A customer finishes a proof of concept (PoC) evaluation of a DL380 Gen10 system and needs to securely overwrite all internal system storage and attached hard disks by applying random patterns in a three-pass process following security guidelines before the system can be redeployed. Which tool should be used?
Currently there are no comments in this discussion, be the first to comment!