Hidden Data Risks: The ITAD Oversights That Put Your Business at Risk

Are You Really Destroying All Data? Most Companies Aren’t.

Every company handling end-of-life IT equipment has a top requirement—secure equipment disposal. Yet, even the most diligent organizations routinely miss hidden data-bearing devices, exposing themselves to serious security risks. Hard drives, SSDs, and even embedded storage in modern electronics are often missed, leaving sensitive information vulnerable to breaches. Gartner research indicates that a considerable percentage of IT assets, around 30%, can be lost or unaccounted for. This “loss” can manifest in various ways, including physical loss, misplacement, or “ghosting” (assets that are active but not tracked).

data storage can hide in copy machines

 

The Hidden Data Risks Lurking in Your IT Assets

Even security-conscious organizations fail to account for all data storage devices. Here are real-world examples of how missed hard drives and other storage media can lead to serious vulnerabilities:

  • Governmental Vulnerabilities: Securis found Top Secret diagrams for a key U.S. Government building mixed in with discarded items during a routine electronics recycling pickup. Without thorough IT asset disposition (ITAD) procedures, this could have led to a catastrophic security breach.
  • Financial Industry Oversights: A financial services company, confident in its IT asset management, had already shredded its own drives. Yet, Securis’ triple-check process found an unaccounted-for storage drive hidden in a copier—a device often overlooked as a data risk as well as three additional items that were not in the companies inventory list. These overlooked assets could have led to a major compliance failure.
  • Server Room Blunders: Another financial services client assured Securis that all hard drives had been removed from eight decommissioned server cabinets. Upon our close inspection, 86 drives (72 SSDs and 14 HDDs) were discovered—a staggering 15% of the total drives assumed to have been removed. 
  • Telecom Mishaps: A major telecom company decommissioned 300 servers, claiming all storage had been stripped. Securis uncovered 30 overlooked hard drives—each containing potentially sensitive data.

Hidden data may be lurking in your end of life IT Assets

 

Government Reports Confirm Data Disposal Failures

data is inside of medical devices also

Medical Devices: The Overlooked Data Risk

It’s not just traditional IT equipment—embedded storage in medical devices and equipment is often overlooked. A recent study found that 13 infusion pump devices still contained wireless authentication data when resold on secondary markets. 

Accordingly, the Federal Register recently proposed a new rule to strengthen the cybersecurity of electronic protected health information. This proposed rule strengthens overall cybersecurity measures and supports the ongoing requirement for robust data destruction practices to protect ePHI.

 

How Securis Prevents Costly Mistakes

Securis’ Secure, Accurate, and Sustainable IT asset disposition approach ensures no storage device is left behind:

  • Securis performs a triple check as part of their ITAD service Triple-Check Guarantee: Multi-step verification ensures hidden drives don’t slip through the cracks.
  • Separation of Duties: Independent verification eliminates single points of failure.
  • NAID-Certified Hard Drive Shredding & Data Wiping: Securis ensures 100% data destruction with documented proof, whether on-site or off-site.

 

Choosing the Right ITAD Partner: What to Look For

Who you choose as your IT asset disposal partner matters. Securis helps companies avoid costly data breaches by ensuring every data-bearing device is identified and destroyed. Some best practices you can use to choose a vendor include:

  • Certifications:  Does the vendor have NAID AAA Certification for on and off-site destruction?
  • Nationwide Coverage:   Can they collect and process IT assets from multiple locations?
  • Experience:  Nothing can replace experience.  Experienced vendors know where to look for hidden storage devices.
  • certificate of destructionCapabilities:  Can the vendor perform shredding to required destruction standards for various assets and storage media types? Do they provide a strong chain of custody and certificates of destruction?

 

Secure Your IT Assets Today

Don’t risk a data breach by overlooking hidden storage devices. Securis ensures 100% secure IT asset disposal with industry-leading ITAD services.

🔹 Contact Securis today for a customized IT asset recycling and secure data destruction plan.

What is a Certificate of Data Destruction?

A certificate of data destruction and recycling proves that data on retired electronic equipment was destroyed according to NAID standards. Securis provides these to our clients for their IT asset auditing purposes.

certificate of data destruction

Securis’ data destruction and e-waste recycling services ease your burden by providing a fully audited, managed, and secure computer and data destruction program. We meet the requirements set by the Department of Defense and the National Security Agency for secure IT Asset disposal, as well as industry-specific standards such as HIPPA, HITECH, FACTA, the Gramm-Leach-Bliley Act, and many others, ensuring the legal compliance companies and agencies need. The Certificate of Destruction is proof that IT Assets have been disposed of in a manner that meets these standards.   

When you choose Securis, you choose security. We process your data with your security and protection at the forefront of our minds. Our storage bins and trucks remained locked throughout the collection process. This prevents access to your end-of-life technology before destruction and ensures a secure chain of custody.When equipment arrives at our facilities, we scan each individual asset and create an electronic inventory.  Securis records the make, serial number (if available), and asset type for each asset.  If an asset contains an asset tag, we scan it. In addition, all items get a Securis key with the job number and status.  This gives us up to four ways to identify each asset. We use proprietary data collection software and handheld scanners for audit and accounta

Clients Can Witness Destruction if they Choose

Some clients need to see the physical destruction of their  e-waste. This is why we developed the ability to either shred or micro-shred equipment on-site with mobile shredding or allow for witnesses to come to our facility to witness physical destruction activity Micro-shredding destroys physical equipment by pulverizing it to less than the NSA-recommended 2mm particles. This is especially beneficial for smaller items that cannot be degaussed or destroyed with a standard hard drive shredder.  We provide a certificate of destruction for these assets once the data has been properly destroyed. This applies to large projects like data centers and smaller projects like hard drives and SSDs.

Inventory Lists and COD’s Available 24/7

At the culmination of the asset disposal project, clients are provided with a full inventory of every item that has been wiped to NIST 800-88 standards and prepared for recycling or destroyed by  Securis. This information is available for client viewing 24/7 through our client portal. Certificates of Destruction are also available through our portal. 

We know how important it is to destroy any confidential information that your company may collect properly. From HIPAA violations to government secrets, we know that information needs to be protected, which is why our services exist. This certificate of destruction can protect you from liability as it proves that you met the strict destruction standards for many compliance standards. For a list of all the compliance standards that Securis meets, please see our compliance page.

Hardware Asset Management Challenges for Companies with Remote Employees

This is the transcript of a conversation about Hardware Asset Management between and Jeremy Boerger, the author of the Pragmatic ITAM Method and a consultant who helps large organizations implement IT Hardware Asset Management solutions. You can find Jeremy at: https://www.itamcoaches.com

00:00:04:07 – 00:00:38:01

Kurt Greening

So welcome, everybody. Today, I am joined by Jeremy Berger, the creator of the pragmatic ITAM method and a consultant who helps large organizations implement great IT asset management. Jeremy’s been solving problems in this area since 2000, and he uses data theory, automation, self-governance, while others just are answering questions or excuse me, answering tickets and running inventory reports. We’re talking about hardware asset management today, but Jeremy also helps people solve problems with software asset management. SaaS, spend management, and financial operations. Now, there is a lot of debate today about remote work. Many companies are ordering at least a partial return to office, but the IT asset management problems for remote organizations, or at least people who are hybrid, they’re not going away. 

So my name is Kurt Greening. If you don’t know me, I am an executive VP with Securis. Our primary business, is IT asset disposition, but we also help companies manage the hardware assets of remote employees. Jeremy, thank you for joining us today. 

Jeremy Boerger

It’s my pleasure. Kurt, thank you for having me. 

Kurt Greening

Awesome. So I have a few questions for you as, industry expert. First one I would, love if you can share some of the challenges that you may have noticed in your career when it comes to managing remote employees hardware assets.

Jeremy Boerger

Yeah. So the, the biggest challenge is getting to them,  that’s the real problem. It’s either getting that hardware out to the end user and then getting it back when that end user, goes away or goes through a, refresh, and they get new equipment. now you’ve also got, a secondary problem with the communication piece. Inside the United States, we’ve got a much more robust data infrastructure. Most organizations, especially when, hybrid work was first being experimented with, maybe you had the old twisted pair, riding alongside your home phone line. Remember when we had home phones? Yeah. and that was a real challenge for no other reason than just to get the disposition of that device. Is it on? Is it working? Is it getting patched? nowadays we’ve got high-speed connectivity all over the place. for the most part. And so that kind of concern goes away. But the real challenge is getting the device and the entire setup over to the end user and then getting it back when they’re done with it.

