Top IT Asset Disposition (ITAD) Companies 2025

Finding the top IT Asset Disposition (ITAD) companies can be challenging. This regularly updated list has been designed to help you identify the best options for your company based on some key factors. First, we discuss the factors to consider when choosing your ITAD partner, and we have a longer blog on that subject here. Then, we will provide a list of ITAD providers that you can choose from to find the best partner to meet your organization’s specific IT asset disposition needs. When making your final decision, consider scheduling consultations with multiple providers to assess their specific offerings and how well they align with your organization’s priorities regarding data security, environmental impact, and cost. 

What is ITAD?

ITAD is short-term for IT Asset disposition.  ITAD is the process every company must go through when refreshing IT Assets such as computers, tablets, smartphones, and storage devices. Because these devices often contain sensitive information and environmentally hazardous materials, disposal of end-of-life electronics is not as simple as throwing them in the trash.  ITAD vendors should bring Security, Accuracy, and Sustainability to your IT asset disposition process. Here are some questions to ask as you are assessing your various options:

Security

When selecting an ITAD vendor, security should be a top priority. A reputable vendor should provide comprehensive security measures addressing every aspect of the asset disposition process. This begins with a thorough evaluation of end-of-life equipment to inform decision-making about which data erasure and/or destruction methods should be employed and should extend to considerations such as transportation and logistics.

Certifications such as ISO-9001:2015, ISO 14001:1015, ISO 45001:2018, and NAID AAA certification for mobile and plant-based facilities can also inform an ITAD vendor’s commitment to data security. Compliance with industry-specific regulations is also important.  You should be aware of data destruction-related regulations specific to your industry, such as HIPAA, HITECH, or Gramm-Leach Bliley, CMMC, etc and be sure that your ITAD vendor complies with them.

Secure

The vendor should also be open to arranging site visits, talking with their references, and allowing you to assess their logistic and security requirements firsthand. Employee screening is another critical aspect of security. A trustworthy vendor will conduct thorough background checks on their employees, including fingerprinting and drug testing, and provide ongoing, intensive security training. These measures help ensure that reliable, well-trained professionals handle your sensitive data and assets throughout the disposition process.

Accuracy

A reputable ITAD vendor should provide comprehensive and accurate reporting on all processed assets. This includes maintaining a detailed audit trail that tracks each asset from when it enters its custody until its final disposition. While the industry average accuracy in ITAD reporting is 85%, you should look for a vendor who can exceed this number and provide highly accurate reporting, ideally with greater than 99% precision. To ensure the utmost accuracy in data capture, the vendor should implement a two-step verification process for all captured data, minimizing the risk of errors or discrepancies. After the asset disposition process, the vendor should furnish a certificate of destruction. This document is official proof that the assets have been properly disposed of and that any data contained within has been securely destroyed. 

In addition to basic asset tracking, a top-tier IT asset disposition vendor will go above and beyond by providing weight and LEED (Leadership in Energy and Environmental Design) reporting. This information is valuable for organizations looking to quantify their environmental impact and potentially earn credits for sustainable practices. 

Accurate

Finally, the vendor should offer a client portal to empower clients with full visibility into their asset disposition process. This portal should provide unlimited access to inventory reporting, allowing clients to review asset status, track progress, and generate reports as needed. Such a feature demonstrates the vendor’s commitment to transparency and client empowerment while streamlining their customers’ asset management process.

Sustainability 

When selecting an ITAD vendor, it’s crucial to prioritize sustainability and environmental responsibility. The ideal ITAD partner should prioritize sustainability through a two-pronged approach. First, they should focus on extending the life of IT assets through refurbishment and reuse whenever possible. This approach not only benefits the environment by extending the lifecycle of IT equipment and contributing to a circular economy but also provides financial advantages to your company. Second, for assets that cannot be reused, the vendor should employ environmentally friendly disposal methods that minimize the impact on ecosystems. 

