BitRaser Virtual Machine Eraser
BitRaser Virtual Machine Eraser
BitRaser Virtual Machine Eraser / 6. Frequently Asked Questions (FAQs)
Virtual machines are software-based replicas of physical machines. It also contains sensitive data just like physical machines. When the virtual machine is to be destroyed or decommissioned, it is necessary to erase all the sensitive data within the virtual machine as it contains sensitive and confidential information. Using this software, you can erase one or multiple virtual machines simultaneously.
Yes, BitRaser Virtual Machine Eraser removes data beyond recovery.
Yes, you can do it. Refer to Preview and Save section to know more.
Yes, you can apply a date filter to search the reports by specifying a date range in the "From" and "To" fields located in the upper-right pane of the screen. To know more, click here.
Yes, you can send the report directly to the BitRaser Cloud. For more information, click here.
You can save reports in PDF or XML formats.
It depends upon how many times an algorithm overwrites the data precisely or the number of passes used to erase the data. The more the number of passes used by the algorithm, more effective it is. Each algorithm performs a different set of features from which you can choose the suitable algorithm as per the requirement. See List of Erasure Algorithms and their Descriptions, to know more.
It depends on the size of the VM storage and the configuration of the system and the algorithm you are using to erase the virtual machine. A large volume of VM storage, lesser configuration and more number of passes may consume more time for erasure.
BitRaser Virtual Machine Eraser supports the following configurations for the erasure process:
Hyper-V
Within the Same System: The application, host, and virtual machine storage are all within the same system.
Same Network Setup: The application and host are on one system, and the virtual machine storage is on another system within the same network.
Via iSCSI: The application and host are on one system, while the virtual machine storage is on a different system accessible via iSCSI.
Different Network, Access through static IP: The application is on one system, and the host and virtual machine storage are on a remote system accessible via static IP.
Multi-System Architecture: The application is on one system, the host on another remote system, and the virtual machine storage is on a third system.
ESXi
Multi-System Architecture: The application is on windows system, the host on another Linux ESXi host server, and the virtual machine storage access via iSCSI using LAN protocol.
Yes, this software automatically fetches the details of the virtual machines created on a host such as Hyper-V and ESXi. It also provides the option to erase virtual machines either together or separately, based on your requirements.