Ureach U-Raze Series – USB Erase Software

$2,500.00
SKU: URaze500
Brands:

U-Raze is a portable, USB-based software solution designed for securely erasing data from storage devices. Unlike traditional data deletion methods that may leave traces behind, the U-Raze ensures complete and irreversible data removal, making it ideal for individuals and organizations prioritizing data security.

License Duration: 1 USB, unlimited use for 1 year upon activation

Features:

  • USB-Based Operation: The software runs directly from a USB flash drive, eliminating the need for installation. This makes it convenient for use across multiple systems without leaving any software traces.
  • Secure Data Erasure: The software employs 17 data-wiping algorithms to permanently remove files, ensuring that deleted information cannot be recovered by forensic tools. From “Fill with Zeroes” to “DoD 522.0.22-M” 
  • Cross-Platform Compatibility: can erase data from storage devices regardless of the operating system, making it a versatile tool for IT professionals and businesses managing multiple platforms. Works with any SATA, NVMe, or USB drive installed or plugged into your computer
  • Compact and Portable Design: Sleek design with metal swivel chassis for protection and rigidity
  • Log Report Functionality: Saves all tasks as a PDF file in the USB device and records the date and time, erasure method, user, etc.
  • Ease of Use: User-friendly interface, allowing users to initiate secure data deletion with minimal technical knowledge.
  • Eco-Friendly: All packaging is made with 100% recycled material

This tool is particularly useful for those looking to decommission old storage devices, sell or donate used computers, or ensure compliance with data protection regulations. Its portability and effectiveness make it a valuable asset for anyone concerned with data security.

15 Erasure Methods

● Secure Erase
● Sanitize Erase
● Fill with Ones
● Fill with Zeroes
● Fill with Random Numbers
● Fill with “Random” 3 Times
● DoD 5220.22-M
● DoD 5220.22-M EMC
● RCMP TSSIT OPS-II Method
● HMG IS5 Baseline Method
● HMG IS5 Enhanced Method
● Fill with Random (Mersenne Twister)
● Fill with Random (ISACC-64)
● Fill with Random (Lagged Fibonacci Generator)
● Fill with Random (XORoshiro-256)

Disk Explorer

Display any detected disk or device

A computer interface displays two connected drives: A SU650 with 223.57 GB available on Port#1, and KINGSTON SKC6002 with 238.47 GB available on Port#2. Both are labeled as available.

Disk Viewer

View contents of a selected drive before or after any task

A digital interface shows hexadecimal data for a storage device. Navigation buttons labeled Back, Prev, and Next are at the bottom. The available storage is 223.57 GB, and the interface displays various options and device details.

 User Profile

Set a username while in use of the USB Erase device to indicate who is responsible for proceeding task(s)

A tablet screen shows a storage management app with two drives listed, both marked Frozen with their capacity shown. A virtual keyboard is open at the bottom with UReacher typed in the input field.

Log Report Viewer

List and view all task reports on the USB Erase Device

A software interface displays a list of data erasure tasks, showing examiner, title, date, state with checkmarks or a blocked icon, and status as Open. The bottom shows copyright information and a paginated navigation bar.

Log Report Example

A digital erase report for a KINGSTON SKC600256G drive shows the erase method was /dev/random, one round, and the result was Success. The process took 20:27 minutes, completing on 2025-01-08 at 01:04:51 UTC.
CertificationDescription  Year Certified
Common Criteria Certification
An international standard (ISO/IEC 15408) that provides assurance of the security of IT products and systems by certifying that their security functions have been independently evaluated.
Applying in Progress
General Intelligence and Security Service
The intelligence and security agency of the Netherlands, tasked with domestic, foreign and signals intelligence and protecting national security.
Applying in Progress
National Cyber Security Centre
The National Cyber Security Centre, a part of GCHQ, helps businesses, the public sector and individuals protect the online services in the UK.
Applying in Progress
NATO NIAPC
The NATO Information Assurance Product Catalogue (NIAPC), established under Technical & Implementation Directive AC/322-D(2019)0041-REV1, provides NATO nations, and NATO civil and military bodies with a catalogue of Information Assurance (IA) products, Protection Profiles and Packages that are in use or available for procurement to meet NATO’s operational requirements.
Applying in Progress
Secura
A cybersecurity company that offers a variety of services, including testing, training, and certification for industrial and IoT environments.
Applying in Progress
Traficom
Finnish Cybersecurity Label for smart devices, which is awarded by the National Cybersecurity Centre Finland under Traficom to indicate secure products, or a facility security clearance vetting certificate
Applying in Progress
TÜV Saarland
TÜV signifies that a product, system, or service meets established safety, quality, and performance standards in Germany.
Applying in Progress
ADISA
ADISA is a UK certification body that audits and certifies companies, processes, and software involved in IT asset disposal. It corroborates secure data sanitization methods and compliance with standards like NIST SP 800-88.
ADISA certificate number: AAC185

Acquired: August 2025

Note: Not supported on Apple Silicon (M1 or newer), requires Intel-based Macs

General

ModelURaze500

Features

Operation Type USB Flash Drive Startup
O/S SupportBuilt-in O/S
Utilizes BIOS or UEFI startup
Compatible DevicesSATA and IDE connected HDDs (Hard Disk Drives)
SATA and NVMe connected SSDs (Solid State Drives)
eMMC (Embedded MultiMedia Card) storage
USB flash drives and external USB storage devices

System Requirements

Processor1 GHz or faster x86-64 processor.
Memory (RAM)Minimum 2 GB
DisplayMonitor with at least 1024×768 resolution.
USB PortUSB 2.0 or higher

Specifications

Physical Dimensions(L×W×H)67mm x 19mm x 6mm (2.63in. x 0.75in. x 0.25in.)
Product Weight0.03 kg (0.06 lbs.)
License Duration1 year
License UsageUnlimited while active

Title
U-Raze USB Erase
User Manual
Download


Title
U-Raze USB Erase
Quick Guide
Download

Q1. Do I need to install the software onto a drive?

No, the U-Raze USB is software that is run from the USB flash drive itself. Installation on a drive is not required, but the USB flash drive must be connected to the target computer until the data erasure process is completed.

Q2. Can this erase other USB drives?

Yes, the U-Raze USB can erase any SATA, NVMe, or USB device plugged in or installed on your computer

Q3. Do I need to restart the software if I plug in a new drive?

No, once a new drive is installed, or plugged in, the U-Raze will shortly display it as an available drive.

Q4. Is the method for loading the software different on a Mac or Chromebook?

This method varies by manufacturer on startup you will need to press or hold a key, (commonly F2, F10, F12, Delete, Esc for Windows and Chromebooks, or the Option key for Mac). Look for a prompt on the screen during startup that indicates which key is necessary to press, or consult your PC manufacturer for details.

Q5. What if I want to save the log reports elsewhere?

All log reports are viewable via the log report viewer when using the software. Otherwise they are also all saved as a PDF on the drive itself and you may move or copy the files to wherever you may need them. 

Q6. How to Secure Erase Disk in frozen state via U-Reach Disk Eraser?

• If the storage device is a portable data storage device, disconnect it, reconnect it, and wait for it to reappear in the device list.

• Put the system to sleep and then wake it up.

• Press the sleep button. When prompted to confirm hibernation, press OK again.

• Press the power button on the computer to resume operation.

• Wait for the computer to wake up completely.

• After the system is restored and the device status changes to “Available”, you can continue to use the security wipe feature to clear data. 

Q7. How long can the software use?

1 USB, unlimited use for 1 year upon activation