus VZ 14.00/5

Size of shreds mm 2 x 4.5

Shredding capacity 70 g/m² * sheets 90-100 kg/h 150

Shredding capacity 80 g/m² * sheets 80-90 kg/h 150

Cutting speed** m/sec. 0.24

Working width / Paper format mm / DIN 500 / A2

Motor power / Power supply kW / Volts 11.3 / 400

Noise level db (A) 74

Dimensions L/W/H approx. cm 288, 348 open/120/155

Weight approx. kg 1,370 * based on DIN A4 paper. Sheet capacities vary depending on quality, weight, grain of paper and sufficient power supply. It may be lower if the voltage is below the rated/nominal value. ** theoretical average per minute.

www.intimus.com

Meets DIN Level 5 and NSA Standard

Page 24: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

23

intimus Disintegrators

• Large and solid bearings, externally mounted

• Wide opening milling chamber for perfect access to all knives and fast and convenient adjustment or exchange of knives

• Easy access to the milling chamber, can be opened without tools, easy to clean, secured with safety interlock

Rack

• Equipped with a feed tunnel from sheet steel with sound insulation, two rubber curtains, and two fixed and two guide rollers for easy transportation. Guide rollers are lockable. Belt guard from sheet steel.

Large-scale Data Destruction Systems – Disintegration

High volume technology, proven for decades, is the basis

of the intimus®POWER Disintegrators.

For secure destruction of bank notes, paper and other types of media,

you need carefully adapted machines with specially designed rotors

and cutting geometries. This ensures efficient feeding and maximum

throughput with these delicate materials – saving time and effort.

Via a screen, the particles leave the cutting chamber towards a hopper

and are evacuated from there. By simply installing a screen with a

different mesh size, the shred size of the machine can be easily

adapted to the respective demand.

All intimus®POWER Disintegrators can be equipped with an optional sound enclosure.

The clean-cut box from painted sheet steel is equipped on the inside with special padding

and provides for reduction of the sound level during operation to approx. 80 db(A).

Wide front doors enable convenient access for service and maintenance work.

Large bundles of hard copy storage, cell phones or Floppy disks enter the disintegrator via the feed tunnel...

...clean collection of disintegrated material in the hopper

The screen mesh diameter determines the level of security, ranging from 2 up to 20 mm

Page 25: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

24

9CRYPTO

8CRYPTO

The rotors of intimus®POWER Disintegrators are CNC-milled from solid stock.

They are optimized for processing of massive piles of material like bank note bundles and

wrappers or thick stacks of printed sheets by use of specially designed bolted knives.

All of our disintegrators use the unique “Diagonal Cut” technology, which offers advantages

over other knife layouts. Benefits include: automatic feeding by the knives themselves,

smooth operation, minimum dust content of the mill charge and very low power consumption.

The rotor knives do not need to be adjusted and are simply fixed adjacent to the bed stop.

By positioning the two solid knives, the accurate gap between rotating and solid knives

is adjusted. All knives are made from tooling steel, hardened, long-lived and can be easily

re-sharpened multiple times with no need for special appliances.

CRYPTO LEVEL 8 / 9

Model intimus Disintegrators 9 Models

Throughput kg/h at 4 mm 50 up to 1,250

Feed opening size mm 130 up to 1,270

Screen size mm 4 standard / option 2 up to 20

Power consumption kW 1.5 up to 75

Power supply Volts 230/50 1PH / 400/50 3 PH

Number of blades rotor / bed 3 up to 5 / 2

Knife layout single plus dual “Diagonal Cut“

Noise level db (A) < 80

Dimensions L/W/H approx. cm 79/64/125 up to 254/125/348

Weight approx. kg 230 up to 4,100

Perfect Result and Top Performance

www.intimus.com

left = 4 mm / Floppy disk right = 2 mm / Paper

Meets DIN Level 5 and NSA Standard

Page 26: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

25

intimus Dual Shaft Disintegrators

• Processes common 2.5”, 3.5” and 5.25” HDD, video cassettes, carbon tapes, printed circuit boards, CD-ROM, DDS and DLT tapes to 30 mm wide pieces

• Fully automatic function control

• Convenient collection of the shreds in a commercial wheelie bin (not included)

• Maximum operational safety through limit switch at the door and top cover

Destruction of Optical and Magnetic Media – Dual Shaft Disintegrator

The past decade has been a time of dramatic change in the quality and capacity

of data storage media.

The new world of cheap, high-capacity and ever-present data storage devices has completely

transformed the world of information assurance and poses new challenges to organizations

seeking to handle their data in a safe and secure manner. Incredibly enough, the quantity of

data storage media is still increasing. As “old” methods of data storage become obsolete

(within an ever-shorter time frame), organizations find themselves faced with obsolete hard

drives, outdated computers, printers and other equipment that has outlived its usefulness,

but that still poses a risk.

Data storage devices have the potential to become “information bombs” once they become

obsolete. The easiest way to manage secure, fast, economic destruction with an easy visual

proof for the successful completion of the destruction process is shredding the HDDs or other

media to pieces. For ultra-sensitive data in industry and government, the highest security

requirements apply. The main goal of security requirements in this area is to avoid any

recovery of the data.

The unique intimus Dual Shaft Disintegrator allows for granulating of up to

approximately 22 to 50 HDD of 3.5” size per hour to tiny granules with 10, 8

or even only 6 mm chip size (according to the installed screen). This machine

is unmatched so far and is in high demand from secret services and

government agencies that require the highest level of security.

Page 27: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

26

8CRYPTO

9CRYPTO

CRYPTO LEVEL 8 / 9

Model intimus Dual Shaft Disintegrator

Size of shred mm 6, 8 or 10 mm depending on screen size

Capacity per hour approx. 22 units 3.5” HDD at 6 mm

Cutting zone mm 380 x 500

Motor Power / Power Supply kW / Volts 4.0 / 400

Control Moeller easy 512 PLC

Noise level db (A) 82

Dimensions L/W/H approx. cm 130/130/208

Weight approx. kg 1,060

www.intimus.com

Using the unique Hybrid Technology, the intimus dual shaft disintegrator makes

perfect use of both shredding and disintegration.

Designed for industrial applications, the shredding section is equipped with 30 mm wide knives

from special tool steel and a robust electric geared drive. Knives are hardened to special specification

and use a special geometry to provide for perfect processing of HDD and other media. Via the feeding

slot located in the top cover, media can be continuously fed to the cutting block.

Once shredded, the remaining particles run through the installed disintegration screen enabling the

system to offer a practical throughput of 22 to 50 HDD per hour at low wear and energy consumption.

As with the regular Single Shaft Disintegrators, users have the option of installing a screen with a

different mesh size to adapt the final granule size to the required demand. As a standard, mesh sizes

of 6, 8 or 10 mm are available.

Top Security and Maximum Performance

Meets DIN Level 5 and NSA Standard

Page 28: High Security Information Assurance · Seamless information assurance – from the time information is created to the day it is destroyed – is mandatory from a legal standpoint

90269 - Issue 5/2010

Consulting, sales and servicefrom your dealer:

High Security Information AssuranceProfessional Data Shredders

Large-scale Data Shredding SystemsSolution for sustainable Waste Management