High Security Information Assurance · Seamless information assurance – from the time information...
Transcript of High Security Information Assurance · Seamless information assurance – from the time information...
Information Security beyond the Endpoint
High Security Information Assurance
1
In a world where information needs to be accessible from anywhere and at any time,
digital data carriers are of growing importance. The density of data stored on endpoint
devices such as Hard Disk Drives, USB-Sticks, SD-Cards, DVD or Blu-Ray has grown
exponentially over the past decade.
Information security at the endpoint plays a major role in today’s IT world – and endpoint
devices can be a source of major vulnerability for corporate IT. In recent years, governments
around the world have enacted legislation that requires protective measures for various types
of confidential personal information. Violations of these information security laws are no longer
treated as trivial offenses, but are punished with significant fines. In many cases, the most
costly punishment is the damage to a company’s reputation that results from a data security
breach.
Much of the information handled within organizations is considered to be corporate intellectual
property such as patents, business plans or financial statements. Even though this data is not
directly affected by customer confidentiality laws, a security breach can still have disastrous
consequences – what if competitive secrets fall into the hands of the competition? After all,
knowledge is power – and companies need to be able to control their privileged information.
A Pioneer in Information Assurance
AccessControl
Network Security
2
A fast-changing market has evolved to address the needs of
protecting information at the endpoint. When dealing with
information assurance, IT leaders can choose from a large
variety of solutions like firewalls or access control systems as
they create their organization’s information security protocols.
But what happens when information has reached the end of its
useful life? How can information stored on endpoint devices be
deleted permanently and in accordance with existing information
assurance requirements? Many organizations do not fully answer
this question – and as a result, they are vulnerable in ways that
they may not fully comprehend.
In the field of endpoint data deletion, users of intimus products benefit
from an extensive pool of experience. Starting with data shredders
over 50 years ago, the intimus brand has grown to a complete range
of information assurance equipment. intimus – the Latin name for
a trustworthy confidant – says it all. Our longstanding relationships
with governments and global corporations enable our research and
development to stay one step ahead of legal requirements and
technical changes.
Enterprise Security Overview
PerimeterSecurity
StorageSecurity
Endpoint Security
www.intimus.com
3
Identifying Perspectives Risk Matrix
Seamless information assurance – from the time
information is created to the day it is destroyed –
is mandatory from a legal standpoint and is
imperative for an organization to reach its goals.
Seamless information assurance is a
multifaceted and complex undertaking.
intimus consulting can help. We start by
making a comprehensive risk analysis.
It is essential to establish and understand
the status quo before offering any specific
recommendations for change.
The intimus risk matrix reveals the likelihood
of risk within an organization as well as the
consequences of a security breach.
Our intimus consulting team engages with our
clients to successfully manage these risks.
Frequent
Likely
Occasional
Remotely Imaginable
Unlikely
Very Unlikely
Dimension of Damage
How information flows through an enterprise:
Creation and collection
Day in, day out, a flood of information is processed
across the enterprise. Even though paper still is the
number one data carrier, electronic media such as
memory sticks or mobile communicators are rapidly
gaining share. Consequently, measures have to be
taken to prevent careless disposal of memos, faxes
or e-mail printouts, and to ensure secure handling
procedures for electronic media.
Usage, processing and storage
Once recorded, information is used, processed,
and stored in several ways. First and foremost, it
is necessary to clearly prescribe the access rights
of individual departments and personnel at the
endpoint.
Deletion or disposal
After use, information has to be disposed of in a
manner compliant with security requirements. Even when information
is no longer required or valued by an organization, it can still be of
great use to third parties. Therefore, management needs to control the
process and must clearly stipulate the protocol for handling data after
it is no longer useful.
Inci
den
t R
isk
Marginal Compromising Critical Disastrous
Crypto
4
intimus Security Principle
TOP SECRET level
CONFIDENTIAL level
RESTRICTED level
PERSONAL level
PUBLIC
...a Holistic Approach to Effective Information Assurance
Define and establish a concept of progressive security zones based
on the organizational levels and legal requirements:
Top secret level may include the executive suite, financing or engineering.
Confidential level may include sales, marketing or purchasing.
Restricted level may include all other areas that produce large amounts
of internal or external correspondence.
Personal level may include receptions or customer service areas.
Permanently and reliably prevent information from moving from
one level to a lower level.
Destroy information no longer needed inside the relevant security zone
in line with the specific security parameters of the zone itself.
www.intimusconsulting.com
Se
curity zones
SECURITY CONSULTING
5
Crypto Levels by intimus...In keeping with the high-speed development of the IT world,
digital data carriers are becoming increasingly important.
50 years ago, most sensitive information was recorded only
on paper – today, a large and growing variety of digital
media present a new challenge in secure data disposal.
Governments around the world have been working to define
standards and guidelines regarding the secure deletion of
information on data carriers – and each individual nation is free
to enact its own legislation. Among the most influential new
international standards are the British Standard BS 8470:2006,
NSA / CSS and DIN 32 757, and the brand new European Union
standard, EN 15 713. Many countries worldwide use these
well-known standards as the basis for their own rules and
regulations.