Kurt Greening

Yeah. I worked for a remote-only company, so that was interesting. I actually did all of my interviews on, video. Via zoom. it’s a little nerve-wracking to accept a job that way, but onboarding, was also, completely remote. And, you know, you mentioned some of the challenges. I think getting the equipment is a challenge. If I were to, I would make a challenge getting the equipment back, especially with a less-than-happy employee. It’d be an even bigger challenge if you don’t make that super easy as an IP asset manager or a helpdesk organization. I don’t think you’re going to get that equipment back in a timely manner.

Jeremy Boerger

Right. You’re right. And in so when you’re dealing with that, you’re really as an asset manager, you’ve got to make a calculation. risk calculation in your head. once the real value of that device, sometimes it’s the value of the device itself. Don’t get me wrong. I work for an organization that does, animation, computer animation for entertainment, cartoons, and all of that stuff, that’s some high-powered stuff that is cranking along, doing ray tracing and, generating the frames. So there is still value in that. But for most organizations where the real value is, is in the intellectual property, in the data that’s stored on that device. So one of the ways that you can get around that problem is to have a more robust data destruction, cooling, and methodology that if you can remotely eliminate access to the IP from that device, that sometimes will alleviate some of the risk.

00:05:27:05 – 00:05:55:02

Kurt Greening

So that is a good point. Jeremy, you’re about to get into my next question. Which are some of, what are some of the software tools that are available to help improve, cybersecurity saying you mentioned remote wipe. you know, typically, most of my customers here at Securus, they’re using like, an end user management software or a mobile device management software. you know, to help with, you know, to help manage that solution. But other than that, or maybe talk about some of those features or other tools similar to that, that that make managing those, remote and user devices a lot easier.

Jeremy Boerger

 Right. So, it, it’s tough to be able to talk about them because the technology itself is actually rather simple.  It is just being able to have an inventory and the tool being able to reach out and send commands, to that device. from either a pre boot or, or a stance or an operating system where really there’s new tools that are coming on all the time. what I recommend for as part of our pragmatic ITAM  method is stick with the easy ones.

Intune for your Windows devices. Jamf for Apple. There’s others that will also do the work, but those those two are the big ones, and they will get the job done. Encryption,  also seems to have we’ll also have some, remote destruction or, magic bullet commands. sometimes that can go on. And with the, when you start talking about phones and contact lists and the, two factor authentication with some of those, oh, you know, the random number generators, in those password like that.

Those will also work so that you can lock down and immobilize the device, make it useless. not only does it protect any of the random bits that might still be on that device, but also gives, an incentive for the end user to give it up and send it back home, because they’re not going to be able to do anything with it anyway.

Kurt Greening

Yeah. I mean, I understand that some of these solutions also offer like GPS tracking. You mentioned enforcing specific cyber security policies to make sure that they’re safe on the on the network. You know, they might be working in conjunction with anti-virus software or, you know, more sophisticated, tools that are out there, you know, so I think all of those can be incredibly helpful.

Jeremy Boerger

Oh, yeah. And, you know, it’s what I, what I see in my book, you know, the best tool for the job is the one you’ve already got. So use the stuff that you’ve already got access to. Again, Intune is already there. If you’ve got a Windows volume license agreement or you’re part of the, you’re, you’ve got access to, oh, crud. What are they calling their Azure? what they’re calling their device, their cloud system.

Kurt Greening

 And they used to call it. oh, I forgot. I think it’s now M365. But, you know, some of the really advanced security features might be the M5. or E5 offering. 

Jeremy Boerger

Yeah. Yeah. And then actually brings up a good question, or a good thought as well. The proliferation of cloud storage remote backups mean that the risk of loss of the IP, the at the risk of the access of the loss of intellectual property or for an organization actually helps become minimized because so long as that device is inoperable, they have a backup copy that they can reach into. Any data or, intellectual property or whatever other files are needed.

00:10:00:12 – 00:10:16:03

Kurt Greening

I think you did a great job talking about how many of these, software tools can help remotely support these users and help with IT asset management. But there are certain problems that can’t be solved remotely with software. Can you give me an example of some of the challenges that organizations run into with remote employees? 

Jeremy Boerger

You know, I am old enough to remember the old joke about the, the end user who plugged the, following the instructions to the letter plugged the, power strip into the power strip. I don’t know if we can solve that one, with software, but, you know, in today’s age, there’s a lot of, the the end user is a lot more savvy around technology, but some of the problems that you that you’re going to struggle with, are going to be the usability and the process side. And if you don’t have robust processes, around things like data handling and, inventory management and, recovery processes, what are those steps to get those devices back? You’re going to struggle. and there’s not much just throwing another magic bullet, piece of software at that problem is not going to make the poor processes go away.

Kurt Greening

Yeah, I mean, that’s true. I mean, I’ve talked to many of my friends that work in that helpdesk, and some of them are incredible at this job, in their job. They’re they’re highly committed. They tell me stories of, hey, I did everything I could to support this person. They had something, you know, critical coming up customer presentations. I got in my car and I drove four hours with a new, laptop with a fresh image, picked up their old one and took it home because there was nothing more that I could do.

Jeremy Boerger

I had worked Help desk one time and we were able to troubleshoot. the connectivity issue actually came down to the feed line into the, subdivision, buried cable line, and the reason why we were able to figure it out was because I was the first person to ask the guy point blank, the person that we were helping what’s the picture quality on channel two and channel three, which is where the on the old cable modems, that’s where the the data line there on channel three. And I think part of channel 13, he was like, oh it’s terrible. It’s like, how well do you know your neighbors? Can you talk to them? And just that persistence, that systemic thinking of going, okay, we’ve tested every possible issue with the hardware. We know it’s not the software. Then what happens next? That’s systemic thinking about okay, what’s the next device or issue in line that could be causing the problem and then start to troubleshoot it. If I remember right, the cable company came in and replaced all of the wire in that subdivision. It was 20, 30 houses, between the house and the street.

Kurt Greening
Interesting. Some some good, good war stories there. Jeremy. 

Jeremy Boerger

Oh, yeah. That’s. Yeah, that’s the nice thing about helpdesk. Everybody’s got a war story. 

Kurt Greening

Yeah. And, speaking of some of these challenges, why do you think, some companies or maybe even government, organizations might for, outsource laptop logistics, data sanitization, re-imaging imaging repair.

And then eventually, when they’re done with the device recycling that somebody like Securis. 

Jeremy Boerger

Yeah. So, there’s, there’s a couple of reasons why it starts to make sense. The first is scale. as an organization grows, the demands for the disposal, the recovery, the disposal and the, recertification if you’re going to reuse it, all of that starts to become cumbersome and pulls attention and material and resources away from the business’s core focus.Right. If you are, manufacturer, you make airplanes. The last thing you want is people spending their time, hitting laptops with hammers to destroy the platters. Right. So outsource that. the second part is, if you are dealing with very heavily, abused, data, thinking, healthcare, thinking, finance, and government, there are specific regulations that you’ve got to follow and your organization might not be able to keep up with all of those regulations. A dedicated third party service provider, that’s the folks to go to. Finally, off the top of my head and thinking about it, if you are an organization that is in a very heavily congested urban area warehousing becomes a premium and you really want to have, square footage being paid out for devices that are just sitting there because they’re either being prepped or being removed, t hat’s money out the door that, you know, you could redirect somewhere else, especially if you have a, just in time relationship with, third party service provider. 

Kurt Greening

Yeah, there’s a real good point. Yeah. I, I, you know, there’s kind of a space between, you know, a really small company that would outsource everything from an IT perspective to an MSP. And then, you know, I’ve got a customer and it’s a big hotel chain, and they have regionally dispersed helpdesk people, within a two-hour drive of almost, every major, property, so they don’t have a problem, but there’s kind of that in-between space where somebody is like, hey, we’ve got to help desk people, but either they’re not physically close to all those people you mentioned, you know, the warehouse issue or, you know, working for companies. You know, I know of a big company in the software space lab, Gitlab, they don’t have a corporate headquarters so they wouldn’t store the laptops anywhere, so there’s kind of that interesting space where, you know, you’re big enough to have a, you know, your own IT helpdesk to understand your applications, understand your software, but maybe you don’t have somebody in every region or what I’ve been told is that, providing hardware support, you know, shipping stuff out and boxes for somebody who’s got a bunch of, you know, network and helpdesk certifications, they may consider that to be soul-sucking work. 

Jeremy Boerger

Yeah. Yeah. Could be too. Could be too. The other thing to consider is how you’re actually using the technology,  so many of the used to be onboarded software activities are now residing in the cloud or are accessed through a web browser. It doesn’t matter what kind of platform you’re using. All you really need is a consistent connection to that SaaS provider. Apple Mac, however it’s configured, doesn’t matter so long as the connection is secured. Maybe a VPN, some sort of, certificate. You’re off to the races, so go out, pick up something at Walmart and bring it back to your home. 

