{"id":7809,"date":"2021-02-04T10:52:18","date_gmt":"2021-02-04T15:52:18","guid":{"rendered":"https:\/\/www.itadsummit.com\/?page_id=7809"},"modified":"2021-02-04T10:52:18","modified_gmt":"2021-02-04T15:52:18","slug":"itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center","status":"publish","type":"page","link":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/","title":{"rendered":"ITAD Blog:  A Guide To Secure Data Sanitization In The Data Center"},"content":{"rendered":"<h1>\n\t\tITAD Blog\n\t<\/h1>\n<h6>\n\t\tA Guide To Secure Data Sanitization In The Data Center\n\t<\/h6>\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/1-circle.jpg\" alt=\"1\" itemprop=\"image\"  \/>\n\t<h1>ITAD Blog<\/h1>\n<h3><strong>A GUIDE TO SECURE DATA SANITIZATION IN THE DATA CENTER<\/strong><\/h3>\n\t<p>In an age of corporate hacks and insider attacks, data sanitization\u2014the process of securely and comprehensively removing data from IT hardware\u2014is more important than ever. Following a data breach of any form, a company\u2019s reputation can hang in the balance.<\/p>\n<p>Here\u2019s our guide to the critical role that data sanitization plays in preserving information security across the increasingly complex landscape that is enterprise computing, focusing on the data center.<\/p>\n<h2>Playing Corporate Cat And Mouse<\/h2>\n<p>Given the sensitivity of data and the increasing value, companies derive from it, securing data is an issue that\u2019s rapidly moved up the corporate ladder in most organizations nowadays, from the IT function all the way to the C-suite.<\/p>\n<p>Keeping data digitally secure is\u00a0a huge challenge for the enterprise, particularly with the sharp uptick in work-from-home arrangements as companies adjust to the\u00a0realities of COVID-19. As hackers\u2019 digital tools get more sophisticated, IT\u2019s digital countermeasures seek to rise to the task.<\/p>\n<p>Compounding these challenges, companies must also take into consideration the physical security of their data.<\/p>\n<p>Whether in a cloud data center, on-premise, in remote locations, or anywhere in-between, data is contained on a variety of hardware, from flash storage to\u00a0spinning hard drives through the tape and optical media. It can persist in memory and is increasingly entwined with the fabric of the data center itself.<\/p>\n<p>Meanwhile, organizations must account for their employees\u2019 devices, such as laptops, smartphones, and other mobile devices. IT asset management is a head-spinning proposition\u00a0at the best of times.<\/p>\n<h2>Developing A Data Governance Framework<\/h2>\n<p>Any effective approach to information security must place data sanitization at its heart. But, in order to sanitize media, an IT team needs a granular understanding of where the company\u2019s data lives: its data topography.<\/p>\n<p>This is where an organization\u2019s data governance framework, its overarching approach to data management, helps. In developing their approach to data governance, companies identify what kind of data they routinely generate and how to organize and store this information, dependent on business needs.<\/p>\n<p>Within the data governance framework should be guidance on data retention\u2014how long to hold on to certain kinds of information and when to delete. As a rule, the longer a company holds on to data, the greater the risk of that data becoming subject to discovery in the event of legal action or a security breach.<\/p>\n<p>The\u00a0principle of defensible disposition\u00a0advises organizations only to hold on to data for as long as commercially necessary or legally required, although the reality is that companies tend to retain data whether they mean to or not.<\/p>\n<p>&nbsp;<\/p>\n<h2>A Process For Data Sanitization<\/h2>\n<p>Setting the rules within the data governance framework is one thing: maintaining and enforcing them is another. This is where the process kicks in\u2014a process based on a governance framework that is widely understood across an organization and centrally owned.<\/p>\n<p>Because when it comes to data sanitization, the existence of clear policies and processes is key to preserving information security.<\/p>\n<p>Even with the increasing adoption of AI-driven solutions able to automate the administration of policies, the management of storage media for data sanitization purposes requires human oversight: exactly which drives to wipe and how to handle the physical asset once out of deployment.<\/p>\n<h2>Pulling Drives<\/h2>\n<p>Deciding when to pull storage media from active use depends on several variables. Drive failure is a primary factor: each drive comes with an average life expectancy\u2014the mean time between failures\u2014calculated on the actual performance of that model drive in deployment.<\/p>\n<p>The respective lifetimes of different model drives can vary significantly\u2014it\u2019s difficult to predict at the outset which model drives (and from which manufacturers) will prove to be the hardiest workhorses.