In this new world of competing, conflicting information
assurance standards, where should an IT executive look
for reliable equipment and advice? This is where Crypto
Levels by intimus reside: with our experience and expertise
developed over 50 years in the business, we have formed a
concept that brings all major standards under one roof.
intimus Crypto MatrixCrypto Level 8 9 10 11Hard Copy Storage < 10 mm² < 5 mm² < 3.5 mm² < 1 mm²
European Standard EN 15 713
DIN 32 757
BS 8470:2006
NSA/CSS 02-01
NIST Special Publication 800-88
NATO SDIP-293
Optical Media < 10 mm² < 5 mm² < 3.5 mm² < 1 mm²
European Standard EN 15 713
DIN 32 757
BS 8470:2006
NSA/CSS 04-02
NIST Special Publication 800-88
NATO SDIP-293
Magnetic Media Tape < 2,800 oe > 2,800 oe Physical Physical HDD < 5,000 oe > 5,000 oe Destruction Destruction
DIN 33 858
European Standard EN 15 713
BS 8470:2006
NSA/CSS
NIST Special Publication 800-88
NATO SDIP-293
Solid State Media < 10 mm² < 5 mm² < 3.5 mm² < 1 mm²
European Standard EN 15 713
BS 8470:2006
NSA/CSS 02-01
NIST Special Publication 800-88
NATO SDIP-293
meets the standard exceeds the standard
6
...for Secret and Top Secret Requirements
British Standard BS 8470:2006
BS 8470:2006 gives recommendations for the management
and control of collection, transportation and destruction of
confidential material to ensure that such material is disposed
of securely and safely. The recommendations apply to a
company’s main business premises and any holding sites.
Particle surface: < 10 mm²
DIN 33 858
This German standard refers to the erasure of data stored
on magnetic media. It defines the minimum requirements
for erasing devices and gives guidelines for the field strength
that needs to be used according to the type of data carrier
being destroyed. This field strength ranges from 350 up
to 5,000 Oe on three levels.
NATO SDIP-293
Within the military alliance of NATO this standard gives rules
for destruction of obsolete media. These items are split up into
paper and non-paper material. Main methods for destruction
are shredding, burning, disintegrating, smelting or degaussing.
Particle surface paper shredding: 5 mm²
NSA/CSS Specification 02-01
To protect national security, military and government
agencies the U.S. National Security Agency (NSA) released
a standard for paper shredders in 2003. NSA/CSS Specification
02-01 outlines the required shred size for document paper
cross cut shredders for government agencies disposing of
Top Secret or classified documents.
Particle surface: < 5 mm²
NIST Special Publication 800-88
While NSA / CSS gives rules for U.S. military or government
agencies, this publication released in 2006 gives guidelines
for media sanitization in U.S. commercial organizations.
Unlike most of the other standards it covers a large scope
of media primarily split into two groups: Hard copy and
electronic. The guideline deals with the trends in data storage
media and how the information can be deleted efficiently
by means of shredding, disintegration, pulverization or even
incineration.
Particle surface shredding: 5 mm²
European Standard EN 15 713
Released in 2009, this regulation now sets a European
standard for information assurance. Replacing the former
DIN 32 757 and BS 8470:2006, it defines requirements for
mechanical secure destruction of confidential material in
8 security levels. High security data destruction happens
at level 8 with a particle size of in average 10 mm² and
a maximum width of 0.8 mm.
Particle surface: < 10 mm²
DIN 32 757-1
For almost 30 years the internationally recognised DIN was
the guideline for data security. In total it defined 5 security
levels. The top level 5 specified a maximum particle size
of 10 square millimeters for indecipherable shredding of
obsolete data storage media. This equals over 6,000
individual particles for one sheet of A4 format paper.
DIN 32 757-1 does not adress optical media destruction.
www.intimus.comwww.intimus.com
7
Content
Intimus security principle
Handling of sensitive information
implies a certain risk in case of
data loss or theft.
intimus security principle offers
a holistic approach to this problem.
Pages 3 - 4
International standards
and regulations
Dealing with information assurance
always means dealing with various
international standards and
regulations, too.
Crypto Levels by intimus
offer a guideline through this topic.