A reputable vendor should hold certifications such as R2v3, which ensure adherence to responsible recycling practices and environmental standards. These certifications have rigorous requirements, demonstrate the vendor’s commitment to sustainable ITAD processes, and assure that they follow industry best practices. R2V3 certification ensures comprehensive environmental compliance, including agreements with all downstream vendors to dispose of sensitive materials properly and prevent environmental harm in vulnerable regions due to unethical e-waste recycling practices. 

sustainable (1)

Additional considerations

In addition to security, accuracy, and sustainability, other considerations exist when choosing your ITAD vendor. A quality vendor should be able to handle your specific asset types and volumes and have the logistics and transportation capabilities to support your needs. This includes scaling services up or down based on your requirements and tailoring their offerings to your unique situation.

End-to-end services are also important, so you only have to vet one vendor who can then handle everything from logistics and data destruction to remarketing and recycling. The vendor should offer on-site and off-site data destruction options, ideally with NAID AAA-certified mobile trucks and facilities. Convenient collection services are also important, whether through scheduled pick-ups, accessible drop-off locations, or mail-in options.

Flexibility is key when it comes to contracts and equipment. Be wary of vendors that lock you into long-term contracts. An established reputation for excellent service and reliability is also critical. Look for solid testimonials from clients in similar industries to gauge the vendor’s track record. Finally, responsive customer support can significantly improve your ITAD experience. A dedicated project manager can ensure that any issues or questions are addressed promptly, helping to streamline the entire ITAD process and provide peace of mind.

Securis

Securis provides secure, accurate, sustainable, certified, and compliant on-site and off-site data sanitization and IT asset disposal and recycling for PCs, laptops, hard drives, solid-state drives, smartphones, servers, and other e-waste using NSA-approved degaussing and drive shredding technology and NIST 800-88 compliant drive wiping.   Many Securis customers are in highly regulated industries such as government, healthcare, and financial services.  In response, Securis has spent more than 20 years developing best practices for destroying classified and highly sensitive data.  Securis holds certifications for ISO 9001, ISO 14001, and ISO 45001, as well as a NAID AAA (i-sigma) certification. In addition, Securis is certified by the DLA (Defense Logistics Information Service) to store and transport military critical technical data and by the Department of Transportation to transport e-waste materials.  Securis also complies with relevant regulations, such as HIPAA, HITECH, OSHA, Gramm-Leach Bliley, FERPA, and many more. Securis is also R2V3 certified to responsibly remarket or recycle every component in your retired electronic devices, ensuring e-waste stays out of landfills and your ESG rating is increased. Securis also has a Certified Secure Destruction Specialist® (CSDS®) on staff, so you can be sure that regulatory compliance, information security, and risk management protocols are always top-tier.

Securis provides a thorough chain of custody and a transparent and well-documented process for your IT asset disposition projects, culminating in a certificate of destruction, all readily accessible to you 24/7 from their Client Portal.  Inventory reports have been demonstrated to be greater than 99% accurate.   Securis’ value recovery program assures the best possible return for any residual value in your end-of-life IT assets.  Securis has more than 50 five-star reviews on Google and positive reviews on Gartner.  Securis provides services throughout the continental U.S.

At a Glance:

  • Company Type: Private
  • Year Founded: 2000
  • Website: https://securis.com/ 
  • Headquarters Location: Virginia, USA
  • No. of Employees: 51-200
  • Reviews: As of March, 2025, Securis has an Overall Rating of 5 out of 5 in the IT Asset Disposition market, based on 6 reviews on Gartner Peer Insights™, Trustpilot – No Reviews Google: 4.8 out of 5 based on 82 reviews

Bottom Line: Securis is the best overall choice for companies looking for secure, accurate, and sustainable ITAD services. Securis offers military-grade certifications, ESG reporting, and flexible nationwide IT asset disposition services.