<\/p>\n<p>The best guide is the actual performance in deployment, and for that, we have good data. Every quarter, data storage leader Backblaze provides an excellent\u00a0analysis of the performance of the approximately 115,000 hard drives from the three HDD manufacturers\u2014Seagate, Western Digital, and Toshiba\u2014that it has operated in its data centers.<\/p>\n<h2>Detecting HDD Failure<\/h2>\n<p>A\u00a0number of factors, often mechanical, can contribute to hard drive failures: the trusty HDD, since its earliest incarnation in the 1950s, has contained its fair share of moving parts. Even the smallest shock to the hard drive can result in a range of annoying, sometimes fatal errors\u2014 those platters spin fast.<\/p>\n<p>Recognizing a hard drive issue is generally straightforward for a disk deployed on its own. For server-grade HDDs in random arrays of independent disks (RAIDs), however, the RAID controller is configured to isolate hard drive failures within the storage array. The RAID level deployed and the extent of the hardware failure will determine how recoverable\u2014and rebuildable\u2014the data is, or not as the case may be.<\/p>\n<p>Once a faulty hard drive is pulled, technicians will identify the fault and determine whether the disk is capable of repair. At that point, decisions around internal reuse or external remarketing can be taken according to pre-set criteria.<\/p>\n<p>In either scenario (and even if the drive is destined for destruction), technicians will wish to sanitize the drive\u2019s data.<\/p>\n<h2>Refresh Cycles And Data Sanitization<\/h2>\n<p>It\u2019s not only driving failures determining which storage media get pulled: refresh cycles play a role, as data center managers seek to expand storage by introducing higher capacity drives into the available Rackspace.<\/p>\n<p>The calculus over when to run a refresh cycle is complex: while hardware refreshes support IT modernization, they carry a direct cost that leads many enterprises to delay. According to\u00a0a Dell EMC survey\u00a0conducted by Forrester Research, companies often prefer to avoid short-term expenditures even if it costs them operationally in the longer term.<\/p>\n<p>\u201cOn average, 40% of server hardware deployed at company data centers is more than three years old,\u201d the Forrester authors state. \u201cCompanies are adding capacity to support emerging workloads, but they retain aging hardware for four years on average, which is longer than ideal.\u201d<\/p>\n<p>It\u2019s true that companies don\u2019t always have the appetite for regular hardware refreshes. At the same time, it\u2019s hardly the case that companies aren\u2019t investing in new equipment. A\u00a02019 survey from Spiceworks\u00a0revealed that more than a third of organizations intended to invest in new server hardware in the ensuing 12 months, although the shock of COVID-19 will likely push firms to do more with what they already have for the foreseeable future.<\/p>\n<p>In any event, there is always some level of storage media that needs pulling and replacing, and the accompanying question of what to do\u00a0with the retired drives\u00a0once sanitized, from redeploying the equipment within the same organization to reselling within the secondary market.<\/p>\n<h2>The Case For Internal Reuse<\/h2>\n<p>Although often overlooked, the internal reuse of HDDs is a win-win for most organizations.<\/p>\n<p>Financially, companies stand to benefit by reducing capital requirements for new media. From a performance perspective, older drives may no longer meet the needs of increasingly sophisticated workloads\u2014but they will work perfectly fine for less demanding functions.<\/p>\n<p>Source: iNEMI Value Recovery from Used Electronics Project, Phase 2 (August 2019)<\/p>\n<p>There\u2019s also the environmental dividend: reusing rather than disposing and destroying keeps the device\u2019s carbon footprint low.<\/p>\n<p>According to research from industry consortia the\u00a0International Electronics Manufacturing Initiative\u00a0(iNEMI), the carbon savings associated with the reuse of hard disk drives are significant\u2014iNEMI highlights the positive global impacts derived from a variety of recycling use cases for HDD, with reuse clearly topping the list.<\/p>\n<p>In addition to the environmental and financial upsides, there are operational benefits of internal redeployment. For example, when redeploying HDD internally, the requirements for data sanitization adopted by organizations are generally lower. Of course, it remains important to comprehensively wipe the media of its data, but the outbound checks that a drive earmarked for external remarketing are subject to can often be relaxed.<\/p>\n<p>Nonetheless, it is important to have a clear protocol for the way redeployed drives transition within the organization:<\/p>\n<ul>\n<li>Are they staying within the same physical location or will they travel between sites?