War, don't you have a programmer on your team who could write a custom application to suit your needs?
It seems like it would be a fairly easy task overwite files or disk sectors to meet current security standards. I haven't played with the notion since DoD 5220.22-M in the early '90s (the standard wasn't too secure since it only required three sets of writes: 1's followed by 0's and then a verified write of 2's)
My concept of a software sledgehammer would involve a low-level format, followed by high level format using a different file system, followed by repeated overwites of each disk sector using 255 bit patterns, followed by another low-level format and a high-level format to return the disk to its original file system. Perhaps a bit excessive, but anybody who has used recovery packages such as Lost and Found is aware that old data can be very hard to permanently delete.