Pages 5 - 6
Magnetic Media
Video Cassettes,
Carbon Tapes,
Hard Disk Drives,
ZIP, DAT, DLT
Degausser, Crusher,
Pages 11 - 12
Secure Erase
Pages 13 - 14
Hard Copy Media
Documents in
small volume
and in high volume
or oversize
Document Shredder
Pages 15 - 20
High Volume Shredder
Pages 21 - 22
Solid State Media
Compact Flash,
SD, USB-Memory Sticks,
EPROM, Routers
Disintegrator
Pages 23 - 24
Dual Shaft Disintegrator
Pages 25 - 26
...for a full list of media, please visit our website www.intimus.com/crypto
Optical Media
CD / DVD, Blu-Ray
Data Grinder
Pages 9 - 10
www.intimus.com
8
Typical Destruction Methods for Different Types of Media
Ripp
ing,
M
anua
l Cut
ting
Pape
r Shr
eddi
ngSt
rip c
ut
Pape
r Shr
eddi
ngCr
oss
cut /
Lev
el 6
Pape
r Shr
eddi
ngCr
oss
cut /
Lev
el 7
Pape
r Shr
eddi
ngCr
oss
cut /
Lev
el 8
-10
Scra
tchi
ng
Bend
ing,
Br
eaki
ng
CD S
hred
ding
Cros
s cu
t / L
evel
3
CD S
hred
ding
Cros
s cu
t / L
evel
4
CD S
hred
ding
Cros
s cu
t / L
evel
5
CD D
ata
Grin
ding
Mec
hani
cal
Defo
rmat
ion
Drill
ing
Hole
sM
anua
l Cut
ting
HDD
Crus
hing
HDD
Shre
ddin
g
HDD
Disi
nteg
ratio
n
Dega
ussi
ng /
8000
Gau
ss
Dega
ussi
ng /
9000
Gau
ss
Dega
ussi
ng /
8000
Gau
ss
+ H
DD C
rush
ing
Dega
ussi
ng /
9000
Gau
ss
+ H
DD C
rush
ing
Dega
ussi
ng /
8000
Gau
ss
+ H
DD S
hred
ding
Dega
ussi
ng /
9000
Gau
ss
+ H
DD S
hred
ding
Dega
ussi
ng /
8000
Gau
ss
+ H
DD D
isin
tegr
atio
n
Dega
ussi
ng /
9000
Gau
ss
+ H
DD D
isin
tegr
atio
n
Secu
re E
rase
Pow
er S
hred
ding
Strip
cut
Pow
er S
hred
ding
Cros
s cu
t 6
Pow
er S
hred
ding
Cros
s cu
t 7Po
wer
Shr
eddi
ngCr
oss
cut 8
-10
Disi
nteg
ratio
nLa
rge
Scre
en m
ax. 5
mm
Disi
nteg
ratio
nSm
all S
cree
n m
ax. 3
mm
Top Secret
Confidential
Restricted
Personal
Public
Top Secret
Confidential
Restricted
Personal
Public
Top Secret
Confidential
Restricted
Personal
Public
Top Secret
Confidential
Restricted
Personal
Public
Top Secret
Confidential
Restricted
Personal
Public
Top Secret
Confidential
Restricted
Personal
Public
Ty
pes
of M
edia
Sol
id S
tate
So
lid S
tate
Ha
rd C
opy
M
agne
tic
Mag
netic
Op
tical
Ca
rds
HD
D
Tape
s
HDD
Method of destruction
= insufficent
= may not be sufficient
= sufficient
9
Security is essential.
During 2007, 26 billion pieces of optical media (CDs, DVDs and Blu-Ray discs) were
sold worldwide – with an average annual sales increase of approximately 10%. They are
currently the most frequently used media for portable and cost-effective information storage.
Unfortunately, these features – portability, low cost –
that offer such advantages to the user can also lead
to abuse and data theft when these devices reach
their final end-of-life destination. A single disc falling
into the wrong hands could betray state secrets or
damage a company’s prospects for years to come.
The biggest information assurance challenge from
optical media is that the information layers on the disc need to be thoroughly removed.
It’s not good enough to throw away a disc or scratch the surface – only a machine like the
intimus 005S grinds all information layers beyond the point of forensic recovery – thus
ensuring the highest level of information security. The U.S. guidelines for media sanitization
specify grinding as the only sufficient optical media destruction method – and intimus
provides this added degree of safety.
intimus 005S
• Fast, safe and complete erasure
• Simple one-button operation
• Suitable for CD, DVD and Blu-Ray Disks
• NSA-approved security level
• Matching NIST SP guidelines 800-88
• DVD-Splitter included
Optical Media Destruction – Data Grinder
The DVD splitter is part of the standard equipment
CD/DVD/BD can be a cornucopia of information to anyone with a disc drive
The built-in evacuating system clears away the dust particles - keeping the office clean
10
11CRYPTO
The intimus 005S deploys the patented DATAgrindTM technology which grinds the data layer
on any optical media down to 250 microns – beyond the point of forensic recovery.
In less than one minute, all data on a CD/DVD or Blu-Ray disc is eliminated completely and
permanently. All that remains is a fine dust that is collected by the built-in evacuation system.
Intimus 005S is flexible to use and easy to operate. CDs and Blu-Rays can be processed in only
one step. DVDs need to be split before the data destruction and are processed in two steps.
After grinding, the remains of the discs are recyclable as Polycarbonate.
CRYPTO LEVEL 11
Model intimus 005S
Size of shreds Dust
Grinding depth microns 250
Operation time per disc sec. < 18
Power supply Volts 230
Dimensions L/W/H approx. cm 26/23/11
Weight approx. kg 2.5
Destruction Beyond Forensic Recovery
www.intimus.com
Exceeds DIN and NSA StandardsExceeds DIN and NSA Standards
11
Digital storage needs maximum protection.
With high storage capacities and many different types of information stored together,
digital media are vulnerable to all kinds of abuse. Modern hard disk drives or magnetic
storage tapes such as LTO or QIC can contain
millions of written pages, together with other confidential
information like pictures, films, financial calculations or
banking data. All of this information is typically secured
during use. But after the information is no longer in use,
merely deleting all the files does not solve the problem.