Iron MountainIron Mountain

Iron Mountain is best known for its records management capabilities, which historically have been paper and tape storage, backup, and recovery services.  They are one of the largest companies in the United States and have a recognizable brand name globally.  Iron Mountain entered the ITAD business in 2021 by acquiring IT Renew, based in Newark, California. In November 2023, Iron Mountain completed the acquisition of Regency Technologies, expanding its presence in the IT asset disposition market.  In September 2024, Iron Mountain also acquired Wisetek, adding to its portfolio of ITAD acquisitions. 

Iron Mountain now provides IT Asset Disposition services as part of its broader IT Asset Lifecycle Management (ALM) offerings, which include data destruction, asset remarketing, e-waste recycling, and comprehensive reporting.

At a Glance:

  • Company Type: Public
  • Year Founded: 1936
  • Website:  http://www.ironmountain.com 
  • Headquarters Location: Boston, USA
  • No. of Employees: 10001+
  • Reviews: As of March 2025, Iron Mountain has an Overall Rating of 3.7 out of 5 in the IT Asset Disposition market, based on 2 reviews on Gartner Peer Insights™, Trustpilot – 1.3 based on 90 reviews.  Google: none found

Bottom Line: Iron Mountain offers a comprehensive set of services but may not be best of breed for all of them. Companies are likely to choose them for ITAD services, with an existing procurement relationship is a key factor.

HOBI International Inc

HOBI International

HOBI International, Inc. provides IT asset disposition and managed mobile services. The company specializes in sustainable solutions for managing and disposing of global IT and mobile assets for businesses. HOBI’s services include data security and erasure, mobility managed services, reverse logistics, data center services, enterprise asset services, and environmental services, with systems designed to maximize a client’s return on obsolete assets while minimizing processing costs.  Hobi processes more than 1 million individual assets annually across its three facilities in Dallas, Phoenix, and its original location in Batavia, Illinois. 

HOBI also offers a custom-designed data management system with concise reporting on logistics, costs, asset serialization and configuration, redeployment schedules, sales history, and scrap summaries. 

At a Glance:

  • Company Type: Private
  • Year Founded: 1992
  • Website: https://hobi.com/
  • Head Office Location: Batavia, Illinois, United States
  • Reviews: As of March 2025, HOBI has not been rated on Gartner Peer Insights™, 1.0 based on 1 review on Yelp No others reviews found

Bottom Line: HOBI maintains R2v3, RIOS, and ISO 14002 certifications and is a WBE-certified company but does not have a NAID-certified facility.

DELLDELL

Dell offers end-to-end device lifecycle management, including inventory tracking, equipment repair/replacement, upgrades, and responsible disposition. This can simplify IT asset management for companies with large, dispersed workforces. Dell manages the entire IT asset disposition process, including pickup logistics for any leased or owned hardware brand, secure data wiping following NIST SP 800-88 R1 standards, device resale or recycling, and online tracking through Dell’s TechDirect portal. Dell has a strong focus on sustainability and circular economy principles. They aim to recycle or reuse an equivalent product for every product a customer buys. 

Dell has expanded its Asset Recovery Services to 35 countries outside the U.S., covering Canada, Europe, the Middle East, Africa, and Asia. This makes Dell a viable option for multinational corporations. While Dell can handle multi-vendor assets, its ITAD services encourage the continued use of Dell products, potentially limiting flexibility in IT procurement decisions. While Dell offers some flexibility, its services may not be as customizable as those of specialized ITAD providers. In addition, Dell uses third-party partners for some aspects of disposition. 

At a Glance:

  • Company Type: Public
  • Year Founded: 1984
  • Website:https://www.dell.com
  • Headquarters Location: Round Rock, Texas, USA
  • No. of Employees: Approximately 120,000
  • Reviews: As of March 2025, Dell has an Overall Rating of 5 out of 5 in the IT Asset Disposition market, based on 1 review on Gartner Peer Insights™, Trustpilot – 1.4 based on 303 reviews.  Google: none found

Bottom Line: Customers who are exclusive users of Dell servers, storage, and laptops are most likely to consider using them for ITAD services.