Kurt Greening

Awesome. Well, good. Good advice. So let’s say the company comes to you and you’re doing some IT asset management consulting to you, and they mentioned this as a problem. And they say hey, I’m going to outsource or possibly outsource some of this. What would you recommend that they look for. What types of questions should they ask of potential providers that will help them figure out what solution might be right for them? 

Jeremy Boerger

So the first question that really needs to be asked is, what kind of a relationship do you want with this third-party service provider? They really, the services break off into two aspects. One is either that just-in-time inventory provision, or they are doing just, dross, haul away the garbage give you a certificate that they’ve destroyed it, and you wipe your hands of it. I’ve seen both. if you are going to go the dross method, then there’s some other sub-questions that you’ve got to ask the people that are doing the inspection. They’re going to be your employees. Are you okay with having someone spend, you know, an hour or two a day for a small organization every once in a while to an entire team of 3 or 4 people going through, examining the usefulness of the device, deciding whether or not it can be reused and put back out into, the computing environment. And then goinging through the activity of wiping it out, doing the DoD five-time wipe. Sometimes that goes for a while on these big, on these big hard drives. Cybersecurity is also starting to poke at some of the persistent memory. So you’ve got to really have some specific tools to break apart the chassis, to get to that memory and make sure that it’s disposed of.

00:20:25:11 – 00:21:01:09

Jeremy Boerger

Is the organization comfortable with having that dedicated team? Now, the last part that I kind of worry about for organizations, if they’re taking on this task on their own, is the sort of, certification of destruction. The insurance companies, especially the ones that are providing cybersecurity insurance, are very twitchy about their documentation. And they want that confirmation that that device has been destroyed.

Jeremy Boerger

Right. if you’re doing it yourself, it’s very easy to break that chain of custody and lose track of that certificate. And then you’re talking some serious money, your insurance. There’s a very real threat that your insurance, policy could be voided, and that’s the last thing you want to have happen if all of a sudden you need it, right?

Kurt Greening

Yeah. I call it thinking of defensible IT asset management or defensible IT asset disposition. Right. Yes. Do you have a policy. would it be considered best practices and do you follow that policy? Right?

Jeremy Boerger

right, right. Well, and I have seen, the, the, TSP’s, they will go so far as to say specifically when they make a run to pick up a lot, they own those devices. Once they obtain custody, they, assume ownership and reliability. Even then, you want that receipt. What did they pick up? When was that date? And you need to store that in your CMBB or, records repository in case anything happens. 

Kurt Greening

All right. Let’s talk let’s talk about systems because you, If you don’t mind, unless you have another thought on that topic, right. So, let’s say and I think you can answer both questions. So you talked about outsourcing IT, asset disposition and data destruction. That’s maybe one relationship. But there’s also the other relationship we talked about where, hey, you’re managing deployment, wiping retrievable redeployment of of IT assets. Talk about some of the systems, whether it’s, ITAMsystems or ITSM systems, that have to be in place, and what do you kind of think that that relationship would be like in both of those scenarios? 

Jeremy Boerger

Right. So when you are talking about just in time, supply, inventory, you own those devices, but you might not necessarily be in physical control of those devices. So the question comes down to where is your stuff? Now, you know, if you’re a small operation, maybe you can take somebody’s word for it that, oh, yeah, that box is sitting on our shelf, and that’s great. But if you’re going to be a large organization and you need to know where that inventory is, especially if you’re going to start doing some automation between your onboarding and procurement and removal and disposal. You have to have, reach into that third-party service provider’s inventory. And in order to do that, the best way is that you both have inventory systems and you’re sharing data back and forth with an API call, or at least some sort of automated report.

Kurt Greening

I’ve actually seen that happen two ways, Jeremy. So I have seen it happen where let’s say there’s, you know, 5 or 10 spare laptops that are inventory. They’re owned by the company, not by the outsourcer, and then all actions are actually done in the company or the customer’s ITSM system, and the IT asset management database. And then there’s various workflows, like hey monthly that outsourcer has to scan and prove that what you know is in the IT Asset Management inventory is actually, you know, still owned, you know, it’s still in, you know, a locked page or whatever the agreement, is that’s, you know, that’s one scenario. And also, you know, that the Outsourcer may get a helpdesk ticket assigned to them. You know, they perform an action that’s updated in the ITSM, system. You know, if there’s tracking numbers, you know, all of those things. I think that that’s that’s another way, right? Is if you are willing to, sign agreements and you would allow that third party to have access to your systems.

00:25:37:00 – 00:26:21:12

Jeremy Boerger

Oh, yeah. No, the, the the visual inspection is costly, but it is necessary for the, “just to be sure”. And let’s remember these are devices that nine times out of ten are not plugged into the network. They’re just sitting there ready to go for the next step. But they’re dark. They’re off the wire. So unless you have really good controls on the, live side, you know, you’ve got, a good tie-in or good reports from bills of lading that say when stuff is getting received in the inventory, you’ve got your discovery tools running full bore, so you know what’s powered on and being used actively. And you’ve got your certificates of destruction being updated regularly, then what should be in that room should be the stuff that you know you own, but you haven’t seen it on the wire yet. But things happen. Things change. Stuff gets moved. I lose track of water bottles all the time. It happens, so I, I really like, I believe if memory serves, the best practice is really once a quarter.

If you’re in a just-in-time inventory relationship, have a visual inspection. It’s a great time to just go and build the, the personal relationships as well with your, service provider. Go. Everything looks fine. Freedom to launch. 

Kurt Greening

Yeah. I mean, I’ve also seen a requirement for monthly scanning of the asset tags and a photograph in addition to the quarterly visual inspection.

Jeremy Boerger

That’s pretty brutal. I mean, but again, if you’re in an organization and you’re uncomfortable with risk, then, yeah, you’re going to make demands like that. 

Kurt Greening

Talk about other demands. We talk about IT Asset disposal. you know, I have some customers that they provide an inventory, we go up on-site, we scan everything that they give us. We cannot leave until there is a 100%, match. You have all the serial numbers, the asset tags and the Securis disposal tags. And then, there are photos taken of what is in the truck. The truck is locked. The truck is sealed. The truck is GPS tracked. It goes to our location. The items are scanned again. That scan is compared to the inventory, the two other inventories,  and if one, item is off, then they start an investigation to figure out, do they have a cyber security incident or not? So to me, that’s what good inventory management, looks like, and I mostly see that from banks. I’d like to see that in some other industries as well.

00:28:46:10 – 00:29:21:01

Jeremy Boerger

It’s certainly, again, with financial and health care, there is so many nefarious activities that are going on. You have to be careful. honestly, between you and me, I would think that that level of chain of custody is pretty extreme. I hope your customer is paying for that level. For most organizations,  the bill of lading is actually plenty to be able to tell you.

You know, here’s the truck, and here is the driver, here’s the expected delivery. Did all of the serial numbers that they said that the the delivery company picked up actually make it? And if that didn’t happen then that specific piece, that delivery driver is going to be in the hot seat. so there’s a range and I and that’s really where it kind of comes down to where you and I can agree. It’s that level of risk and the management of that risk through the collection of the details and the data about where those devices are between you handing the physical custody over to a third party and then saying, you know, providing a receipt that says, yes, we did the needful, this thing is now a small pile of molten metal. You’ll never see it again. 

Kurt Greening

So this is all, good advice. Clearly, Jeremy, you’ve been doing this a long time. you’re an expert in many things. Hardware asset management, many things. Software asset management. So I appreciate you, sharing some things both with me and folks that watch the Securis YouTube channel. I guess the question is, some people are, are thinking about some of the things, some of the problems that you solve and they think that you might be able to help them. Where where can they reach you? 

Jeremy Boerger

Well, you can find us on our website, boergerconsulting.com. weird German spelling though, that’s B o e r g e r, otherwise you end up at McDonald’s. 

Kurt Greening

Now ITAM coaches, does that also get to your company to or…

Jeremy Boerger

ITAM coaches. Yes. So and this might be the right time to talk about that. We’re looking at doing a little bit of expanding and doing a brand name. So the ITAM coaches, URL will point to us as well. 

Kurt Greening

All right. Awesome. Well, hey, thank you again, Jeremy Burger. really appreciate your insight. suggest that, people pick up your book. That ITAM pragmatic Method, or follow your blog because there’s a lot of good advice. I know, I read that it seems like maybe weekly or every other week you’re putting out good content. So I think thats another way to try to keep up to speed with all things I.T Asset management.

Jeremy Boerger

Iit is it is a moving target to keep up with the details and the best business practices. So, you know, we’re happy to help educate where we can, and partner you know that’s really kind of, if there’s a closing thought, having someone help you out, can be very beneficial. So consider it. Gartner already released an article saying it’s a good idea, Forrester followed in suit, as they do. You don’t have to do this alone. 