Most deleted information can easily be restored. Spot tests
made on disposed computers and hard disk drives showed
that more than 80% of all tested hard disk drives had never
been deleted and still contained personal data – and worse,
roughly 50% of this data was hazardous.
Information Destruction on Hard Disk Drives – Degausser
intimus 1000The intimus 1000 physically
destroys hard drives by bending, breaking and mangling the hard
drive and its internal components including data platters.
intimus 9000
• Fast, safe and complete erasure in only one go
• Push button or auto-operation with door activated auto feed
• PCS (Pulse Confirmation System) – audio and visual verification of degauss
• Continuous duty, no cooling cycles necessary
• Clear indication of the operating status with indicator lights and sounds
• Portable with two integrated handles
• Very low magnetic influence to surrounding area
• Meets German standard DIN 33 858 for degaussers
intimus 8000With its compact dimensions,
quiet operation and a 60 second cycle time, the intimus 8000 can fit
right on a desktop.
Short duty cycles, user-friendly operation and continuous mode offer widespread solutions for different security needs.
12
intimus degaussers rely on APT (Advanced Pulse TechnologyTM). During
the erase an effective quick burst generates a strong and powerful pulse.
This results in 90% lower energy consumption compared to other models.
At the same time they produce an erasing field many times stronger than those
produced by the read/write heads in hard drives and tape drives. The field strength
of an intimus degausser destroys the magnetic structure and ensures that the data
are no longer recoverable by computer or laboratory attacks. Since the technology
does not rely on software, it will also completely and permanently erase failed and
damaged hard drives regardless of the operating system or interface.
Built-in safeguards check the stored power before each erase cycle, ensuring
complete erasure every time. A field strength meter, audible tones and lighted
push buttons report the status of the degausser to the user.
CRYPTO LEVEL 7 8
Model intimus 8000 intimus 9000
Media Hard disk drives up to 25 mm Hard disk drives up to 42 mm Standard and laptop drives Standard and laptop drives Tape cartridges incl. DLT, LTO, Tape cartridges incl. DLT, LTO, QIC, 3590, 8 mm and more QIC, 3590, 8 mm and more
Media size / erasing area size 171/114/25 mm 71/114/42 mm
Degausser system Capacitive discharge Capacitive discharge
Duty cycle 60 sec. Continuous duty
Magnetic field 8,000 Oe, 0.8 Tesla 9,000 Oe, 0.9 Tesla
Erasing time depending on user interaction min 60 sec. min 12 sec.
Power consumption (at 230V) Standby 0.2 A / Standby 0.2 A / charging 4.0 A / erase 0.5 A charging 7.0 A / erase 0.5 A
Dimensions in operating position L/W /H 31 x 45 x 19 cm 31 x 58 x 48 cm
Weight approx. 19 kg approx. 38 kg
Technical changes and color variances reserved.
Complete and Permanent Erasure of Information
www.intimus.com
Meets NIST Standard
View through Magnetic Force Microscopeleft = before, right = after degaussing
8CRYPTO
7 CRYPTO
13
Information Erasure on Hard Disk Drives – Secure Erase
Maximum productivity: Process up to 4 drives simultaneously (2 x SATA, 2 x PATA)
intimus Hammer SE
• Destroys all data on up to four PATA/SATA hard drives simultaneously without destroying the drive
• Hard drives may be re-used - promoting better environmental stewardship
• Verifies that the data has been removed
• Generates a stored or printed audit trail
• Wipes and clones drives in a single operation
• Useable as a stand-alone device or in connection with any standard PC (via USB)
• Portable, stand-alone device delivers additional functionality when used with the CPR Toolbox software application (included).
Developed by hard disk drive (HDD) manufacturers,
firmware-based Secure Erase is a standard technology
embedded in most ATA/SATA hard drives.
When activating this command with intimus Hammer SE,
the HDD is completely purged back to the original status, with
all data eliminated. While the command is implemented, the
HDD is assigned a random password that locks the drive down.
It will not unlock until the Secure Erase procedure is complete.
The intimus Hammer SE is faster, more secure, and far more
energy-efficient than any software overwriting solution.
The National Institute of Standards and Technology (NIST) has established new standards
for electronic media sanitization that ranks Secure Erase, like degaussing, at the highest
security level that does not involve actual physical destruction.
14
8CRYPTO
The intimus Hammer SE implements firmware-based erasure
command to completely purge all data from parallel ATA (PATA)
and serial ATA (SATA) hard drives.
This easy to use, one-step device connects to up to four hard drives
via standard cables and erases data at speeds up to 4.0 GB per minute.
For onsite data purging, the
compact, portable product
operates as a stand-alone device...
or connect to the CPR Toolbox
software utility (included) for
additional functionality.
