Technology & IT Services

Protecting digital innovation requires uncompromising security


In the tech industry, data protection is not just about compliance — it’s about safeguarding innovation. Technology and IT companies work with vast amounts of sensitive information: proprietary code, user data, R&D documentation, confidential contracts, and intellectual property stored across various digital and physical formats. Whether on hard drives, SSDs, backup tapes, or paper documents — every data carrier holds strategic value. Any unauthorized access can lead to financial loss, legal exposure, or reputational damage.

intimus understands the unique challenges faced by tech firms. Our solutions are built to protect what drives your business: information. From compact office shredders for everyday document disposal to high-security media destroyers and degaussers for digital data carriers — intimus enables secure, compliant, and verifiable data destruction across your organization.

With decades of experience in data protection, intimus supports leading tech companies worldwide in meeting international standards such as GDPR, ISO/IEC 21964, NIST SP 800-88, and internal compliance protocols. Whether you operate a startup, a global SaaS provider, or an in-house data center, our systems are designed to fit your needs — robust and built for continuous operation in high-demand environments.

Because in technology, protecting data means protecting everything: your people, your product, your future.

Typical applications in tech and IT environments:

  • Software companies and startups
  • Data centers and cloud service providers
  • IT consulting firms and managed service providers (MSPs)
  • Research and development teams
  • Legal and finance departments within tech enterprises

International standards and guidelines (US and global)


IT and technology companies that operate internationally or work with sensitive data must comply with globally recognised security standards – both for paper documents and digital storage media.

Relevant standards:

  • ISO/IEC 21964 (DIN 66399): International standard for the secure destruction of all types of data carriers – from paper to SSD and HDD.
  • NSA/CSS 9-12 (USA): Specifications for the secure destruction of digital storage media in accordance with US standards; devices must be listed on the NSA Evaluated Products List (EPL).
  • NATO classifications: Protection levels from ‘NATO Restricted’ to ‘COSMIC TOP SECRET’ regulate the handling and destruction of security-relevant data.
  • Common Criteria (ISO/IEC 15408): Globally recognised certification for the security of IT products – important for tenders in the public sector and defence industry.
It 2

Legal requirements in the EU and Germany


Europe has strict legal requirements for handling personal and company-related data. Compliance with these regulations is essential for IT service providers and technology companies.

Relevant regulations:

  • GDPR (EU-wide): Regulates the processing, storage and deletion of personal data – including mandatory, secure data destruction.
  • BDSG (Germany): Supplements the GDPR with national requirements, such as those relating to storage and deletion in companies.
  • DIN 66399: German standard for physical data destruction with seven security levels – basis for ISO/IEC 21964.
  • BSI-Kritis Regulation & NIS-2 Directive: Applies to IT service providers that are part of critical infrastructure – with special security requirements for systems and processes.
  • Archiving laws: Regulations for the legally compliant archiving and subsequent destruction of documents in companies and public authorities.
It 3

Internal specifications and industry-specific guidelines


In addition to legal requirements, many IT companies have internal compliance guidelines for particularly confidential data – for example, from software development, research or customer projects.

Typical internal regulations:

  • Confidentiality levels (‘internal’, “confidential”, ‘strictly confidential’): Definition of protective measures depending on classification.
  • Destruction after project completion: Obligation to securely delete or physically destroy storage media (e.g. SSDs, USB sticks, backup tapes).
  • Requirements for data centres and IT infrastructure: Often a combination of degaussing and physical destruction for maximum security.
  • Security guidelines for IP protection: Essential for start-ups, high-tech companies and R&D departments in particular to protect intellectual property.
  • Certified systems (e.g. P-5 to P-7, E-5, H-5): Internal regulations often require the use of certified devices for destruction.
It 1

Our products

Which security solutions are suitable for your area of application?


Office shredders – Secure document disposal in everyday operations

Technology and IT service providers handle a wide range of sensitive documents on a daily basis — from contracts and internal project notes to employee records and financial reports. To protect this data effectively, intimus office shredders provide a reliable, GDPR-compliant solution right at the workstation. Models with security levels P-4 to P-7 meet the requirements for secure disposal of personal and business-critical information. Compact devices fit discreetly under desks, while larger units support departmental needs and busy workgroups. With intuitive operation and minimal maintenance, these shredders integrate seamlessly into office environments and help ensure ongoing data protection in day-to-day operations.

Disintegrators – Maximum security for confidential development data

For tech-driven companies, protecting intellectual property is mission-critical — especially when it comes to development documents, research findings, or technical schematics. intimus disintegrators offer certified high-security destruction by reducing paper, films, or plastic cards into particles so small that reconstruction is virtually impossible. Depending on the installed screen, the system meets security levels up to P-7, ideal for highly sensitive or classified information. The robust design and simple operation make disintegrators an excellent choice for R&D departments, legal teams, or IT environments where security is a top priority.

Media shredders – Secure on-site destruction of digital storage devices

In many IT companies, portable storage media such as USB drives, SSDs, or SD cards are widely used for temporary project work, data transfer, or backups. When these devices are no longer needed, the intimus FlashEx offers a compact, secure, and efficient shredding solution. Designed specifically for office use, it operates via a standard 230V power outlet and physically destroys flash-based media into small, irrecoverable particles — no technical training required. With security level E-3, intimus FlashEx ensures compliance with data protection regulations and is ideal for small and medium-sized tech firms that require an easy-to-use digital data disposal tool.