Ingram Micro

INGRAM MicroIngram Micro is an American distributor of information technology products and services. In February 2016, it was acquired by Chinese conglomerate HNA Group. In May 2018, it acquired CloudBlue, which offers cloud commerce services. Ingram Micro’s approach to ITAD is comprehensive and focused on risk management, logistics, asset repair, and refurbishment, and maximizing residual asset value. 

Ingram Micro offers onsite and offsite data erasure and destruction services, including degaussing and physical shredding. Its industry sectors include enterprise, government, manufacturing, legal, retail, and healthcare. Ingram uses a proprietary system called BlueIQ for global asset tracking and intelligence throughout the ITAD process and also performs re-sales through a platform named RENUGO.

At a Glance:

  • Company Type: Private
  • Year Founded: 1979
  • Website: http://www.ingrammicro.com 
  • Headquarters Location: Irvine, USA
  • No. of Employees: 10001+
  • Reviews: As of March 2025, Ingram Micro has an Overall Rating of 5 out of 5 in the IT Asset Disposition market, based on 1 review on Gartner Peer Insights™, Trustpilot – 1.4 based on 144 reviews.  Google: none found

Bottom Line: As a large distributor of IT Services, customers have access to Ingram Micro Service through a large network of value-added resellers

HPE 

HPE

HPE (Hewlett Packard Enterprise) offers comprehensive IT Asset Disposition services as part of its IT asset lifecycle management solutions. HPE prioritizes the reuse of IT assets over recycling, supporting the management of multi-generational environments. This strategy aligns with sustainability goals by extending the life of IT products and reducing environmental impact.  HPE provides asset recovery services, including collecting, inventorying, transporting, sorting, and processing IT products for recycling or remarketing.  

HPE partners with other ITAD companies to source used HPE computers and to subcontract ITAD services. Devices are processed through HP-approved partners and audited by a third party. If equipment cannot be repurposed, it is responsibly recycled. HPE offers a full suite of IT asset lifecycle management solutions, including the option to purchase pre-owned technology. It also has a large global presence, offering services in multiple countries.  However, there are service limitations with HPE, as in many countries, the HP ITAD Service is currently available for direct customers only. In addition, onsite decommissioning services are only available in Australia, Germany, the United Kingdom, and the United States. 

At a Glance:

  • ​​Company Type: Public
  • Year Founded: 2015
  • Website: http://hpe.com 
  • Headquarters Location: Houston, US
  • No. of Employees: 10001+
  • Reviews: As of March, 2025, HPE has an Overall Rating of 4 out of 5 in the IT Asset Disposition market, based on 1 review on Gartner Peer Insights™, Trustpilot – 1.2 based on 7,793 reviews  Google: none found

Bottom Line: HPE is best suited for companies that are committed users of HPE equipment and often reuse HPE equipment for different employees.  

ERI

ERIERI is one of the largest and most well-known ITAD companies. It claims 

to be the largest fully integrated IT and electronics asset disposition provider in the United States and possibly the world. ERI maintains NAID AAA,  R2, and e-stewards certifications. In 2021, it announced an investment by the private equity firm Closed Loop Partners. 

ERI uses its partner network to provide services in the U.S. and 46 countries. It offers a full range of ITAD services, including data destruction, asset tracking and reporting, repair and reuse, parts harvesting, recycling, compliance management, and device remarketing. ERI also ensures regulatory compliance and meets or surpasses corporate risk management requirements.

At a Glance:

  • ​​Company Type: Private
  • Year Founded: 2002
  • Website: https://eridirect.com 
  • Headquarters Location: Fresno, California 
  • No. of Employees: Approximately 1000
  • Reviews: As of March 2025, ERI has not been rated on Gartner Peer Insights™, Trustpilot – no reviews found Google: no reviews found

Bottom Line: Customers looking for an international presence and a fully integrated ITAD supply chain may likely choose ERI.