<\/li>\n<li>What is the process within the asset management database for tracking the device\u2019s redeployment?<\/li>\n<\/ul>\n<p>Whatever the protocol, the actions must be clearly documented and shared across the organization\u2019s stakeholders.<\/p>\n<p><em>\u201cThe enterprise should regularly validate the internal needs of the company for hard drive reuse. Backroom or non-customer facing functions may be able to reuse the hard drive and defer the purchase of new drives by several years.\u201d<\/em><\/p>\n<p><em>-iNEMI working group on HDD reuse<\/em><\/p>\n<h2>Sanitizing Hard Drives<\/h2>\n<p>In spite of the many storage options and the growing dominance of flash for high availability,\u00a0hard drives remain a dominant platform for data storage, whether on-premise, in colocation, or in the public cloud.<\/p>\n<p>When responsible companies decide to upgrade and replace or dispose of, outdated equipment, one of the considerations must be precisely how to wipe the data from those devices or otherwise sanitize the hard drives where the data resides.<\/p>\n<p>There are a number of approaches that can be used to delete data from hard drives, including deleting unwanted files; using software tools; encrypting the drives; or physically destroying the drive, by degaussing it (such that the drive is demagnetized by the use of a strong magnetic field), drilling through it, or shredding it, to make it inoperable.<\/p>\n<p>Too often data center operators opt to destroy without fully exploring the feasibility of reusing the drive in some fashion. According to iNEMI, many fully functioning HDDs are destroyed unnecessarily due to data security concerns. Amid fears that data might be left on the media after sanitization, hard drives are rendered inoperable instead of being reused or remarketed.<\/p>\n<p>\u201cThis significant loss of potential value is caused by a lack of understanding and knowledge of the full capabilities of modern data sanitization methods,\u201d the industry group states.<\/p>\n<h2><strong>Approaches To Data Wiping<\/strong><\/h2>\n<h4><strong>#1 Internal reuse<\/strong><\/h4>\n<p>Not all wiping is the same. Simply deleting unwanted files or running a secure erase process might be all you need to free up storage capacity on a device that isn\u2019t earmarked for redeployment.<\/p>\n<p>However, if your intention is to redeploy the device internally, a more rigorous approach to data wiping is advisable.<\/p>\n<p>Depending on the sensitivity of the data on the device and the nature of its new deployment\u2014perhaps a different organizational function and a different data center\u2014additional steps might make sense after wiping, such as:<\/p>\n<ul>\n<li>Validating the effectiveness of the wiping<\/li>\n<li>Issuing certificates of data destruction<\/li>\n<li>Erasing the device encryption key (assuming the drive is already self-encrypted) prior to transit<\/li>\n<\/ul>\n<p>The exact approach you take will highly depend on the sensitivity of the data, your company\u2019s approach to data management, its tolerance for risk, and any compliance requirements you may be subject to.<\/p>\n<p>Build these guidelines around redeployment into your company\u2019s data sanitization policy, and get your CIO\u2019s sign-off. Proactively communicate and train around your policy, while building a culture that places a premium on information security.<\/p>\n<h4><strong>#2 Remarketing and disposal<\/strong><\/h4>\n<p>If the goal is to remarket or otherwise dispose of the drive, strengthen your process further and make sure workflows are rigorously documented.<\/p>\n<p>There must be no room for procedural ambiguity when it comes to sanitizing data held on storage drives (and other data-bearing media) destined for resale or recycling.<\/p>\n<p>Tight protocols around the validation and certification of data destruction are essential. These processes should be closely supervised by your company together with your\u00a0IT asset disposition\u00a0partner, with regular and predictable channels of communication around project visibility and reporting.<\/p>\n<p>In addition to process implementation, practical considerations to address when developing your strategy for IT asset disposition (ITAD) include:<\/p>\n<ul>\n<li>Are the data wiping tools you or your vendor use industry certified? In what circumstances do you deploy OEM tools proprietary to the hardware or do you solely rely on commercially available software?<\/li>\n<li>When overwriting, how many passes do you stipulate relative to the data\u2019s classification and what pattern do you require?<\/li>\n<li>From full drive scans to spinning down HDD for noise issues, what\u2019s your process for ensuring maintenance and troubleshooting faulty media?<\/li>\n<\/ul>\n<p>These are conversations to have with\u00a0your asset disposition partner\u00a0when developing your\u00a0ITAD strategy, and thereafter around implementation on a project-by-project basis.