CRYPTO LEVEL 8
Model intimus Hammer SE
Drive interfaces Parallel ATA (PATA) Serial ATA (SATA)
Host interface USB 2.0
Max. transfer rate up to 4.0 GB / minute
Input voltage + 12 VDC
Max. input current 3.5 A
Voltage to drives + 12 VDC, 5+ VDC
Device addressing support 28 bit & 48 bit supported
Max. transfer mode UDMA mode 4
Supported devices ATA 4 through ATA 7
Dimensions L/W/H 10.5 x 10.6 x 3.6 cm
Weight approx. 0.3 kg
Digital Shredding – Ready for Re-use
www.intimus.com
Meets NIST Standard
15
High Security Paper Shredding – at the Deskside
When high security paper documents
are no longer needed:
When selecting a shredder, you need to
consider where it will be used. The highest
level of data protection for high security
documents such as patents, business plans or
financial statements can only be guaranteed
when the machines needed for document
disposal are within reach of the user.
This category of high security shredders offers deskside machines
for one or up to 5 users.
These shredders are engineered for high security shredding capability,
while also offering a user-friendly design and low noise level. Users can
shred documents quietly without disturbing the work of others nearby.
Clearly arranged controls for maximum ease of use
Strategy papers, technical drawings, contracts – perfectly
destroyed next to the desk
intimus 302 HS, 302 SF, 402 HS
• Low noise level
• Automatic start/stop with light barrier
• Auto-stop and reverse key for quick elimination of paper jams
• Illuminated indicators for standby, basket full, door open and paper jam
• Electronics equipped with microcontroller
• 402 HS: Mounted on rollers for flexible use
402 HS WB
• Equipped with extra large basket
intimus 502 HS, 502 MHS, 502 SF
• Automatic start/stop with light barrier – “M” model is operated manually with a multifunction key
• Auto-reverse and reverse key for quick elimination of paper jams
• Illuminated indicators for standby, basket full, door open and paper jam
• Electronics equipped with microcontroller
• Sealed, dust-free design – castors for portable use
16
8CRYPTO
9CRYPTO
Highly functional, reliable and technically advanced –
peak performance thanks to leading technology.
Data shredders are distinguished by their feed characteristics and
by the geometry of their cutting cylinders. Both of these factors are
absolutely essential for good performance.
At the heart of a high security cutting block, the cutting cylinders
interact with other high precision components and represent the basic
core of the data shredder.
Each cutting cylinder is equipped with hundreds of precision-ground
special cutters. A shredder with a High Security cutting system
shreds a single sheet of A4 format paper into nearly 6,500 pieces.
Confidential Information Destroyed Within Reach
CRYPTO LEVEL 8 8 8 9 9
Model intimus 302 HS 402 HS 502 HS 302 SF 502 SF
402 HS WB 502 MHS
Size of shreds mm 0.8 x 12 0.8 x 12 0.8 x 12 0.8 x 4.5 0.8 x 4.5
Shredding capacity 70 g/m² * sheets 5-6 5-6 8-10 3-4 5-6 Cutting speed 70 g/m² ** m/sec. - sheets/min. 0.1 - 121 0.1 - 121 0.15 - 283 0.1 - 81 0.14 - 170
Shredding capacity 80 g/m² * sheets 4-5 4-5 7-9 3-4 4-6 Cutting speed 80 g/m² ** m/sec. - sheets/min. 0.1 - 101 0.1 - 121 0.14 - 255 0.1 - 81 0.14 - 170
Working width / Paper format mm / DIN 240 / A4 240 / A4 260 / A4 240 / A4 260 / A4
Catch basket volume l 32 37 / WB55 65 32 65
Power consumption / Power supply kW / Volts 0.55 / 230 0.55 / 230 1.1 / 230 0.55 / 230 1.1 / 230
Noise level db (A) 52 52 56 52 56
Dimensions L/W/H approx. cm 39/28/64 39/28/74 49/38/87 39/28/64 49/38/87 WB 39/35/82
Weight approx. kg 20 21 / WB 25 43 20 43 * based on DIN A4 paper. Sheet capacities vary depending on quality, weight, grain of paper and sufficient power supply. It may be lower if the voltage is below the rated/nominal value. ** theoretical average sheets per minute. www.intimus.com
Meets DIN Level 5 Exceeds DIN Level 5 / Meets NSA Level
17
intimus 602 HS, 602 SF, 007 SX, 702 SF
• Automatic start/stop with light barrier
• Auto-reverse and reverse key for quick elimination of paper jams
• Illuminated indicators for - standby, - basket full, - door open - and paper jam
• Electronics equipped with microcontroller
• Sealed, dust-free design – castors for portable use
intimus 007 SE, 007 SF
• Automatic start/stop with light barrier – 007 SE manual, with multi-function button
• Auto-reverse and reverse key for quick elimination of paper jams
• Illuminated indicators for - standby, - basket full, - door open - and paper jam
• Electronics equipped with microcontroller – except 007 SE
• Mobile, sealed, dust-free cabinet
High Security Paper Shredding – at the Department
Maximum security combined with high capacity.
More than 40 years ago, the lengendary intimus 007
was born. The name is the clue to its functionality:
a data shredder which fulfills the increasingly complex
security requirements of governments and military agencies,
as well as R&D departments in all industrial sectors.
Still today, intimus 007 shredders can be considered
the standard for high security shredding around the world.
In an ever-changing, ever-more-competitive marketplace,
high security shredders need to do more than just reduce
printed documents into illegible pieces. They must also
demonstrate economical performance characteristics, and must be easy to use.
