englishenglish USenglish EUgerman
Mac App Store


Protect your company and yourself
from data and identity theft.

Did you know, how easy deleted files can be retrieved using commonly available file recovery tools?

Ordinary "delete" operations only remove bits of information from files, so they just appear deleted. Even simple overwritten data can be recovered using sophisticated tools. ( Why shred files? )

The only and surest way to protect your company and yourself from data or identity theft is to shred sensitive documents at the source with a high security tool.

One of the best security application is High Secure Shredder. It supports the most secure document shredding standards world wide, including

  • The United States Department of Defense 5220.22-M National Industrial Security Standard,

  • The USAF Cryptologic Support Center purging Standard and

  • The Gutmann method.

And a detailed report keep you informed about all shred activities at any time.

Reliable, convenient, safe, and easy-to-use, High Secure Shredder has set the world standard for high quality engineering. With High Secure Shredder all traces of your documents are gone.



High Secure Shredder key features:

Detailed status reporting about all shred activities.
Meets the high secure document shredding standards, including AFSSI-5020, DoD 5220.22-M, Zero Out, Quick and Gutmann.
Additional overwriting with ASCII data
Visual and audio feedback.
Drag & Drop support to easily shred mass of files.
Detailed reporting about all shred activities.


High Secure Shredder Status Report

With the High Secure Shredder Status Report you are always informed about all shred activities.

The report helps you to figure out what's going on while shredding files, it enables you to identify errors and suggest corrective actions.


High Secure Shredder system requirements

  • Mac OS X Version 10.6.6 (Snow Leopard) or later.

  • Intel Mac.


« Start Previous 1 2 3 4 5 Next End »
(Page 2 of 5)
US Treasury Department

"Before, criminals used to steal money to become rich, but now they have realized that they can be rich by stealing corporate information."

Statement from a US Treasury Department official

Find us on Facebook

Deal Alert


Photo Converter
Image Dream
Best Image Converter
jalada Fractal
Just Translate
Zen Writer
Language Alchemist
Lexis Builder
My Logo
High Secure Shredder
jalada Arctic Fun
jalada Hamia 2
jalada Chungu 2
Chain Reaction
Carry on Farming
jalada Chungu
jalada Hamia
jalada's Spinball
jalada Christmas
Quick Links
Mac OS X
Send an eCard
Contact Us
About us
Privacy Policy
Let's talk
Find us on Facebook
Follow us on Twitter
Find us on Facebook