Kurt Greening

All right? Sounds wonderful. Thank you so much.

Jeremy Boerger

My pleasure. Kirk. Good luck to you.

Transforming Lives Through Technology: Securis’ IT Asset Donation in Africa

Children in Africa

Life-Changing Opportunities

Imagine a world where computers are a distant dream, medical records are scribbled on scraps of paper, and ambition is stifled by the lack of access to technology. For millions across Africa, this isn’t just a scenario—it’s reality. But thanks to a powerful IT Asset donation partnership between Securis, Avalara, and Stanley Nche of Stanley Com, we have turned end-of-life technology into life-changing opportunities for schools, orphanages, and hospitals in Chad and Cameroon.

More Than Recycling—A Mission of Impact

At Securis, sustainability isn’t just about recycling IT assets—it’s about making a real difference. By securely erasing data to NIST 800-88 standards and refurbishing retired technology, Securis ensures that valuable equipment is given a second life.

Donations to the hospital in Chad

This initiative was not just about moving devices from one place to another; it was about delivering hope and opportunity to communities that needed it most.

Avalara, a leading provider of tax compliance software, played a pivotal role in this initiative by donating equipment for refurbishment.  Jeremy Farber, President of Securis, emphasized the importance of Avalara’s donation to making this initiative happen: “Avalara’s support allowed us to take the equipment that still had life, test it, refurbish it, and donate it to communities in Africa.”

Meanwhile, Stanley Nche took this initiative to heart, organizing and personally delivering all donated equipment—ensuring it reached the hands of those who needed it most.

 

 

Empowering Education

The first stop for these donated assets was the Optimum BNP School in Cameroon, where classrooms once lacked access to any digital learning tools. Now, students and teachers are using computers for the first time—unlocking new educational possibilities.

“This is a monumental step,” said Stanley Nche. “This is the first time these kids and even their teachers have had access to computers. Now, they have the chance to learn and grow in ways they never imagined.”

At Saint Arnold Murray Orphanage, donated tablets have opened doors to digital learning and interactive play for children who had never imagined such possibilities. Stanley shared their joy: “When we told them we brought tablets, they were so happy because no one had ever done this for them before.”

 

 

Revolutionizing Healthcare

donated items in african hospitalIn Chad’s Adventiste Hospital, the impact was just as profound.  Previously reliant on paper records, the hospital can now use digital systems to store medical histories, test results, and treatment plans. Clinicians can access online medical research for the first time—a critical advancement in providing quality healthcare. “Before this donation, everything was recorded manually on paper.” Stanley explained. “Now, they can digitize patient information and improve care delivery.” In addition, nursing hospitals will now have computers to enable research and communication with the larger health community, fostering better healthcare outcomes.

A Unified Effort for Change

This initiative underscores the power of collaboration. Jeremy from Securis reflected on the collective effort: “This wouldn’t have been possible without the dedication of our employees, the generosity of Avalara, and the hard work of Stanley Com.”  The joy of giving back resonates deeply with Securis’ mission to be more than just a profit-focused company. Stanley Com and Securis aim to find partners to work with on future initiatives, ensuring that more communities gain access to life-changing technology. 

Stanley Nche donating IT Assets in AfricaSustainability Meets Social Change

By keeping technology out of landfills and placing it where it’s needed most, Securis demonstrates that sustainability can be about more than computer recycling.  It can be about giving back and helping to bridge the digital divide. Every piece of technology has the potential to create opportunities and change lives, and with the right approach, we can turn e-waste into empowerment. 

Join the Movement

Securis’ work in Africa is a testament to what’s possible when businesses and individuals unite for a greater purpose. Retired technology doesn’t have to be discarded—it can be someone else’s future. 

If you want to be part of this transformative journey, contact Securis today. Together, we can ensure that no piece of technology goes to waste and that every piece contributes to a brighter future.

Let’s make an impact—one device at a time.

If your company is interested in donating assets please reach out.

CONTACT SECURIS

Federal Financial Institutions Examination Council (FFIEC) Data Destruction Guidelines

The Federal Financial Institutions Examination Council (FFIEC) provides guidelines to help financial institutions manage risks, including those related to data destruction. Compliance with FFIEC rules is critical for financial institutions to ensure data security, regulatory compliance, and the protection of sensitive information that may reside on their IT Assets.

The key aspects of FFIEC guidelines related to data destruction include:

 

1. Risk Management FrameworkRisk Management

  • Financial institutions must implement a comprehensive risk management program that includes policies for the secure disposal of data.
  • Risk assessments should identify potential vulnerabilities in data destruction processes.

 

Secure Data Disposal Requirements

2. Secure Data Disposal Requirements

  • Institutions must ensure that sensitive customer data, financial records, and confidential information are securely destroyed when no longer needed.
  • Secure disposal methods should align with industry best practices, such as shredding, degaussing, or physical destruction of media.

 

3. Compliance with Privacy and Security Regulations

Compliance with Privacy and Security Regulations

  • Data destruction policies should be aligned with relevant laws, such as the Gramm-Leach-Bliley Act (GLBA), which mandates safeguards for customer information.
  • Financial institutions must follow FFIEC guidelines in combination with the FTC Disposal Rule, which requires proper disposal of consumer information.

 

4. Third-Party Due Diligence and Vendor Selection

Due Diligence in ITAD Vendor Selection

  • The financial institution must conduct thorough due diligence before selecting a vendor to ensure the vendor has the necessary security controls, certifications, and experience in data destruction. The vendor should also clearly define its responsibilities for data destruction, including methods, timing, and acceptable levels of data sanitization.
  • Vendors should comply with relevant regulations, such as:
  • Institutions should assess a potential vendor’s financial stability, reputation, security controls, and data destruction methods.

 

5. Audit and DocumentationAudit and Documentation in ITAD

  • Institutions should maintain detailed records of data destruction activities, including logs of what was destroyed, when, and by whom.
  • Regular audits should be conducted to ensure adherence to data destruction policies and regulatory compliance.

 

6. Physical and Electronic Media DisposalPhysical Media Destruction

  • FFIEC guidelines emphasize the secure destruction of physical documents and electronic storage devices, such as hard drives, USB drives, and backup tapes.
  • Proper methods include overwriting, cryptographic erasure, and physical destruction.

 

7. Employee Training and AwarenessEmployee training on data destruction practices

  • Employees should be trained on the institution’s data destruction policies and the importance of securely handling sensitive information.

 

Adhering to FFIEC guidelines on data destruction helps financial institutions prevent data breaches, maintain customer trust, and avoid regulatory penalties. When a financial institution outsources data destruction services to a vendor, the FFIEC (Federal Financial Institutions Examination Council) requires the institution to ensure that the vendor complies with applicable regulations and security standards.

Key compliance requirements for vendors performing data destruction services include:

Contractual Obligations

FFIEC guidelines stress that contracts with vendors must include provisions to ensure data is securely destroyed. Essential contract elements include:

  • Defined Scope of Services: Specify which types of data and media the vendor will destroy (e.g., paper, hard drives, electronic media).
  • Security Standards: Vendors must follow industry best practices for secure destruction, such as NIST 800-88, NISPOM 32 CRF Part 117 (which has replaced DoD 5220.22-M) data sanitization, and NAID AAA certification standards.
  • Confidentiality and Non-Disclosure: Ensure vendors adhere to strict confidentiality agreements.
  • Chain of Custody: A documented process for handling, transporting, and destroying data to prevent unauthorized access.
  • Audit Rights: The institution must retain the right to audit the vendor’s operations and security controls.
  • Breach Notification: Require vendors to report any security incidents or potential data breaches immediately
  • Indemnification: The contract should include provisions for indemnification in case of data breaches or non-compliance caused by the vendor.

Secure Data Destruction Methods

Secure data destruction with SecurisThe vendor must use approved destruction methods to ensure data cannot be recovered. These include:

  • Secure Handling: Vendors must handle sensitive data securely during collection, transport, storage, and destruction.
  • Access Controls: Strict access controls should limit personnel access to sensitive information.
  • Data Destruction Methods: Vendors must use secure, industry-recognized methods of data destruction that render the data unrecoverable (e.g., Overwriting, degaussing, or cryptographic erasure to comply with NIST standards).
  • Verification: The vendor should provide proof of destruction, such as certificates or reports for each asset. (see section below)

Documentation and Certification

Certificated of Data DestructionVendors must provide detailed documentation to demonstrate compliance, including:

  • Certificate of Destruction (CoD): A formal document certifying the data destruction process was completed securely and in compliance with applicable regulations.
  • Destruction Logs: Itemized records of destroyed data, including dates, locations, and methods used.
  • Audit Reports: Regular internal audits of data destruction processes to ensure ongoing compliance.