<\/p>\n<h4><strong>#3\u00a0 A Note on SSD<\/strong><\/h4>\n<p>While industry analysts anticipate HDD\u2019s continuation as the\u00a0dominant storage media in the enterprise data center, solid-state drives are fast rising in prominence\u2014supported by the growing adoption (and general favorability toward)\u00a0the NVMe protocol.<\/p>\n<p>At a technical level, SSDs require a materially different approach to data erasure than HDD. For example, to preserve the longevity of the device when overwriting data, SSDs are programmed (through the technique knows as wear leveling) to write to a new section of the media rather than actually overwrite the existing data. The SSD\u2019s flash translation layer then updates the block\u2019s location to associate the overwritten data with its original address.<\/p>\n<p>Facts like these initially led to serious concerns over the efficacy of data sanitization techniques for SSD, such as those raised\u00a0in a 2011 paper\u00a0from the University of California\u2013San Diego. In the years since the paper\u2019s publication, SSD wiping software has\u00a0advanced significantly\u00a0and is now more than capable of systematically erasing a device\u2014provided the right software is used and implemented effectively.<\/p>\n<h2><strong>Considerations Around Data Encryption<\/strong><\/h2>\n<p>Cryptographic erasure is an alternative method for securely removing access to data on retiring storage media. It requires wiping the encryption key to data on an encrypted drive. Without the key, it is no longer possible to access the data.<\/p>\n<p>This method is faster than wiping the disk sectors, which can be a lengthy process depending on the number of drives and passes involved.<\/p>\n<p>It is also, theoretically at least, more secure than overwriting. Without access to the key, there is no access to the data\u2014whereas even with the most stringent wiping protocols, concerns persist that data may get overlooked or left in hidden areas of the drive (hence the importance of validation).<\/p>\n<p>Nonetheless, keep in mind:<\/p>\n<ul>\n<li>Self-encryption needs to be activated on the drive at the point of its deployment. Have a section in your data sanitization policy that addresses protocol around drive encryption.<\/li>\n<li>Don\u2019t discount the risk of bad actors sidestepping the security layer and accessing the data in its unencrypted form in other ways\u2014not least by\u00a0locating back-up copies of\u00a0the encryption key that fails to get deleted in the erasure process. As recently as 2018, there were reports of self-encrypted SSDs\u00a0that remained structurally vulnerable to attack.<\/li>\n<li>There\u2019s always the possibility that, at some future point, supercomputers will develop the ability to crack today\u2019s encryption algorithms with devastating speed.<\/li>\n<\/ul>\n<p>Despite these caveats, cryptographic erasure is generally effective and maybe a way of encouraging greater adoption\u00a0of storage device reuse. Specific recommendations for deployment of the method depend on an organization\u2019s own circumstances.<\/p>\n<p>In any event, cryptographic erasure must be coupled with processes for validation and certification to meet the appropriate industry guidelines.<\/p>\n<h2>The NIST 800-88 Standard<\/h2>\n<p>To shift industry behavior toward greater consideration of reuse before electing for dismantling or destruction, data center operators must feel confident in the thoroughness of the data sanitization process for hard drives.<\/p>\n<p>For some time, the \u201cDoD standard\u201d, officially known as DoD 5220.22-M, was widely touted as industry best practice. The problem is that the standard was never intended to be a standard, and\u2014in its stipulation of three overwrite passes\u2014represents too heavy-handed an approach for most data sanitization cases, requiring additional time and cost. If the initial overwrite is sufficiently rigorous and thoroughly tested, isn\u2019t that enough?\u00a0<\/p>\n<p>Despite this, the DOD standard, which originated in 1995, continues to get referenced in ITAD marketing statements today.\u00a0<\/p>\n<p>By contrast, the U.S. National Institute of Standards and Technology (NIST) guidelines for computer media sanitization, known as NIST SP 800-88, are widely considered to be the actual go-to standard. NIST 800-88 provides rigorous and comprehensive guidance for companies and U.S. government entities to ensure they are following best practices for data destruction.<\/p>\n<p>The NIST standard recommends that once organizations decide to embark on a sanitization project, clear steps are followed:<\/p>\n<ul>\n<li>Verification of personnel competencies\u2014meaning that anyone doing the sanitizing is competent and trained on the equipment to be used.<\/li>\n<li>Verification of equipment\u2014meaning that the equipment that\u2019s being used is properly calibrated and that proper maintenance procedures are used on the equipment.<\/li>\n<li>Verification of results\u2014ensuring that the data to be sanitized has actually been sanitized.