Processing Your Payment

Please do not leave this page until complete. This can take a few moments.

October 30, 2018 Manufacturing insights

Security Engineered Machinery turns electronic data into dust

Leonard Rosen, co-founder of Security Engineered Machinery.

As the world becomes more technologically advanced, so has the world of data destruction. Westborough-based Security Engineered Machinery, founded more than 50 years ago, has met that demand with devices tho destroy hard drives. Founder Leonard Rosen spoke to WBJ about the company’s role in securing the information of government agencies and government contractors.

How does SEM help keep the country’s data secure?

Every military installation -- and company of note -- is involved with electronic media. In the past, it was all paper. As time went on and advancements were made in communications and data storage, electronic media became the ultimate in information accumulation. 

We have adapted by coming out with machines that can destroy the information on these new devices.

What kind of machines?

Our biggest area of expertise is in hard-drive destruction. That’s done in several ways. One is by deaussing, which is introducing a magnetic charge to a hard drive that basically erases that information.

Are the physical items also destroyed?

We have crushers that exert force into a hard drive and very heavy-duty shredders that accept hard drives and chew them up into tiny pieces.

How much communication is there with customers on new adapting SEM devices to fit their needs?

Depending on what the government agency or defense contractor is doing, we can adapt our machines to meet whatever security requirement they have.

SEM does work with defense contractors?

You’ll be hard pressed to find a major defense contractor in the U.S. that doesn’t use our technology.

Do these products have to meet any government standards?

When we find out what new devices need to be destroyed, we either have something that can destroy it or we start designing one that can do it. Once we have a completed product that we have confidence in, we sent it to National Security Administration for evaluation.

How is it evaluated? 

They put it through volume tests, but the end product is more important. The toughest thing we’re doing now is destroying solid state drives. There’s so many layers of information in those, so it’s a two-step situation.

This interview was conducted and edited for length and clarity by WBJ Staff Writer Zachary Comeau. 

Sign up for Enews

WBJ Web Partners

0 Comments

Order a PDF