Ongoing Monitoring and Compliance Reviews

  • Financial institutions must monitor vendors continually to verify continued compliance with FFIEC guidelines.
  • This includes periodic audits, site visits, and performance evaluations to assess security practices.
  • Vendors should undergo periodic compliance training and updates to meet evolving regulatory requirements.
  • Incident Response: The vendor should have a documented incident response plan for data breaches or non-compliance issues.

Regulatory Compliance Alignment

Vendors should:

  • Be transparent about their processes.
  • Demonstrate their security controls and compliance with regulations.
  • Provide proof of secure data destruction.
  • Cooperate with the financial institution’s ongoing monitoring and audit procedures.

By following these FFIEC guidelines, financial institutions can mitigate the risks associated with outsourcing data destruction, ensure regulatory compliance, and protect sensitive customer information.

Request for Proposal (RFP) for IT Asset Disposition (ITAD) services

Creating a comprehensive Request for Proposal (RFP) for IT Asset Disposition (ITAD) services is crucial for organizations seeking to securely and efficiently manage the retirement of their IT assets. A well-structured RFP clarifies your company’s unique needs and ensures potential vendors can provide tailored solutions that align with your objectives.

Understanding IT asset disposition (ITAD) Services

IT Asset Disposition involves the processes required to responsibly retire outdated or unwanted IT equipment such as computers, phones, storage drives, and other office electronics. These devices often contain sensitive data, so these services should ensure compliance with stringent environmental and data security regulations. Partnering with a qualified ITAD provider helps mitigate risks associated with data breaches and environmental liabilities.  Read on to learn more about what to ask in an RFP for ITAD Services.  

Key Components of an ITAD RFP

  1. scope of workIntroduction and Company Overview:
    • Purpose of the RFP: Clearly state the objective of the ITAD services needed.
    • Company Background: Provide insights into your organization’s size, industry, and IT infrastructure to help vendors understand your needs.
  2. Scope of Work:
    • Services Required: Detail the ITAD services you need, such as data destruction, asset remarketing, recycling, and reporting.
    • Volume and Types of Assets: Specify the quantity and categories of IT assets to be disposed of, including computers, servers, mobile devices, etc.
  3. Vendor Qualifications: E-waste companies have caused horrific environmental disasters.   When fly-by-night companies struggle financially, they have been known to cut corners, resulting in superfund sites and data breaches.   Examples include subcontracting to the lowest-cost downstream vendors and failure to follow strict security procedures.  We recommend checking:
    • vendor qualificationsExperience and Expertise: Request information on the vendor’s history in IT asset disposition services and their expertise in handling similar projects. 
      • Does the vendor have a Certified Secure Destruction Specialist® (CSDS®) on staff?
      • Are they committed to continuous improvement and innovation in their services? 
      • Are they willing to share high-level reports on financial stability?
      • How long has the company been in business?  
    • Certifications: Does the vendor hold relevant certifications, such as: 
      • ESGR2v3 Environmental Compliance:  Ensure the vendor follows environmentally responsible recycling methods and has certification from R2v3. This certification requires the vendor to have an Agreement for Responsible Disposal of Sensitive Materials for all downstream vendors. 
      • Mobile and Plant-based NAID AAA certification: NAID is a third-party association that provides unannounced audits annually to validate media sanitization companies’ security processes and compliance. The vendor should have NAID certification (not just membership in Isigma). 
      • Defense Logistics Agency (DLA): Program managers should require a disposition vendor to be certified by the DLA to transport military critical data. This vetting process helps protect data during transport to minimize data breach risk. The program manager should also confirm that the disposition vendor’s certification is current and has not expired.
      • Department of Transportation: Is the vendor certified to transport e-waste materials?
      • Additional certifications: ISO 14001 (environmental), ISO 9001(QMA), and ISO 45001(safety) certifications.
      • Is the vendor a GSA contract holder?
    • Compliance: Different compliance standards may apply depending on the client industry. Make sure your vendor ensures your compliance with whichever applies to you.
      • Compliance standards that relate to all industries include: NIST 800-88, OSHA, the FACTA Disposal Rule, the Identity Theft and Assumption Deterrence Act, the US Safe Harbor Provisions, the PCI Data Security Standard, and the Basel Action Network.
      • Compliance standards that relate to Healthcare companies: HIPPA, HITECH, FDA Security Regulations (21 C.F.R. part 11).
      • Compliance standards that apply to Financial Services Companies: The Sarbanes-Oxley Act, the Gramm-Leach-Bliley Act, the Bank Secrecy Act, and the Patriot Act of 2022.
      • Compliance standards that apply to government agencies or contractors:  NISPOM 32 CRF Part 117 (which has replaced DoD 5220.22-M) data sanitization, DFARS, NIST SP 800-171 (Requirement 3.8.3), and CMMC 2.0. Certificates of Destruction are provided as critical proof for DCMA DIBCAC audits and cybersecurity risk mitigation efforts. GSA Bulletin FMR B-34 e-waste standards.
    • Service Capabilities: Does the vendor cover the regions where your company operates? Do they offer both on-site and off-site data destruction and asset disposal? Is the vendor capable of scaling the service to handle large volumes? Does the vendor have logistics and transportation capabilities for asset collection needs?  Are Secure Storm Cases or lockable bins available for safe asset collection and storage? 
    • Customer Service: Is customer support available and responsive?  Will you be assigned a dedicated project manager? Can site visits be arranged to determine logistic and security requirements?
  4. Data Security Measures:
    • Data Security MeasuresData Destruction Methods: Inquire about the processes to ensure complete data erasure or destruction. Are methods used up to strict NSA standards? Are certifications and compliance standards met and/or exceeded? (see above) Does the vendor stay current with the most technologically advanced methods of destruction? How much experience does the vendor have with classified, CUI or other federal government data?
      • Software Wiping – Is wiping done with certified data erasure software? 
      • Shredding  – Is shredding available for various devices and drives both on and offsite? 
      • Degaussing – Does the vendor have NSA-approved degaussing equipment? Can mass quantities of media be degaussed quickly?
      • DisintegrationIs Vendor able to disintegrate to an NSA approved 2mm? 
      • Incineration – Is incineration available for SAP Classified Data
      • Mobile – Are all data destruction methods available at the client site?
    • Chain of Custody: Seek details on how the vendor secures the handling and tracking of assets from collection to final disposition.
    • Employees: Are employees pre-screened and given background checks with fingerprints and drug testing? Is there Intense and ongoing Employee Security Training?
  5. Reporting and DOcumentationReporting and Documentation:
    • Detailed and Timely Reporting: Does the vendor measure the timeliness of inventory reporting, and do reference checks validate their metrics?
    • Accurate Reporting: Can the vendor prove scanning accuracy or more than 99% and demonstrate a methodology to correct errors
    • Weight and LEED Reporting: Does the vendor provide weight and LEED Reporting?
    • Double Check: Does the vendor provide a two-step verification of captured data?
    • Audit Trail: Does the vendor provide a comprehensive audit trail for all processed assets?
    • Client Portal: Does the vendor provide a client portal for access to inventory reporting, allowing for search by variables such as serial numbers, asset tags, etc?   Does the portal support single sign-on?
    • ITAM Integration: Does your organization require integration with an IT Asset Management system like ServiceNow?
    • Certificate of Destruction: Does the vendor provide a Certificate of Destruction that verifies data destruction and environmentally compliant recycling?
    • Detailed Reporting: Ensure you receive comprehensive reports outlining each asset’s disposition process and outcomes.
  6. Service Level Agreements (SLAs):
    • Performance Metrics: Define the expected service levels, including timelines for asset pickup, data destruction, accuracy, and reporting
  7. Pricing Structure:
    • Cost Breakdown: Request a detailed pricing model, including any fees for transportation, data destruction, and other services.
    • Value Recovery: Inquire about the vendor’s approach to asset remarketing and how recovered value is shared. Evaluate your vendor’s market reach and ability to sell refurbished assets. When assessing value recovery, be sure the ITAD vendor is an experienced NAID AAA and R2v3 certified ITAD service provider who can ensure proper data sanitization and recycling. Ask about the vendor’s capabilities to repair or refurbish sanitized assets to maximize value and minimize e-waste.
  8. References and Testimonials:
    • Client Testimonials: Check reliable sources such as Gartner reviews for references from previous clients, particularly those in similar industries or with comparable project scopes.
    • Interview References: Develop a list of questions in advance, such as those about accuracy, security, volumes, security procedures, etc.
  9. Site Visits or Trial Runs:
    • Conduct a site visit to the vendor facility or schedule a trial project and have your team audit the vendor’s work.