The most important performance characteristics include cutting capacity and
working width.
For this reason, intimus high security shredders are available in sizes to fit
departmental requirements, meaning they offer performance in sheet capacity
and are fit for centralized use.
Large paper tray can be folded away
to save space
Business Plans, Customer Profiles, Personnel Files – can be securely destroyed with a reliable department shredder
18
8CRYPTO
9CRYPTO
intimus 007 SE, 007 SF
• Automatic start/stop with light barrier – 007 SE manual, with multi-function button
• Auto-reverse and reverse key for quick elimination of paper jams
• Illuminated indicators for - standby, - basket full, - door open - and paper jam
• Electronics equipped with microcontroller – except 007 SE
• Mobile, sealed, dust-free cabinet
Professional Security for Larger Volumes and Sizes
CRYPTO LEVEL 8 8 8 9 9 9
Model intimus 602 HS 007 SX 007 SE 602 SF 702 SF 007 SF
Size of shreds mm 0.8 x 12 0.8 x 12 0.7 x 9.5 0.8 x 4.5 0.8 x 4.5 0.8 x 4.5
Shredding capacity 70 g/m² * sheets 8-10 15-17 12-14 5-6 8-10 8-10 Cutting speed 70 g/m² ** m/sec. - sheets/min. 0.14 - 283 0.15 - 515 0.23 - 651 0.14 - 170 0.23 - 465 0.23 - 465
Shredding capacity 80 g/m² * sheets 7-9 13 - 15 10-12 4-5 7-9 7-9 Cutting speed 80 g/m² ** m/sec. - sheets/min. 0.14 - 255 0.15 - 455 0.23 - 558 0.14 - 141 0.23 - 418 0.23 - 418
Working width / Paper format mm / DIN 405 / A3 405 / A3 300 / A3 405 / A3 405 / A3 300 / A3
Catch basket volume l 130 135 175 130 175 175
Power consumption / Power supply kW / Volts 1.1 / 230 1.9 / 230 1.9 / 230 1.1 / 230 1.9 / 230 1.9 / 230
Noise level db (A) 54 60 70 54 52 70
Dimensions L/W/H approx. cm 66/43/102 66/50/102 70/55/112 66/43/102 66/56/105 70/55/112
Weight approx. kg 60 91 142 54 90 142 * based on DIN A4 paper. Sheet capacities vary depending on quality, weight, grain of paper and sufficient power supply. It may be lower if the voltage is below the rated/nominal value. ** theoretical average sheets per minute.
www.intimus.com
The cutting cylinders of intimus high security data
shredders are equipped with hundreds of precision-
ground special cutters. A shredder with an SF-cutting
system shreds a single sheet of paper into more than
17,000 individual pieces.
Each cutting cylinder is the outcome of a highly advanced
engineering and production process. Two plain pieces of
special quality steel are turned into a pair of highly precise
cutting cylinders interacting with each other like Swiss
clockwork. Once the precision level is guaranteed, the
process of production is finalized with a hardening process
that makes the cylinders resistant against the wear and
tear of many years in operation.
Meets DIN Level 5 Exceeds DIN Level 5 / Meets NSA Level
19
intimus 007 SL
• Automatic start/stop with light barrier
• Auto-reverse and reverse key for quick elimination of paper jams
• Illuminated indicators for - standby, - basket full, - door open - and paper jam
• Electronics equipped with microcontroller
• Mobile, sealed, dust-free cabinet
Top Secret Level Paper Shredding
The “chaotic cut”: Thousands of illegible
particles irregular in size
Keeps Top Secret correspondence from getting into the wrong hands
The first shredder that exceeded the latest NSA standard
when it was released in 2003 was the intimus 007 SL.
Driven by the US standard and with the future in mind, Martin Yale
focused on how to develop cutting technologies that even exceeded
the NSA requirements. With impressive results: while standard
technologies would shred one piece of DIN A4 paper into 6,000 to
17,000 pieces, the intimus 007 SL tears it into up to 30,000 pieces.
With its unique performance, its low noise operation level and what
is called its 3CT (3-Cylinder-Technology), the 007 SL is in a class of its own: three cutting cylinders
(instead of only two) cut the paper into tiny pieces only 1.5-5 mm in length.
Ever since this model was launched in 2003, it has become a trusted ally for clandestine
government services worldwide. No technology has been developed that can reconstruct a
document shredded by an intimus 007 SL.
20
10CRYPTO
www.intimus.com
intimus 007 SL
• Automatic start/stop with light barrier
• Auto-reverse and reverse key for quick elimination of paper jams
• Illuminated indicators for - standby, - basket full, - door open - and paper jam
• Electronics equipped with microcontroller
• Mobile, sealed, dust-free cabinet
When the intimus 007 SL was first developed, the Martin Yale engineers were the
industry’s pioneers in looking for a shredder whose technology made it impossible to
recover a document once shredded.
It turned out that the key to success was to create shredded pieces that have a shape that brings
any software to its limit. Martin Yale’s insight was that the more irregularly-shaped the pieces are,
the less likely it is that they will be recoverable.