ER2

ER2

ER2 provides IT Asset purchasing, installation, tracking, and disposal services. ER2 operates in Arizona, California, Tennessee, Nebraska, Florida, and Texas but offers worldwide service.  ER2 is a private company specializing in technology life cycle solutions, primarily serving Fortune 1000 clients. 

The company was founded in 2011 and has shown significant growth since its inception, being recognized as one of the fastest-growing companies in the US for multiple years. ER2 focuses on providing complete IT asset management services, from installation to deployment, while maintaining a commitment to social and environmental responsibility

At a Glance:

  • ​​Company Type: Private
  • Year Founded: 2011
  • Website: https://er2.com 
  • Headquarters Location: Memphis, Tennessee,
  • No. of Employees: 120
  • Reviews: Reviews: As of March 2025, ER2 has not been rated on Gartner Peer Insights™, Trustpilot – no reviews found Google: no reviews found

Bottom Line: ER2 is well suited to companies that want to work with one vendor to manage the entire IT lifecycle, from purchasing and installing to disposing of end-of-life equipment.

Dynamic Lifecycle Innovations

Think DYnamic websiteIn 2018, Dynamic Recycling changed its name to Dynamic Lifecycle Innovations to reflect a dedication to providing clients with customized, secure, and cost-effective solutions for all stages of the IT lifecycle, including e-recycling, materials recovery, refurbishment, or decommissioning outdated IT assets.  Dynamic Lifecycle Innovations is a full-service electronics and materials lifecycle management corporation providing solutions for IT asset disposition, data security, product refurbishment, remarketing and resale, electronics recycling, legislative compliance, metals recovery, and logistics.  

Dynamic is certified for NAID AAA, R2v3, E-stewards, ISO 9002, ISO 14001, ISO 45001.  With physical locations in Onalaska, Wis. and Nashville, Tenn., the company claims to service 100 countries across six continents. Dynamic has a carbon calculator tool that includes details for 30 different categories of e-waste, comprising of both whole units and component parts

At a Glance:

  • ​​Company Type: Private
  • Year Founded: 2007
  • Website: https://thinkdynamic.com/ 
  • No. of Employees: 201-500 employees
  • Headquarters Location: Onalaska, Wisconsin 
  • Reviews: As of March 2025, Dynamic Lifecycle Solutions has not been rated on Gartner Peer Insights™, Trustpilot – no reviews found. Google: 4.3 based on 26 reviews  Yelp: 3.0 out of 4 based on 4 reviews

Bottom Line: Best for companies who value extremely detailed ESG reporting.

Cascade Asset Management – (now owned by Sage Sustainable Electronics)

Cascade website

Cascade Asset Management has been acquired by Sage Sustainable Electronics.  The combined company will operate under the Sage umbrella but will keep the Cascade name. Over 20 years of experience in the ITAD industry. Cascade specializes in healthcare, finance and insurance, education, government, and technology and was NAID AAA certified, e-stewards certified, ISO 9001 and ISO 14001 certified, and PCI-DSS (Payment Card Industry Data Security Standard) compliant.  Cascade brings a secure chain-of-custody process to Sage, and Sage brings a strong set of tools to provide third-party-certified impact reporting to clients, an area in which Cascade has been less active. 

Cascade offers a full range of ITAD services, including on-site inventory and data destruction, secure logistics and transportation, asset testing, erasure, and unlocking. It also offers options for asset resale, recycling, donation, redeployment, or return to the company. Cascade has a value recovery program in the form of rebates for assets with residual value.

At a Glance:

  • ​​Company Type: Private 
  • Year Founded: 1999
  • Website: https://cascade-assets.com/ 
  • No. of Employees: more than 100
  • Headquarters Location: Madison, Wisconsin
  • Reviews: As of March 2025, neither Cascade Asset Management nor Sage Sustainable Electronics has not been rated on Gartner Peer Insights™, Trustpilot: No reviews found, Google: No reviews found for Cascade Assets, but Sage Sustainable Electronics received a 3.8 out of 5 from 16 reviews.

