• Skip to main content
Intimus Logo
  • US/International
    • Spain
  • Country
    • North America
    • North America Shop
    • Belgium (Dutch)
    • Belgium (French)
    • Germany
    • France
    • Luxembourg
    • Netherlands
    • Portugal
    • Austria
    • China
Country
×
  • US/International
  • Spain
  • North America
  • North America Shop
  • Belgium (Dutch)
  • Belgium (French)
  • Germany
  • France
  • Luxembourg
  • Netherlands
  • Austria
  • Portugal
  • China
  • Home
  • About Us
  • Products
    • information security icon Information Security
      • Document Shredders
      • Electronic Media Erasure
      • Physical Data Destruction
      • Physical Media Disintegrators
      • Cardboard Packaging Recyclers
      • XL & XLM Series Industrial Shredders
    • business information solutions icon Business Information Solutions
      • Folder-Inserters
      • Mail Processing
      • Roller Trimmers
      • Lever Trimmers
      • Guillotines
      • Laminators
      • Creasing Machines
      • Comb Binding Machines
      • Wire Binding Machines
      • Thermal Binding Machines
    • cash management icon Cash Management Systems
      • Retail Cash Deposit Systems
      • Back Office Cash Processing Systems
      • Industrial Cash & Coin Processing Systems
    • physical security icon Physical Security
      • Certified Safes
      • Under Counter Safes
  • Industries
    • Healthcare
    • Enterprise
    • Corporate
    • Banking
    • Government
    • Technology Companies
    • Casino
    • Education
    • Recyclers
    • Retail
  • Resources
    • White Papers
    • ROI Calculators
    • Product Information
  • Contact
us-flag-icon

(800) 775-2122

europe-flag

+49 (0) 7544 / 60-0

White Papers

In order to know what products are necessary to keep your organization’s sensitive data secure, you need a deeper understanding of data security and how data thieves exploit commonly exploit weaknesses in the standard practices of businesses, non-profits, and government agencies.

Here you can explore a collection of in-depth, informative guides and reports on data security, solutions to weaknesses in common data destruction techniques, and more.

Hard Drives

Best Practices for Destroying Hard Disk Drives: Shredding Versus Degaussing

Nov 21, 2017
Intimus offers degaussing equipment which complies with even the most challenging data security requirements.
READ MORE
Usb sticks being put into a degausser machine

SSD, Flash Memory, USB Stick, Phone Memory, Tablet Memory Destruction Guidance

Nov 21, 2017
Having a good end of life cycle/failed media plan ensures that risk can be reduced greatly or completely nullified.
READ MORE
Ransomware Report Title

Datto’s State of the Channel Ransomware Report

Nov 21, 2017
The report provides a wealth of detail on ransomware, including year-over-year trends, frequency, targets, impact, and recommendations.
READ MORE

INTIMUS INTERNATIONAL

Bergheimer Straße 6-16 88677, Markdorf, Deutschland
+49 (0) 7544 / 60-0
sales.de@intimus.com

INTIMUS NORTH AMERICA

251 Wedcor Avenue, Wabash, IN 46992
(800) 775-2122
sales.us@intimus.com

CONNECT

RESOURCES

ABOUT US
WHITE PAPERS
ROI CALCULATORS
PRODUCT INFORMATION
CONTACT

PRODUCT AREAS

INFORMATION SECURITY
BUSINESS INFORMATION SOLUTIONS
CASH MANAGEMENT SYSTEMS
PHYSICAL SECURITY

INDUSTRY

CORPORATE
BANKING
RETAIL PRODUCTS
CASINO
ENTERPRISE
LARGE TECH FIRMS
HOSPITAL/HIPAA
EDUCATION
GOVERNMENT
RECYCLERS

LOCATIONS

UNITED STATES
GERMANY
PORTUGAL
SPAIN
FRANCE
BELGIUM
NETHERLANDS
LUXEMBOURG
AUSTRIA

This website makes use of cookies to enhance browsing experience and provide additional functionality. None of this data is stored or can be used to identify you.

View our privacy policy to learn how we protect your personal information.

Copyright © 2022 | intimus | Data Protection | Imprint