PRODUCT CLAIMS TEST

The ADISA Product Claims Test service provides independent validation of a manufacturers claims made about the effectiveness of their product to sanitise data on various forms of storage media.

 

 

CERTIFIED PRODUCT CLAIMS TEST ORGANISATIONS

These vendors have products which are currently validated by our rigorous testing regime.

 

ADISA THREAT MATRIX

The threat matrix defines a series of capabilities and risks that various threat agents can pose on the security of a device.

Test LevelThreat Actor Type of Attack and compromise method
1Casual or opportunistic threat actor only able to mount high-level non-invasive and non-destructive software attacks utilizing freeware, COTS and OS tools,
Keyboard attacks from a motivated individual or professional organisation.

Typical attack could be using open-source forensic tools or commercial tools
2Commercial data recovery and computer forensics organisation able to mount invasive/destructive software and hardware attack, utilising both COTS and bespoke hardware and software.Laboratory attacks from commercial data recovery experts or specialist forensic scientists.

Typical attack may be the use of advanced data recovery software, Chip Readers and protocol decoders.

Typical attack would involve analysis of individual hardware components as well as protocol structures.

3Government-sponsored organisations using advanced techniques to mount all types of software and hardware attacks with unlimited time and resources to recover sanitised data.An attack agent of unknown capability and unlimited resource.

Typical attacks would involve taking theoretical data recovery techniques and making them an actual capability.

 

Product Assurance

Providing peace of mind for your organisation.

LEARN MORE