Granulators & industrial media shredders – For high volumes and maximum compliance

In data-intensive environments such as data centers, cloud providers, or enterprise IT departments, the secure disposal of obsolete hard drives, SSDs, and backup tapes is essential. intimus granulators and industrial media shredders deliver powerful, high-throughput solutions that ensure complete destruction of digital storage media according to international standards. These systems reach security levels up to E-5 for flash media and H-6 for hard drives, meeting requirements set by ISO/IEC 21964, NIST SP 800-88, and NSA/CSS. With interchangeable screens and rugged designs, they’re ideal for certified IT asset disposal, server lifecycle management, and high-security compliance in sensitive tech environments.

Degaussers & crushers – Maximum protection for magnetic media

For the complete and irreversible erasure of data on magnetic media such as HDDs and backup tapes, many tech organizations rely on a combination of degaussers and physical crushers. intimus degaussers use powerful magnetic fields to erase all data — including overwritten or damaged sectors — beyond recovery. To physically disable the device, a crusher is used to puncture, bend, or break the housing and platters. This two-step process complies with top-level standards such as NSA/CSS 9-12 and provides documented, audit-proof data disposal. It is ideal for in-house server environments, secure data centers, and any IT infrastructure where data protection must be guaranteed beyond doubt.

Home Office Shredder

Office shredders

Disintegrators

Disintegrators

Intimus SSD HDD Granulator

Media shredders and granulators

Intimus 40000S Auditor Pro

Degausser and Crusher

Proven security in action

Trusted by technology leaders worldwide for secure and compliant data destruction.


A European cloud services provider was preparing to decommission a large-scale data center. Hundreds of hard drives and backup tapes containing sensitive client data—including legal records, financial transactions, and personal information—had to be securely erased before hardware disposal.

The company chose a combination of intimus Degausser and Crusher to meet strict compliance requirements, including GDPR and ISO/IEC 21964. The degausser irreversibly wiped all magnetic data, while the Crusher physically destroyed the hardware for added assurance. Thanks to the auditing system intimus AuditorPro, the process was fully documented and certifiable, satisfying both internal security standards and external regulatory audits.

The result: seamless, verifiable, and secure data erasure—completed on site without outsourcing.

It Rechenzentrum

A U.S.-based managed service provider (MSP) needed a scalable solution to regularly destroy used SSDs and hard drives from client installations.

With growing compliance requirements under NIST SP 800-88 and CCPA, the provider turned to the intimus Granulator, capable of destroying both solid-state and magnetic drives in high volumes. By using interchangeable screens, the team achieved security levels of up to E-5 for SSDs and H-6 for HDDs, ensuring irrecoverable destruction.

The system was integrated into the company’s IT asset disposal workflow, improving turnaround times, reducing third-party risk, and enabling a fully traceable, in-house solution. 

It Msp

A fast-growing software development firm working with international clients needed a compact, easy-to-use solution for securely disposing of obsolete flash media. USB sticks, SD cards, and external SSDs were often used for temporary file storage during project development and transfer.

To protect intellectual property and comply with client NDAs, the company implemented the intimus FlashEx shredder. The device operates via a standard office power outlet, making it ideal for deployment across different departments without complex setup. Team members can securely destroy drives immediately after project completion, reducing data retention risks.

With security level E-3, the intimus FlashEx met the firm’s internal policies and client expectations for secure data handling—without slowing down workflows or requiring IT staff involvement.

It Software

Meeting the data security requirements of the tech industry

Your benefits with intimus.


  • Legally compliant destruction of sensitive and business-critical data

Tech companies handle a wide range of sensitive information—from customer data and intellectual property to development files and internal records. intimus systems comply with globally recognized data protection regulations such as GDPR, ISO/IEC 21964, DIN 66399, and NIST SP 800-88, ensuring your data disposal processes meet the highest legal and industry-specific standards.

  • Comprehensive product portfolio for every media type

Whether you need compact shredders for paper documents in your offices, or high-throughput systems for securely destroying hard drives, SSDs, USB sticks, or large volumes of physical paper records—intimus offers tailored solutions across all media types and security levels, built for the needs of IT departments and service providers.

  • Adaptable security levels for different protection requirements

Disintegrators and granulators from intimus allow custom security configurations through interchangeable screens. Whether you're destroying confidential paper (up to P-7), HDDs (up to H-6) or SSDs and flash media (up to E-5), you can easily adapt the system to your compliance needs or internal security policies—without investing in multiple machines.

  • Audit-ready documentation for compliance and certification

Many IT service providers and tech companies are required to document the destruction of digital media for legal, contractual, or audit purposes. intimus auditing system can log serial numbers before destruction and export them in a secure, tamper-proof report—ensuring full traceability and audit compliance.

  • Built for continuous use and ease of integration

Designed for 24/7 operation, intimus systems are robust, reliable, and user-friendly, making them ideal for use in fast-paced tech environments such as data centers, secure labs, or IT asset management teams. Integration into existing workflows is simple and intuitive.

  • Expert service and long-term support

From initial consultation to ongoing maintenance and technical support, the intimus team ensures your data destruction systems operate securely and efficiently over the long term. Replacement parts and service contracts are available worldwide—minimizing downtime and protecting your operations.

Why intimus?


007

High security expert since 1975

intimus developed the world's first high security shredder

Certified Security

Certified security

intimus high-security products are listed on the NSA Evaluated Product List

Passion

Customised solutions

Tailor-made solutions: From individual devices to complete security concepts.

Ready for maximum data security?

Secure your confidential information - permanently and reliably.


Our experts will advise you individually and work with you to develop the optimal destruction strategy.

Intimus Contact

Contact us now

Get a non-binding consultation - open contact form

 

General DE

Download product catalogues

All security solutions at a glance - start PDF download

Newsletter Intimus

Subscribe to our newsletter

New products, safety tips & expertise straight to your inbox - Subscribe now