<\/li>\n<\/ul>\n<p>\u201cSanitization is a process to render access to target data (the data subject to the sanitization technique) on the media infeasible for a given level of the recovery effort. The level of effort applied when attempting to retrieve data may range widely,\u201c the NIST 800-88 guidance explains.<\/p>\n<h2>The ADISA Standard<\/h2>\n<p>Another standard that actively supports organizations seeking to achieve best-in-class control around data sanitization is offered by the Asset Disposal &amp; Information Security Alliance (ADISA). ADISA\u00a0conducts audits of companies\u00a0who wish to become a part of the alliance, and once it\u2019s determined that the company is capable of meeting the organization\u2019s criteria, the company is eligible to apply to be certified.<\/p>\n<p>ADISA has a rigorous process for certification. Once certified, ADISA conducts regular audits of at least two per year. These may include unannounced operational audits of each company, involving forensic tests of a sample size of 10 pieces of media. Full audits are carried out at least every three years.<\/p>\n<h2>The Business Case For Reuse<\/h2>\n<p>Data needs are growing wildly, and HDD will have a\u00a0central role to play in the storage mix for a long time to come. Much in the same way that tape is still in deployment, HDD will remain a permanent fixture as nearline demand and drive capacity to grow.<\/p>\n<p>As such, we need to bring every effort to bear on prolonging the use of each hard disk drive in circulation for as long as possible.<\/p>\n<p>By extension, when a drive has physically failed and dismantling is necessary, we must ensure the smartest possible disposition of the asset. Storage leader Seagate, a member of the cinema&#8217;s HDD working group, calls for the creation of \u201chard drives from hard drives.\u201d Researchers are working to develop innovative ways of reusing and recycling otherwise failed HDD components into new hard disk drives.<\/p>\n<p>Nonetheless, many retiring disks still have a functioning life ahead of them. Through rigorous and professionally managed data sanitization, organizations can recover value from storage hardware, both helping the environment and the bottom line.<\/p>\n<h2><strong>Rules Of Thumb<\/strong><\/h2>\n<p>To build a robust data sanitization framework, follow these steps:<\/p>\n<ol>\n<li><strong>Maintain a data governance framework that<\/strong>\u00a0specifies the kind of data your organization routinely generates. Give parameters for handling and retaining each category of data.<\/li>\n<li><strong>Spell out clear protocols for data sanitization within<\/strong> your data governance policy. Define the extent of human oversight when it comes to enforcing the rules for data sanitization. Ultimately, the software is only as good as the\u00a0humans who oversee it.<\/li>\n<li><strong>Incorporate your company\u2019s approach to hardware refresh cycles<\/strong>(as well as hardware failure) into your planning for data sanitization.<\/li>\n<li><strong>Develop a proactive policy for the internal reuse of storage drives<\/strong>. For drives destined for retirement, explore all options for\u00a0secure remarketing. Destruction should always be the final resort.<\/li>\n<li><strong>Don\u2019t leave details to chance<\/strong>. The security of your data is too important. Be prescriptive in your company\u2019s expectations around the process for data sanitization and the secure handling of storage media and other data-bearing hardware.<\/li>\n<\/ol>\n<p><em>Author: Horizon Technology<\/em><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p class=\"post-excerpt\" class=\"post-excerpt\">ITAD Blog A Guide To Secure Data Sanitization In The Data Center&hellip;<\/p>\n<div class=\"link-more\"><a href=\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/\">Continue reading<span class=\"screen-reader-text\"> &#8220;ITAD Blog:  A Guide To Secure Data Sanitization In The Data Center&#8221;<\/span>&hellip;<\/a><\/div>\n<div class=\"link-more\"><a href=\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/\">Continue reading<span class=\"screen-reader-text\"> \"ITAD Blog:  A Guide To Secure Data Sanitization In The Data Center\"<\/span>&hellip;<\/a><\/div>","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7809","page","type-page","status-publish","hentry","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ITAD Blog: A Guide To Secure Data Sanitization In The Data Center - ITAD Summit - Las Vegas - August 2026 - Conference<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ITAD Blog: A Guide To Secure Data Sanitization In The Data Center - ITAD Summit - Las Vegas - August 2026 - Conference\" \/>\n<meta property=\"og:description\" content=\"ITAD Blog A Guide To Secure Data Sanitization In The Data Center&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/\" \/>\n<meta property=\"og:site_name\" content=\"ITAD Summit - Las Vegas - August 2026 - Conference\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/1-circle.