Encrypted Data Recovery

Data Recovery Group can work within your company's IT department and security policies to establish a process that will get your valuable data back quickly and securely.

Contact the Data Recovery Group location nearest you and speak with an experienced representative who can answer your questions about recovering encrypted drives for your company. 

In today's business data encryption has become a common method to protect valuable company data and enhance privacy. While encryption adds an element of complexity to the data recovery process, encrypted data can indeed be recovered by experienced data recovery specialists at Data Recovery Group.

For over twenty years, Data Recovery Group has successfully recovered data for a variety of government organizations and businesses that utilize various types of encryption technologies including: Bank of America, Department of the Army, Honeywell, Lockheed Martin, FDA, Raytheon, General Electric, USDA, Bureau of Printing and Engraving, NASA, Chase Manhattan Bank, IBM, Kimberly-Clark, AT&T, Johnson & Johnson, and more.

Data Recovery Group has the capability to recover data while leaving the data in its encrypted form throughout the entire process. Many organizations are comfortable providing encryption keys so that data can be decrypted and verified before it is returned, however this is not always the case. For some organizations, providing encryption keys to an outside vendor such as a data recovery provider is against their security policy. In these cases, the data will be recovered and sent back to the client in its encrypted form on a new hard drive; however, the specific file condition will be unknown until the files are decrypted by someone with access to the encryption key.

Lost passwords and/or encryption keys

The most important aspect of encryption deployment is management of keys (passwords, files, tokens, certificates, etc). Each technology and product handles this differently, but a lost/incorrect key could lead to the inability for authorized people to decrypt information. In cases where the keys have been lost or a password has been forgotten, we typically do not attempt these types of recoveries and refer the customer back to the software provider.