Best Practices for Developing Your ITAD RFP

  • Be Specific: Clearly articulate your requirements to enable vendors to provide precise and relevant proposals.
  • Encourage Transparency: Seek openness from vendors regarding their processes, certifications, and any potential subcontractors involved.
  • Evaluate Sustainability: Consider vendors’ commitments to environmental sustainability and how their practices align with your company’s green initiatives.
  • Assess Flexibility: Determine the vendor’s ability to scale services and adapt to your organization’s evolving needs.

By meticulously crafting your IT asset disposition RFP with these components and best practices, your company can identify a partner that meets your technical and security requirements and aligns with your organizational values and goals. This strategic approach ensures a successful IT asset disposition process, safeguarding data and contributing to environmental sustainability.

 

Top IT Asset Disposition (ITAD) Companies 2025

Finding the top IT Asset Disposition (ITAD) companies can be challenging. This regularly updated list has been designed to help you identify the best options for your company based on some key factors. First, we discuss the factors to consider when choosing your ITAD partner, and we have a longer blog on that subject here. Then, we will provide a list of ITAD providers that you can choose from to find the best partner to meet your organization’s specific IT asset disposition needs. When making your final decision, consider scheduling consultations with multiple providers to assess their specific offerings and how well they align with your organization’s priorities regarding data security, environmental impact, and cost. 

What is ITAD?

ITAD is short-term for IT Asset disposition.  ITAD is the process every company must go through when refreshing IT Assets such as computers, tablets, smartphones, and storage devices. Because these devices often contain sensitive information and environmentally hazardous materials, disposal of end-of-life electronics is not as simple as throwing them in the trash.  ITAD vendors should bring Security, Accuracy, and Sustainability to your IT asset disposition process. Here are some questions to ask as you are assessing your various options:

Security

When selecting an ITAD vendor, security should be a top priority. A reputable vendor should provide comprehensive security measures addressing every aspect of the asset disposition process. This begins with a thorough evaluation of end-of-life equipment to inform decision-making about which data erasure and/or destruction methods should be employed and should extend to considerations such as transportation and logistics.

Certifications such as ISO-9001:2015, ISO 14001:1015, ISO 45001:2018, and NAID AAA certification for mobile and plant-based facilities can also inform an ITAD vendor’s commitment to data security. Compliance with industry-specific regulations is also important.  You should be aware of data destruction-related regulations specific to your industry, such as HIPAA, HITECH, or Gramm-Leach Bliley, CMMC, etc and be sure that your ITAD vendor complies with them.

Secure

The vendor should also be open to arranging site visits, talking with their references, and allowing you to assess their logistic and security requirements firsthand. Employee screening is another critical aspect of security. A trustworthy vendor will conduct thorough background checks on their employees, including fingerprinting and drug testing, and provide ongoing, intensive security training. These measures help ensure that reliable, well-trained professionals handle your sensitive data and assets throughout the disposition process.

Accuracy

A reputable ITAD vendor should provide comprehensive and accurate reporting on all processed assets. This includes maintaining a detailed audit trail that tracks each asset from when it enters its custody until its final disposition. While the industry average accuracy in ITAD reporting is 85%, you should look for a vendor who can exceed this number and provide highly accurate reporting, ideally with greater than 99% precision. To ensure the utmost accuracy in data capture, the vendor should implement a two-step verification process for all captured data, minimizing the risk of errors or discrepancies. After the asset disposition process, the vendor should furnish a certificate of destruction. This document is official proof that the assets have been properly disposed of and that any data contained within has been securely destroyed. 

In addition to basic asset tracking, a top-tier IT asset disposition vendor will go above and beyond by providing weight and LEED (Leadership in Energy and Environmental Design) reporting. This information is valuable for organizations looking to quantify their environmental impact and potentially earn credits for sustainable practices. 

Accurate

Finally, the vendor should offer a client portal to empower clients with full visibility into their asset disposition process. This portal should provide unlimited access to inventory reporting, allowing clients to review asset status, track progress, and generate reports as needed. Such a feature demonstrates the vendor’s commitment to transparency and client empowerment while streamlining their customers’ asset management process.

Sustainability 

When selecting an ITAD vendor, it’s crucial to prioritize sustainability and environmental responsibility. The ideal ITAD partner should prioritize sustainability through a two-pronged approach. First, they should focus on extending the life of IT assets through refurbishment and reuse whenever possible. This approach not only benefits the environment by extending the lifecycle of IT equipment and contributing to a circular economy but also provides financial advantages to your company. Second, for assets that cannot be reused, the vendor should employ environmentally friendly disposal methods that minimize the impact on ecosystems. 

A reputable vendor should hold certifications such as R2v3, which ensure adherence to responsible recycling practices and environmental standards. These certifications have rigorous requirements, demonstrate the vendor’s commitment to sustainable ITAD processes, and assure that they follow industry best practices. R2V3 certification ensures comprehensive environmental compliance, including agreements with all downstream vendors to dispose of sensitive materials properly and prevent environmental harm in vulnerable regions due to unethical e-waste recycling practices. 

sustainable (1)

Additional considerations

In addition to security, accuracy, and sustainability, other considerations exist when choosing your ITAD vendor. A quality vendor should be able to handle your specific asset types and volumes and have the logistics and transportation capabilities to support your needs. This includes scaling services up or down based on your requirements and tailoring their offerings to your unique situation.

End-to-end services are also important, so you only have to vet one vendor who can then handle everything from logistics and data destruction to remarketing and recycling. The vendor should offer on-site and off-site data destruction options, ideally with NAID AAA-certified mobile trucks and facilities. Convenient collection services are also important, whether through scheduled pick-ups, accessible drop-off locations, or mail-in options.

Flexibility is key when it comes to contracts and equipment. Be wary of vendors that lock you into long-term contracts. An established reputation for excellent service and reliability is also critical. Look for solid testimonials from clients in similar industries to gauge the vendor’s track record. Finally, responsive customer support can significantly improve your ITAD experience. A dedicated project manager can ensure that any issues or questions are addressed promptly, helping to streamline the entire ITAD process and provide peace of mind.

Securis

Securis provides secure, accurate, sustainable, certified, and compliant on-site and off-site data sanitization and IT asset disposal and recycling for PCs, laptops, hard drives, solid-state drives, smartphones, servers, and other e-waste using NSA-approved degaussing and drive shredding technology and NIST 800-88 compliant drive wiping.   Many Securis customers are in highly regulated industries such as government, healthcare, and financial services.  In response, Securis has spent more than 20 years developing best practices for destroying classified and highly sensitive data.  Securis holds certifications for ISO 9001, ISO 14001, and ISO 45001, as well as a NAID AAA (i-sigma) certification. In addition, Securis is certified by the DLA (Defense Logistics Information Service) to store and transport military critical technical data and by the Department of Transportation to transport e-waste materials.  Securis also complies with relevant regulations, such as HIPAA, HITECH, OSHA, Gramm-Leach Bliley, FERPA, and many more. Securis is also R2V3 certified to responsibly remarket or recycle every component in your retired electronic devices, ensuring e-waste stays out of landfills and your ESG rating is increased. Securis also has a Certified Secure Destruction Specialist® (CSDS®) on staff, so you can be sure regulatory compliance, information security, and risk management protocols are always top-tier.

Securis provides a thorough chain of custody and a transparent and well-documented process for your IT asset disposition projects, culminating in a certificate of destruction, all readily accessible to you 24/7 from their Client Portal.  Inventory reports have been demonstrated to be greater than 99% accurate.   Securis’ value recovery program assures the best possible return for any residual value in your end-of-life IT assets.  Securis has more than 50 five-star reviews on Google and positive reviews on Gartner.  Securis provides services throughout the continental U.S.

At a Glance:

  • Company Type: Private
  • Year Founded: 2000
  • Website: https://securis.com/ 
  • Headquarters Location: Virginia, USA
  • No. of Employees: 51-200
  • Reviews: As of March, 2025, Securis has an Overall Rating of 5 out of 5 in the IT Asset Disposition market, based on 6 reviews on Gartner Peer Insights™, Trustpilot – No Reviews Google: 4.8 out of 5 based on 82 reviews

Bottom Line: Securis is the best overall choice for companies looking for secure, accurate, and sustainable ITAD services. Securis offers military-grade certifications, ESG reporting, and flexible nationwide IT asset disposition services.

Iron MountainIron Mountain

Iron Mountain is best known for its records management capabilities, which historically have been paper and tape storage, backup, and recovery services.  They are one of the largest companies in the United States and have a recognizable brand name globally.  Iron Mountain entered the ITAD business in 2021 by acquiring IT Renew, based in Newark, California. In November 2023, Iron Mountain completed the acquisition of Regency Technologies, expanding its presence in the IT asset disposition market.  In September 2024, Iron Mountain also acquired Wisetek, adding to its portfolio of ITAD acquisitions. 

