Reliable On-Site Data Destruction Services

At the core of Securis’ data destruction process is our media shredding services, which can be performed on-site at the customer’s premises or in our secure, access controlled facilities.

Securis utilizes an industrial shredder to chop, mince, and shred hard drives, cell phones, tapes, and other data storage devices into tiny, inaccessible fragments. Our system is completely self-sufficient, utilizing power from our secure service truck’s internally mounted generator, requiring no use of any facilities resources to operate.

As critical as the shredding machine itself are the secure, meticulous and documented processes to get hard drives from your facilities to the machine and disposing of the shredded material afterwards. Over the last decade, Securis has invested in a proven, end-to-end process that provides protection and accountability through the entire chain of custody of your IT assets.

Securis’ services meet all Federal regulatory standards, are GSA-approved and have earned numerous industry certifications for security and environmental responsibility. a truly comprehensive approach to secure and responsible data and IT asset destruction includes all of the elements below.

Data Destruction Services

ITAD Process

Secure
Transport

Inventory
Scanning

Data
Degaussing

Data
Destruction

Domestic
Processing

Ultra-Secure Data Safety Measures

IT Asset & Data Security

  • Locked tote bins for transportation of media on the job
  • Scheduled destruction times
  • Scanning for inventory record/ asset tracking
  • Quantity discounts
  • Certificate of destruction
  • Pre-screening of technicians
  • Locked collection tote bins left at the client site
  • Property management interfacing
  • On-site and off-site shredding
  • Customized service delivery; logistics and pickup
  • On-site and off-site degaussing
  • Incineration
  • GPS tracking of trucks

Data
Destruction

Process Security

  • Secure storage bins
  • Locked truck
  • Scanners used to record serial numbers for inventory
  • Asset tagging for tracking of equipment without serial numbers
  • NAID certified for mobile operations
  • Attend to media to be destroyed at all time
  • Customers receive a certificate of destruction

Securis Staff Security

  • Background checks through Kroll
  • Fingerprint records
  • ID badges
  • Significant training
  • Lead security technicians
  • 2-way mobile communication devices
  • Drug tests on all employees
ITAD WHITEPAPER &
COMPARISON CHECKLIST
Download Now
Exit mobile version