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/\",\"url\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/\",\"name\":\"ITAD Blog: A Guide To Secure Data Sanitization In The Data Center - ITAD Summit - Las Vegas - August 2026 - Conference\",\"isPartOf\":{\"@id\":\"https:\/\/www.itadsummit.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/1-circle.jpg\",\"datePublished\":\"2021-02-04T15:52:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/#primaryimage\",\"url\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/1-circle.jpg\",\"contentUrl\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/1-circle.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.itadsummit.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ITAD Blog: A Guide To Secure Data Sanitization In The Data Center\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.itadsummit.com\/#website\",\"url\":\"https:\/\/www.itadsummit.com\/\",\"name\":\"ITAD Summit - Las Vegas - August 2026 - Conference\",\"description\":\"ITAD Summit - Las Vegas - August 2026 - Conference\",\"publisher\":{\"@id\":\"https:\/\/www.itadsummit.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.itadsummit.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.itadsummit.com\/#organization\",\"name\":\"ITAD Summit - Las Vegas - August 2026 - Conference\",\"url\":\"https:\/\/www.itadsummit.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.itadsummit.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/2025\/09\/ITAD-white-and-red.png\",\"contentUrl\":\"https:\/\/www.itadsummit.com\/wp-content\/uploads\/2025\/09\/ITAD-white-and-red.png\",\"width\":744,\"height\":289,\"caption\":\"ITAD Summit - Las Vegas - August 2026 - Conference\"},\"image\":{\"@id\":\"https:\/\/www.itadsummit.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ITAD Blog: A Guide To Secure Data Sanitization In The Data Center - ITAD Summit - Las Vegas - August 2026 - Conference","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/","og_locale":"en_US","og_type":"article","og_title":"ITAD Blog: A Guide To Secure Data Sanitization In The Data Center - ITAD Summit - Las Vegas - August 2026 - Conference","og_description":"ITAD Blog A Guide To Secure Data Sanitization In The Data Center&hellip;","og_url":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/","og_site_name":"ITAD Summit - Las Vegas - August 2026 - Conference","og_image":[{"url":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/1-circle.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/","url":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/","name":"ITAD Blog: A Guide To Secure Data Sanitization In The Data Center - ITAD Summit - Las Vegas - August 2026 - Conference","isPartOf":{"@id":"https:\/\/www.itadsummit.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/#primaryimage"},"image":{"@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/1-circle.jpg","datePublished":"2021-02-04T15:52:18+00:00","breadcrumb":{"@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/#primaryimage","url":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/1-circle.jpg","contentUrl":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/bb-plugin\/cache\/1-circle.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.itadsummit.com\/index.php\/itad-blog-a-guide-to-secure-data-sanitization-in-the-data-center\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.itadsummit.com\/"},{"@type":"ListItem","position":2,"name":"ITAD Blog: A Guide To Secure Data Sanitization In The Data Center"}]},{"@type":"WebSite","@id":"https:\/\/www.itadsummit.com\/#website","url":"https:\/\/www.itadsummit.com\/","name":"ITAD Summit - Las Vegas - August 2026 - Conference","description":"ITAD Summit - Las Vegas - August 2026 - Conference","publisher":{"@id":"https:\/\/www.itadsummit.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itadsummit.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.itadsummit.com\/#organization","name":"ITAD Summit - Las Vegas - August 2026 - Conference","url":"https:\/\/www.itadsummit.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.itadsummit.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/2025\/09\/ITAD-white-and-red.png","contentUrl":"https:\/\/www.itadsummit.com\/wp-content\/uploads\/2025\/09\/ITAD-white-and-red.png","width":744,"height":289,"caption":"ITAD Summit - Las Vegas - August 2026 - Conference"},"image":{"@id":"https:\/\/www.itadsummit.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/pages\/7809"}],"collection":[{"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/comments?post=7809"}],"version-history":[{"count":2,"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/pages\/7809\/revisions"}],"predecessor-version":[{"id":7850,"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/pages\/7809\/revisions\/7850"}],"wp:attachment":[{"href":"https:\/\/www.itadsummit.com\/index.php\/wp-json\/wp\/v2\/media?parent=7809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}