Salvation Data Data Copy King Vs Ninja

3
Comparison review of Data Copy King and Ninja The comparison table will help the potential customer to compare and make a choice with one single sight between Data copy king and Ninja duplicator. Data Copy King Ninja Review results General Picture Time to market March 2010 September 2009 Price 1,998USD 1,590 USD Target drive One to one One to one Potable design Stand-alone/potable Option Drive capacity supported TB-level hard drives( up to 131072TB) Mostly target to small capacity hard drives Drive supported IDE/SATA RAID/external hard drive / SSD / flash storage media (USB, SD, CF, memory stick etc) with optional adaptor IDE/SATA Duplication functions Coping rate 6.0GB/min 4GB/min Test, wipe repair functions Erasing transfer rate 6.6GB/min 2-5 GB/min Data wiping Yes Optional(charge $700 to forensic version with hdd test) Products Features

Transcript of Salvation Data Data Copy King Vs Ninja

Page 1: Salvation Data Data Copy King Vs Ninja

Comparison review of Data Copy King and Ninja

The comparison table will help the potential customer to compare and make a choice with one

single sight between Data copy king and Ninja duplicator.

Data Copy King Ninja

Review results

General

Picture

Time to market March 2010 September 2009

Price 1,998USD 1,590 USD

Target drive One to one One to one

Potable design Stand-alone/potable Option

Drive capacity

supported

TB-level hard drives( up to

131072TB)

Mostly target to small capacity hard

drives

Drive supported IDE/SATA

RAID/external hard drive / SSD /

flash storage media (USB, SD,

CF, memory stick etc) with

optional adaptor

IDE/SATA

Duplication functions

Coping rate 6.0GB/min 4GB/min

Test, wipe repair functions

Erasing transfer

rate

6.6GB/min 2-5 GB/min

Data wiping Yes ⑧ Optional(charge $700 to forensic version

with hdd test)

Products

Features

Page 2: Salvation Data Data Copy King Vs Ninja

HDD test Yes Optional (charge $400 to ninja kaze

together with data wiping)

Test without

altering HDD data

Yes No

Control the imaging

process ⑤ Yes

Yes

Data recovery functions

Bad sector repair ①①①① Yes No

Clicking noises

handling ②②②② Yes

No

Physical read-only Yes Yes

Forensic functions

Access to HPA and

doc hidden area

Yes Yes

Smart drive

reset/reboot ④④④④ Yes

N/A⑨

Backdoor design ⑩ No N/A

verification CRC32 /SHA-256 CRC

Data erasing

standard

DoD--5220.22-M/PRC--

BMB21-2007⑥

No

DD image Available in upgrade No

MD5 hash

calculation

Available in upgrade No

Log auto generation Yes Yes

Log export and

print

Yes No

Others

Touch Screen User

Interface

Yes Yes

User authority⑦⑦⑦⑦ three-level password No

Language English (Customized to other

languages)

Only English

Upgradable free lifelong software upgrade No

Technique support Free lifelong support Limited free support

Page 3: Salvation Data Data Copy King Vs Ninja

Warranty One year with 3 year optional N/A

NOTE: Words in green refers to the distinguishing features of DCK ① Traditional disk imaging tools and methods are designed to deal with intact hard drives,

not the unstable ones with bad sectors that are your stock-in-trade. Bad sector handling is

capable of the patient Drives with stop responding, disks degrade or fail under intensive

reading, valuable files remain locked in bad sectors. ② Hard drive suffered clicking noises, only if the patient drive is still recognized in the bios, Data

copy king is able to clone 300% more data than other data image tools from the patient drive ③ Data loss due to accidental deletion, accidental format, file corruption, software bugs, file

system corruption, viruses, etc ④ Automatically resets/reboots drives that become unresponsive to continue imaging process ⑤ Stop or continue the imaging process as you need ⑥ DOD—Department of Defense

PRC--the People's Republic of China ⑦ Three-level user password setting to secure the confidential data ⑧ YES – available ⑨ N/A—NOT Available ⑩ A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing

normal authentication, securing remote access to a computer, obtaining access to plaintext, and so

on, while attempting to remain undetected. The backdoor may take the form of an installed

program (e.g., Back Orifice), or could be a modification to an existing program or hardware

device.