Iron Mountain now provides IT Asset Disposition services as part of its broader IT Asset Lifecycle Management (ALM) offerings, which include data destruction, asset remarketing, e-waste recycling, and comprehensive reporting.

At a Glance:

  • Company Type: Public
  • Year Founded: 1936
  • Website:  http://www.ironmountain.com 
  • Headquarters Location: Boston, USA
  • No. of Employees: 10001+
  • Reviews: As of March 2025, Iron Mountain has an Overall Rating of 3.7 out of 5 in the IT Asset Disposition market, based on 2 reviews on Gartner Peer Insights™, Trustpilot – 1.3 based on 90 reviews.  Google: none found

Bottom Line: Iron Mountain offers a comprehensive set of services but may not be best of breed for all of them. Companies are likely to choose them for ITAD services, with an existing procurement relationship is a key factor.

HOBI International Inc

HOBI International

HOBI International, Inc. provides IT asset disposition and managed mobile services. The company specializes in sustainable solutions for managing and disposing of global IT and mobile assets for businesses. HOBI’s services include data security and erasure, mobility managed services, reverse logistics, data center services, enterprise asset services, and environmental services, with systems designed to maximize a client’s return on obsolete assets while minimizing processing costs.  Hobi processes more than 1 million individual assets annually across its three facilities in Dallas, Phoenix, and its original location in Batavia, Illinois. 

HOBI also offers a custom-designed data management system with concise reporting on logistics, costs, asset serialization and configuration, redeployment schedules, sales history, and scrap summaries. 

At a Glance:

  • Company Type: Private
  • Year Founded: 1992
  • Website: https://hobi.com/
  • Head Office Location: Batavia, Illinois, United States
  • Reviews: As of March 2025, HOBI has not been rated on Gartner Peer Insights™, 1.0 based on 1 review on Yelp No others reviews found

Bottom Line: HOBI maintains R2v3, RIOS, and ISO 14002 certifications and is a WBE-certified company but does not have a NAID-certified facility.

DELLDELL

Dell offers end-to-end device lifecycle management, including inventory tracking, equipment repair/replacement, upgrades, and responsible disposition. This can simplify IT asset management for companies with large, dispersed workforces. Dell manages the entire IT asset disposition process, including pickup logistics for any leased or owned hardware brand, secure data wiping following NIST SP 800-88 R1 standards, device resale or recycling, and online tracking through Dell’s TechDirect portal. Dell has a strong focus on sustainability and circular economy principles. They aim to recycle or reuse an equivalent product for every product a customer buys. 

Dell has expanded its Asset Recovery Services to 35 countries outside the U.S., covering Canada, Europe, the Middle East, Africa, and Asia. This makes Dell a viable option for multinational corporations. While Dell can handle multi-vendor assets, its ITAD services encourage the continued use of Dell products, potentially limiting flexibility in IT procurement decisions. While Dell offers some flexibility, its services may not be as customizable as those of specialized ITAD providers. In addition, Dell uses third-party partners for some aspects of disposition. 

At a Glance:

  • Company Type: Public
  • Year Founded: 1984
  • Website:https://www.dell.com
  • Headquarters Location: Round Rock, Texas, USA
  • No. of Employees: Approximately 120,000
  • Reviews: As of March 2025, Dell has an Overall Rating of 5 out of 5 in the IT Asset Disposition market, based on 1 review on Gartner Peer Insights™, Trustpilot – 1.4 based on 303 reviews.  Google: none found

Bottom Line: Customers who are exclusive users of Dell servers, storage, and laptops are most likely to consider using them for ITAD services.

Ingram Micro

INGRAM MicroIngram Micro is an American distributor of information technology products and services. In February 2016, it was acquired by Chinese conglomerate HNA Group. In May 2018, it acquired CloudBlue, which offers cloud commerce services. Ingram Micro’s approach to ITAD is comprehensive and focused on risk management, logistics, asset repair, and refurbishment, and maximizing residual asset value. 

Ingram Micro offers onsite and offsite data erasure and destruction services, including degaussing and physical shredding. Its industry sectors include enterprise, government, manufacturing, legal, retail, and healthcare. Ingram uses a proprietary system called BlueIQ for global asset tracking and intelligence throughout the ITAD process and also performs re-sales through a platform named RENUGO.

At a Glance:

  • Company Type: Private
  • Year Founded: 1979
  • Website: http://www.ingrammicro.com 
  • Headquarters Location: Irvine, USA
  • No. of Employees: 10001+
  • Reviews: As of March 2025, Ingram Micro has an Overall Rating of 5 out of 5 in the IT Asset Disposition market, based on 1 review on Gartner Peer Insights™, Trustpilot – 1.4 based on 144 reviews.  Google: none found

Bottom Line: As a large distributor of IT Services, customers have access to Ingram Micro Service through a large network of value-added resellers

HPE 

HPE

HPE (Hewlett Packard Enterprise) offers comprehensive IT Asset Disposition services as part of its IT asset lifecycle management solutions. HPE prioritizes the reuse of IT assets over recycling, supporting the management of multi-generational environments. This strategy aligns with sustainability goals by extending the life of IT products and reducing environmental impact.  HPE provides asset recovery services, including collecting, inventorying, transporting, sorting, and processing IT products for recycling or remarketing.  

HPE partners with other ITAD companies to source used HPE computers and to subcontract ITAD services. Devices are processed through HP-approved partners and audited by a third party. If equipment cannot be repurposed, it is responsibly recycled. HPE offers a full suite of IT asset lifecycle management solutions, including the option to purchase pre-owned technology. It also has a large global presence, offering services in multiple countries.  However, there are service limitations with HPE, as in many countries, the HP ITAD Service is currently available for direct customers only. In addition, onsite decommissioning services are only available in Australia, Germany, the United Kingdom, and the United States. 

At a Glance:

  • ​​Company Type: Public
  • Year Founded: 2015
  • Website: http://hpe.com 
  • Headquarters Location: Houston, US
  • No. of Employees: 10001+
  • Reviews: As of March, 2025, HPE has an Overall Rating of 4 out of 5 in the IT Asset Disposition market, based on 1 review on Gartner Peer Insights™, Trustpilot – 1.2 based on 7,793 reviews  Google: none found

Bottom Line: HPE is best suited for companies that are committed users of HPE equipment and often reuse HPE equipment for different employees.  

ERI

ERIERI is one of the largest and most well-known ITAD companies. It claims 

to be the largest fully integrated IT and electronics asset disposition provider in the United States and possibly the world. ERI maintains NAID AAA,  R2, and e-stewards certifications. In 2021, it announced an investment by the private equity firm Closed Loop Partners. 

ERI uses its partner network to provide services in the U.S. and 46 countries. It offers a full range of ITAD services, including data destruction, asset tracking and reporting, repair and reuse, parts harvesting, recycling, compliance management, and device remarketing. ERI also ensures regulatory compliance and meets or surpasses corporate risk management requirements.

At a Glance:

  • ​​Company Type: Private
  • Year Founded: 2002
  • Website: https://eridirect.com 
  • Headquarters Location: Fresno, California 
  • No. of Employees: Approximately 1000
  • Reviews: As of March 2025, ERI has not been rated on Gartner Peer Insights™, Trustpilot – no reviews found Google: no reviews found

Bottom Line: Customers looking for an international presence and a fully integrated ITAD supply chain may likely choose ERI.

ER2

ER2

ER2 provides IT Asset purchasing, installation, tracking, and disposal services. ER2 operates in Arizona, California, Tennessee, Nebraska, Florida, and Texas but offers worldwide service.  ER2 is a private company specializing in technology life cycle solutions, primarily serving Fortune 1000 clients. 

The company was founded in 2011 and has shown significant growth since its inception, being recognized as one of the fastest-growing companies in the US for multiple years. ER2 focuses on providing complete IT asset management services, from installation to deployment, while maintaining a commitment to social and environmental responsibility

At a Glance:

  • ​​Company Type: Private
  • Year Founded: 2011
  • Website: https://er2.com 
  • Headquarters Location: Memphis, Tennessee,
  • No. of Employees: 120
  • Reviews: Reviews: As of March 2025, ER2 has not been rated on Gartner Peer Insights™, Trustpilot – no reviews found Google: no reviews found

Bottom Line: ER2 is well suited to companies that want to work with one vendor to manage the entire IT lifecycle, from purchasing and installing to disposing of end-of-life equipment.