At this point 3CT (3-Cylinder-Technology) by intimus was born. During the shredding process
the document first runs through the first pair of cutting cylinders. After that it is led towards the
second cut. This results in particles with variable lengths between 1.5 up to 5 mm.
This is the only way to guarantee a lasting “unrecoverable” result, even after many
years of use.
For Ultimate Paper Security
CRYPTO LEVEL 10
Model intimus 007 SL
Size of shreds mm 0.65 x 1.5-5
Shredding capacity 70 g/m² * sheets 10-12 Cutting speed 70 g/m² ** m/sec. - sheets/min. 0.1 - 242
Shredding capacity 80 g/m² * sheets 9-10 Cutting speed 80 g/m² ** m/sec. - sheets/min. 0.1 - 202
Working width / Paper format mm / DIN 300 / A3
Catch basket volume l 175
Power consumption / Power supply kW / Volts 2.0 / 230
Noise level db (A) 70
Dimensions L/W/H approx. cm 70/55/112
Weight approx. kg 170 * based on DIN A4 paper. Sheet capacities vary depending on quality, weight, grain of paper and sufficient power supply. It may be lower if the voltage is below the rated/nominal value. ** theoretical average sheets per minute.
Exceeds DIN Level 5 and NSA Standard
21
intimus VZ 14.00/5
• Two steps in one run: conveyor belt connects the pre- and after shredder
• 8 ton baler compresses particles into compact bales
• Audible “bale completed” signal
• Push-button ejection of the bale - directly into an environmentally compatible plastic sack
High Security Paper Shredding – Large-scale Systems
The feeding section work table offers a comfortable width for undisturbed shredding work
Seamless data protection is (now) child’s play.
When high volumes peak, adequate shredding capacity
must be available to enable fast and efficient disposal
of medical records, personnel files or court records that
are no longer required. Shredders that are too weak
or too slow cost valuable time and make shredding a
tedious, disliked job - thus harboring the risk of sensitive
documents being disposed of intact out of convenience.
Sheet capacity and cutting speed are inadequate
yardsticks to measure the effectiveness of large-scale shredders. What needs to be
considered when dealing with large-scale systems is the necessary throughput
volume in kg/hour. This can easily be determined from the weight of the
documents to be shredded every day combined with the time frame
envisioned for shredding.
For improved working conditions. Dust is inevitably generated when shredding paper. The dust extractor removes dust at the critical points to prevent it from escaping into the ambient air (This is an optional feature).
22
8CRYPTO
8CRYPTO
Top Secret Shredding in High Volume
The VZ 14.00/5 Shredder/Baler Combination is an intimus®POWER heavy duty shredder
that fulfills top security standards.
Comprising a pre-shredder of 6 x 50 mm cutting width followed by a cross-cut shredder of 2 x 4.5 mm
cutting width, an hourly output of up to approx. 150 kg is achieved (depending on feed rate and material
to be shredded).
Once pre-shredded, the material drops straight onto a conveyor belt and is transported along the shortest
route to the follow-up security shredding system. Only this combination of pre- and after-shredder makes
such a high throughput at a top security level possible.
The 2 x 4.5 mm cutting system guarantees compliance with EN 15 713 security level 7 – thanks to the
subsequent compaction of the fine shreds in the integrated bale press, it is even possible to meet the
requirements of security level 8.
left = Paperright = Banknotes
CRYPTO LEVEL 8
Model intimus VZ 14.00/5
Size of shreds mm 2 x 4.5
Shredding capacity 70 g/m² * sheets 90-100 kg/h 150
Shredding capacity 80 g/m² * sheets 80-90 kg/h 150
Cutting speed** m/sec. 0.24
Working width / Paper format mm / DIN 500 / A2
Motor power / Power supply kW / Volts 11.3 / 400
Noise level db (A) 74
Dimensions L/W/H approx. cm 288, 348 open/120/155
Weight approx. kg 1,370 * based on DIN A4 paper. Sheet capacities vary depending on quality, weight, grain of paper and sufficient power supply. It may be lower if the voltage is below the rated/nominal value. ** theoretical average per minute.
www.intimus.com
Meets DIN Level 5 and NSA Standard
23
intimus Disintegrators
• Large and solid bearings, externally mounted
• Wide opening milling chamber for perfect access to all knives and fast and convenient adjustment or exchange of knives
• Easy access to the milling chamber, can be opened without tools, easy to clean, secured with safety interlock
Rack
• Equipped with a feed tunnel from sheet steel with sound insulation, two rubber curtains, and two fixed and two guide rollers for easy transportation. Guide rollers are lockable. Belt guard from sheet steel.
Large-scale Data Destruction Systems – Disintegration
High volume technology, proven for decades, is the basis
of the intimus®POWER Disintegrators.
For secure destruction of bank notes, paper and other types of media,
you need carefully adapted machines with specially designed rotors
and cutting geometries. This ensures efficient feeding and maximum
throughput with these delicate materials – saving time and effort.
Via a screen, the particles leave the cutting chamber towards a hopper
and are evacuated from there. By simply installing a screen with a
different mesh size, the shred size of the machine can be easily
adapted to the respective demand.
All intimus®POWER Disintegrators can be equipped with an optional sound enclosure.
