Where Does Networking Data Sanitisation Automation Actually Fit?
In the second episode of The Den, Novafox’s Jon Woodward and Adam Burrett take a step back from the technology itself and address a practical question many organisations in the IT lifecycle industry are now asking:
When does it actually make sense to automate networking device data sanitisation?
Solutions like Hydra are designed to simplify the secure erasure of switches, routers, firewalls and other networking infrastructure. But automation isn’t just about speed. In fact, as discussed in the episode, the real value lies elsewhere.
To understand why, it helps to look at how networking equipment has historically been processed within the ITAD and brokerage ecosystem.
The Manual Reality of Network Device Erasure
Unlike laptops, servers and storage devices — where data sanitisation tools are well established — networking equipment has traditionally relied on manual command-line processes.
In many workshops the workflow looks something like this:
- Connect to the device via a console session
- Research or recall the correct commands
- Execute erase or reset procedures manually
- Verify the device configuration has been removed
The tools often used are simple ones: PuTTY, vendor documentation and a set of internal notes maintained by engineers.
This approach can work, but it comes with several operational challenges.
Firstly, the process is highly dependent on individual expertise. Many ITAD operations rely on one or two engineers who understand the nuances of different vendor platforms.
Secondly, the workflow is manual and repetitive, increasing the likelihood of human error. A missed command or an interruption at the wrong moment can lead to inconsistent outcomes.
Finally, and perhaps most importantly, these processes rarely produce independently verifiable evidence that data has been securely sanitised.
Why Factory Reset Isn’t the Same as Data Sanitisation
One of the themes explored in the episode is the persistent misconception that a factory reset equals secure erasure.
In reality, networking devices often store sensitive information across multiple areas of persistent storage, including flash memory and NVRAM.
These locations can contain:
- Administrator credentials
- VPN configurations
- SSH keys and certificates
- VLAN tables and network mappings
- Backup configurations
A factory reset may remove visible configuration files, but it does not necessarily overwrite the underlying storage media where remnants of that information may still exist.
From a compliance perspective, that distinction matters.
Modern frameworks such as NIST SP 800-88 Rev.2 and R2v3 increasingly treat networking equipment as data-bearing assets, meaning the same rigour applied to servers and storage should now be applied to switches, routers and firewalls.
The Certification Challenge
Another issue with manual processes is verification.
Even when engineers carefully follow documented steps, proving that the process was performed correctly can be difficult.
Many organisations attempt to generate evidence by capturing device configurations before and after a reset. However, this approach can introduce new risks, as pre-erasure configurations may contain sensitive customer information.
Without an independently verified process and a consistent method of reporting results, organisations may struggle to demonstrate that data sanitisation has been performed to recognised standards.
Where Automation Starts to Make Sense
Automation platforms such as Novafox Hydra aim to solve these challenges by removing reliance on manual command execution and replacing it with a repeatable, auditable process.
Rather than requiring technicians to remember vendor-specific commands, automated systems can:
- Identify supported devices automatically
- Execute the correct sanitisation workflow
- Overwrite storage media where required
- Verify the outcome of the process
- Produce an audit-ready certificate of erasure
Importantly, the goal is not simply to make the process faster.
In many cases, the actual erasure time remains similar. What automation dramatically reduces is hands-on engineering time and the operational risk associated with manual intervention.
A Tool That Scales With Your Operation
One of the key points raised in the discussion is that automation doesn’t require enormous processing volumes to be viable.
Hydra was designed to scale with the needs of ITAD operations, from small batches of devices through to large processing environments handling thousands of units per month.
Organisations can start with a single unit and expand as their networking workflows grow.
Because the platform automates complex command sequences and provides certified reporting, even relatively small volumes can justify the investment by reducing engineering overhead and strengthening compliance.
Why the Industry Is Starting to Change
Another major theme explored in the episode is the changing perception of networking equipment risk.
Historically, networking devices have not always been treated with the same level of caution as other IT assets. But that mindset is shifting.
End users are becoming increasingly aware that routers, switches and firewalls contain sensitive operational data, and many are beginning to demand verifiable sanitisation processes before equipment leaves their control.
At the same time, standards bodies and industry frameworks are beginning to formalise expectations around networking device sanitisation.
The result is a gradual shift in the market: organisations that can provide clear, auditable evidence of secure data erasure are increasingly differentiating themselves from those relying on informal processes.
Watch the Full Episode
In this episode of The Den, Jon Woodward and Adam Burrett explore these topics in more detail, including:
- Why networking device erasure is often misunderstood
- The limitations of manual command-based workflows
- How standards such as NIST SP 800-88 are shaping expectations
- When automation tools like Hydra genuinely add value
▶ Watch the full episode here:
https://youtu.be/2RHFWARcySU?si=pi5axEJjZeePCfQa
Ready to See Hydra in Action?
Novafox offers a 30-day trial programme, allowing organisations to test Hydra in their own environment and evaluate how it fits within their existing workflows.
To learn more or request a demo unit, get in touch with the Novafox team. Click Here