Dynamic Lifecycle Innovations

Think DYnamic websiteIn 2018, Dynamic Recycling changed its name to Dynamic Lifecycle Innovations to reflect a dedication to providing clients with customized, secure, and cost-effective solutions for all stages of the IT lifecycle, including e-recycling, materials recovery, refurbishment, or decommissioning outdated IT assets.  Dynamic Lifecycle Innovations is a full-service electronics and materials lifecycle management corporation providing solutions for IT asset disposition, data security, product refurbishment, remarketing and resale, electronics recycling, legislative compliance, metals recovery, and logistics.  

Dynamic is certified for NAID AAA, R2v3, E-stewards, ISO 9002, ISO 14001, ISO 45001.  With physical locations in Onalaska, Wis. and Nashville, Tenn., the company claims to service 100 countries across six continents. Dynamic has a carbon calculator tool that includes details for 30 different categories of e-waste, comprising of both whole units and component parts

At a Glance:

  • ​​Company Type: Private
  • Year Founded: 2007
  • Website: https://thinkdynamic.com/ 
  • No. of Employees: 201-500 employees
  • Headquarters Location: Onalaska, Wisconsin 
  • Reviews: As of March 2025, Dynamic Lifecycle Solutions has not been rated on Gartner Peer Insights™, Trustpilot – no reviews found. Google: 4.3 based on 26 reviews  Yelp: 3.0 out of 4 based on 4 reviews

Bottom Line: Best for companies who value extremely detailed ESG reporting.

Cascade Asset Management – (now owned by Sage Sustainable Electronics)

Cascade website

Cascade Asset Management has been acquired by Sage Sustainable Electronics.  The combined company will operate under the Sage umbrella but will keep the Cascade name. Over 20 years of experience in the ITAD industry. Cascade specializes in healthcare, finance and insurance, education, government, and technology and was NAID AAA certified, e-stewards certified, ISO 9001 and ISO 14001 certified, and PCI-DSS (Payment Card Industry Data Security Standard) compliant.  Cascade brings a secure chain-of-custody process to Sage, and Sage brings a strong set of tools to provide third-party-certified impact reporting to clients, an area in which Cascade has been less active. 

Cascade offers a full range of ITAD services, including on-site inventory and data destruction, secure logistics and transportation, asset testing, erasure, and unlocking. It also offers options for asset resale, recycling, donation, redeployment, or return to the company. Cascade has a value recovery program in the form of rebates for assets with residual value.

At a Glance:

  • ​​Company Type: Private 
  • Year Founded: 1999
  • Website: https://cascade-assets.com/ 
  • No. of Employees: more than 100
  • Headquarters Location: Madison, Wisconsin
  • Reviews: As of March 2025, neither Cascade Asset Management nor Sage Sustainable Electronics has not been rated on Gartner Peer Insights™, Trustpilot: No reviews found, Google: No reviews found for Cascade Assets, but Sage Sustainable Electronics received a 3.8 out of 5 from 16 reviews.

Bottom Line: Cascade is a good choice for companies in the Cascades freight zone, which includes Wisconsin, Illinois, Minnesota, Iowa, Indiana, Ohio, Michigan, Kentucky, and Florida. Also, while Cascade is NAID, e-Stewards ISO 9001, and ISO 1400 certified, if your company requires R2v3 certification, this may not be the best choice. 

Sims Lifecycle Services

Sims lifecycle websiteSLS specializes in managing retired electronic equipment, components, and metals.  They primarily cater to businesses, data centers, and manufacturers. The company offers services such as secure and compliant global IT asset disposition (ITAD), e-waste recycling, data center decommissioning, data destruction, and refurbishing, repairing, and restoring materials for continued use.  

Sims holds comprehensive certifications and provides online reporting. It operates globally with centers throughout the Americas, Europe, the Middle East, Africa, and Asia-Pacific regions. This extensive network allows it to support multinational companies and large data centers worldwide. The company also emphasizes sustainability, offering tools like a sustainability calculator to help clients quantify carbon emissions avoided through IT asset reuse and recycling.

At a Glance

  • ​​Company Type: Public
  • Year Founded: 2002
  • Website: https://www.simslifecycle.com/ 
  • No. of Employees: Over 4,000 employees globally
  • Headquarters Location: West Chicago, Illinois, 
  • Reviews: As of March 2025, Sims Lifecycles services has not been rated on Gartner Peer Insights™, Trustpilot: no reviews found. Google: no reviews found, Yelp: 3.6 out of 5 based on 13 reviews

Bottom line: SIMS is a good choice for global companies that need a vendor to participate in all aspects of the IT asset lifecycle, from procurement to maintenance to disposition. 

SK tes

SKtes website

SK tes specializes in sustainable technology services throughout the lifecycle of IT assets, including deployment and commissioning of technology devices, IT asset disposition (ITAD), battery recycling, and materials recovery. With facilities in 22 countries, SK tes offers service worldwide. They provide end-to-end lifecycle management for technology assets, from deployment to recycling. The company has developed proprietary processes for recycling and materials recovery, such as its lithium battery recycling technology particularly from electric vehicles.

SK tes places a strong emphasis on sustainability through electronics refurbishment.  The SK tes Consumer Solutions division offers data secure refurbishment, repair and remarketing services for consumer returns, trade-in and excess consumer electronics. They also boast a 99% recovery rate for processed materials and have committed to repurpose 1 billion kilograms of assets by 2030. 

At a Glance

  • ​​Company Type: Private
  • Year Founded: 2005 as TES rebranded in 2024 to SK tes
  • Website:https://english.tesgroup.de/ 
  • No. of Employees: Around 1000
  • Headquarters Location: Jurong Industrial Estate, Singapore
  • Reviews: As of March, 2025, SK tes has not been rated on Gartner Peer Insights™, Trustpilot: No reviews found, Google: No reviews found.

Bottom Line: SK tes is best for global companies that are more focused on reselling retired assets or have large quantities of commodities such as lithium batteries that need to be properly recycled.

DMD Systems IT Asset Disposal Service

DMD SystemsDMD Systems Recovery delivers comprehensive IT Asset Disposition (ITAD) solutions that prioritize environmental sustainability and data security. With a focus on protecting both client reputations and the planet, DMD serves a diverse clientele, including numerous companies and public entities. Core DMD Systems services include secure data destruction, asset decommissioning, and equipment redeployment and remarketing. These services span various IT categories, such as Data Center infrastructure, End User Computing devices, and Mobile technology.  DMD maintains certifications that include NAID AAA, R2v3, ISO 9001, 14001, and 45001. 

DMD operates three certified ITAD processing facilities in Tempe, AZ, Austin, TX, and Palo Alto, CA. Their “Reuse First™” approach prioritizes extending the lifecycle of IT assets whenever possible.  The company serves a wide range of industries, including healthcare, finance, and government.

At a Glance

  • ​​Company Type: Private
  • Year Founded: 1994
  • Website: https://www.dmdsystems.com/ 
  • No. of Employees: 50+
  • Headquarters Location: Tempe, Arizona,
  • Reviews: As of March. 2025, has a rating of 4.5 based on 5 reviews on Gartner Peer Insights™, Trustpilot: No reviews found, Google: 3.8 of 5 based on 16 reviews

Bottom Line: DMD Systems is a good choice for West Coast organizations seeking compliant and environmentally responsible IT asset disposition solutions.

Hummingbird International, LLC

Hummingbird InternationalHummingbird International, LLC specializes in IT asset disposition (ITAD) services, focusing on secure data destruction, asset remarketing, and environmentally responsible recycling. Founded in 2010, the company offers comprehensive solutions for the collection, auditing, recycling, and safe disposal of laptops, monitors, hard drives, and other IT equipment. Hummingbird International provides customized ITAD services tailored to clients’ specific needs. Their services include free e-waste pickup for both residential and commercial clients, ensuring a hassle-free process for disposing of obsolete electronics. 

The company adheres to NIST 800-88 standards for data destruction, utilizing software to overwrite personal data and physically shredding hard drives to eliminate any chance of data retrieval. Hummingbird International provides service to Philadelphia, New York, New Jersey, Pennsylvania, and Texas. Specific certifications are not mentioned on the Hummingbird website.

At a Glance

  • ​​Company Type: Private
  • Year Founded: 2010
  • Website: https://hummingbirdinternational.net/ 
  • No. of Employees: 2-10
  • Headquarters Location: Yardley, PA
  • Reviews: As of March. 2025, Hummingbird International has a rating of 5.0 based on 4 reviews on Gartner Peer Insights™, Trustpilot: No reviews found, Google: 3.4 of 5 based on 5 reviews

Bottom Line: Hummingbird may be a good choice for organizations in the New York area but make sure certifications such as R2v3 and NAID AAA are in place before proceeding.