The clean-cut box from painted sheet steel is equipped on the inside with special padding
and provides for reduction of the sound level during operation to approx. 80 db(A).
Wide front doors enable convenient access for service and maintenance work.
Large bundles of hard copy storage, cell phones or Floppy disks enter the disintegrator via the feed tunnel...
...clean collection of disintegrated material in the hopper
The screen mesh diameter determines the level of security, ranging from 2 up to 20 mm
24
9CRYPTO
8CRYPTO
The rotors of intimus®POWER Disintegrators are CNC-milled from solid stock.
They are optimized for processing of massive piles of material like bank note bundles and
wrappers or thick stacks of printed sheets by use of specially designed bolted knives.
All of our disintegrators use the unique “Diagonal Cut” technology, which offers advantages
over other knife layouts. Benefits include: automatic feeding by the knives themselves,
smooth operation, minimum dust content of the mill charge and very low power consumption.
The rotor knives do not need to be adjusted and are simply fixed adjacent to the bed stop.
By positioning the two solid knives, the accurate gap between rotating and solid knives
is adjusted. All knives are made from tooling steel, hardened, long-lived and can be easily
re-sharpened multiple times with no need for special appliances.
CRYPTO LEVEL 8 / 9
Model intimus Disintegrators 9 Models
Throughput kg/h at 4 mm 50 up to 1,250
Feed opening size mm 130 up to 1,270
Screen size mm 4 standard / option 2 up to 20
Power consumption kW 1.5 up to 75
Power supply Volts 230/50 1PH / 400/50 3 PH
Number of blades rotor / bed 3 up to 5 / 2
Knife layout single plus dual “Diagonal Cut“
Noise level db (A) < 80
Dimensions L/W/H approx. cm 79/64/125 up to 254/125/348
Weight approx. kg 230 up to 4,100
Perfect Result and Top Performance
www.intimus.com
left = 4 mm / Floppy disk right = 2 mm / Paper
Meets DIN Level 5 and NSA Standard
25
intimus Dual Shaft Disintegrators
• Processes common 2.5”, 3.5” and 5.25” HDD, video cassettes, carbon tapes, printed circuit boards, CD-ROM, DDS and DLT tapes to 30 mm wide pieces
• Fully automatic function control
• Convenient collection of the shreds in a commercial wheelie bin (not included)
• Maximum operational safety through limit switch at the door and top cover
Destruction of Optical and Magnetic Media – Dual Shaft Disintegrator
The past decade has been a time of dramatic change in the quality and capacity
of data storage media.
The new world of cheap, high-capacity and ever-present data storage devices has completely
transformed the world of information assurance and poses new challenges to organizations
seeking to handle their data in a safe and secure manner. Incredibly enough, the quantity of
data storage media is still increasing. As “old” methods of data storage become obsolete
(within an ever-shorter time frame), organizations find themselves faced with obsolete hard
drives, outdated computers, printers and other equipment that has outlived its usefulness,
but that still poses a risk.
Data storage devices have the potential to become “information bombs” once they become
obsolete. The easiest way to manage secure, fast, economic destruction with an easy visual
proof for the successful completion of the destruction process is shredding the HDDs or other
media to pieces. For ultra-sensitive data in industry and government, the highest security
requirements apply. The main goal of security requirements in this area is to avoid any
recovery of the data.
The unique intimus Dual Shaft Disintegrator allows for granulating of up to
approximately 22 to 50 HDD of 3.5” size per hour to tiny granules with 10, 8
or even only 6 mm chip size (according to the installed screen). This machine
is unmatched so far and is in high demand from secret services and
government agencies that require the highest level of security.
26
8CRYPTO
9CRYPTO
CRYPTO LEVEL 8 / 9
Model intimus Dual Shaft Disintegrator
Size of shred mm 6, 8 or 10 mm depending on screen size
Capacity per hour approx. 22 units 3.5” HDD at 6 mm
Cutting zone mm 380 x 500
Motor Power / Power Supply kW / Volts 4.0 / 400
Control Moeller easy 512 PLC
Noise level db (A) 82
Dimensions L/W/H approx. cm 130/130/208
Weight approx. kg 1,060
www.intimus.com
Using the unique Hybrid Technology, the intimus dual shaft disintegrator makes
perfect use of both shredding and disintegration.
Designed for industrial applications, the shredding section is equipped with 30 mm wide knives
from special tool steel and a robust electric geared drive. Knives are hardened to special specification
and use a special geometry to provide for perfect processing of HDD and other media. Via the feeding
slot located in the top cover, media can be continuously fed to the cutting block.
Once shredded, the remaining particles run through the installed disintegration screen enabling the
system to offer a practical throughput of 22 to 50 HDD per hour at low wear and energy consumption.
As with the regular Single Shaft Disintegrators, users have the option of installing a screen with a
different mesh size to adapt the final granule size to the required demand. As a standard, mesh sizes
of 6, 8 or 10 mm are available.
Top Security and Maximum Performance
Meets DIN Level 5 and NSA Standard
90269 - Issue 5/2010
Consulting, sales and servicefrom your dealer:
High Security Information AssuranceProfessional Data Shredders
Large-scale Data Shredding SystemsSolution for sustainable Waste Management