Security & Logistics
Digerati Global (dba DG Global) designs its solutions to meet clients’ specific IT security requirements and challenges in order to eliminate business risk and liability. DG Global’s IT Security solutions include:
- 100% Physical Destruction On or Off Site
Utilizing a mobile shredder and/or disintegrator, DG Global can physically destroy proprietary boards or IT equipment at clients’ site(s). DG Global can also deploy a portable destroyer to specifically destroy hard drives, CDs/DVDs, cell phones, and other small data storage devices to ensure these devices are physically destroyed prior to leaving the clients’ site(s). DG Global issues a Certificate of Destruction for all physical destruction service (on or off site).
- Data Eradication
DG Global utilizes the latest technology (Secure Erase firmware based command) in data eradication to ensure no sensitive data exists on hard drives in order to meet requirements set by not only clients but also legislations, such as Health Insurance Portability and Accountability (HIPPA), Fair and Accurate Credit Transactions Act (FACTA), Gramm-Leach-Bliley (GLB) Act, and Sarbanes-Oxley. The use of the Secure Erase firmware based command, approved by National Institute of Standard and Technology (NIST) 800-88 (September 2006), not only ensures that all possible user data is erased, amounting to “electronic data shredding”, but also exceeds the traditional DOD 5220.22-M specification. DG Global can also perform separate data wiping method based on the DOD 5220.22-M specification. If required, data eradication service can be performed on site prior to disposing hard drives. DG Global issues a Certificate of Data Eradication for all data eradication service (on or off site).
- Scanning and Gathering of Asset Tags and Company ID
DG Global can perform on site scanning of asset tag, company ID, and/or serial number and upload the information to secure DG Global online tracking system (DGAudit). Clients can access DGAudit at any time to view such information. In addition, if required, DG Global can physically collect all asset tags and/or company ID and return them to the clients. These services can be customized according to specific needs or requirements of the clients.
- Web based IT Asset Management (ITAM) Solution
Developed on a cloud based platform, ITAM solution can be an important part of any IT managers’ tools providing consolidated IT hardware and software asset information to ensure who uses what resources 24/7. Based on real-time scanned data, ITAM can track not only detailed hardware specifications, such as CPU type and speed, installed memory size, IP, HDD capacity, and etc., but also specifications on all installed software, including vendor information, version, product authentication – whether it is an illegal version or not – and etc. ITAM is designed to support multiple operating systems, including all versions of Windows and Linux/Unix, thus practically all of IT assets (hardware and software) can be audited in real time.
DG Global is also ISO 9001 certified to ensure that all work performed is completed under guidelines and requirements of client companies as well as following state and federal laws and regulations, such as:
- Family Education Rights and Privacy Act (FERPA)
- Health Insurance Portability and Accountability Act (HIPAA)
- Sarbanes-Oxley Act (SOX) section 404
Please contact for additional information on any of services mentioned as well as how DG Global can meet your IT security requirements.