Bottom Line: Cascade is a good choice for companies in the Cascades freight zone, which includes Wisconsin, Illinois, Minnesota, Iowa, Indiana, Ohio, Michigan, Kentucky, and Florida. Also, while Cascade is NAID, e-Stewards ISO 9001, and ISO 1400 certified, if your company requires R2v3 certification, this may not be the best choice. 

Sims Lifecycle Services

Sims lifecycle websiteSLS specializes in managing retired electronic equipment, components, and metals.  They primarily cater to businesses, data centers, and manufacturers. The company offers services such as secure and compliant global IT asset disposition (ITAD), e-waste recycling, data center decommissioning, data destruction, and refurbishing, repairing, and restoring materials for continued use.  

Sims holds comprehensive certifications and provides online reporting. It operates globally with centers throughout the Americas, Europe, the Middle East, Africa, and Asia-Pacific regions. This extensive network allows it to support multinational companies and large data centers worldwide. The company also emphasizes sustainability, offering tools like a sustainability calculator to help clients quantify carbon emissions avoided through IT asset reuse and recycling.

At a Glance

  • ​​Company Type: Public
  • Year Founded: 2002
  • Website: https://www.simslifecycle.com/ 
  • No. of Employees: Over 4,000 employees globally
  • Headquarters Location: West Chicago, Illinois, 
  • Reviews: As of March 2025, Sims Lifecycles services has not been rated on Gartner Peer Insights™, Trustpilot: no reviews found. Google: no reviews found, Yelp: 3.6 out of 5 based on 13 reviews

Bottom line: SIMS is a good choice for global companies that need a vendor to participate in all aspects of the IT asset lifecycle, from procurement to maintenance to disposition. 

SK tes

SKtes website

SK tes specializes in sustainable technology services throughout the lifecycle of IT assets, including deployment and commissioning of technology devices, IT asset disposition (ITAD), battery recycling, and materials recovery. With facilities in 22 countries, SK tes offers service worldwide. They provide end-to-end lifecycle management for technology assets, from deployment to recycling. The company has developed proprietary processes for recycling and materials recovery, such as its lithium battery recycling technology particularly from electric vehicles.

SK tes places a strong emphasis on sustainability through electronics refurbishment.  The SK tes Consumer Solutions division offers data secure refurbishment, repair and remarketing services for consumer returns, trade-in and excess consumer electronics. They also boast a 99% recovery rate for processed materials and have committed to repurpose 1 billion kilograms of assets by 2030. 

At a Glance

  • ​​Company Type: Private
  • Year Founded: 2005 as TES rebranded in 2024 to SK tes
  • Website:https://english.tesgroup.de/ 
  • No. of Employees: Around 1000
  • Headquarters Location: Jurong Industrial Estate, Singapore
  • Reviews: As of March, 2025, SK tes has not been rated on Gartner Peer Insights™, Trustpilot: No reviews found, Google: No reviews found.

Bottom Line: SK tes is best for global companies that are more focused on reselling retired assets or have large quantities of commodities such as lithium batteries that need to be properly recycled.

DMD Systems IT Asset Disposal Service

DMD SystemsDMD Systems Recovery delivers comprehensive IT Asset Disposition (ITAD) solutions that prioritize environmental sustainability and data security. With a focus on protecting both client reputations and the planet, DMD serves a diverse clientele, including numerous companies and public entities. Core DMD Systems services include secure data destruction, asset decommissioning, and equipment redeployment and remarketing. These services span various IT categories, such as Data Center infrastructure, End User Computing devices, and Mobile technology.  DMD maintains certifications that include NAID AAA, R2v3, ISO 9001, 14001, and 45001. 

DMD operates three certified ITAD processing facilities in Tempe, AZ, Austin, TX, and Palo Alto, CA. Their “Reuse First™” approach prioritizes extending the lifecycle of IT assets whenever possible.  The company serves a wide range of industries, including healthcare, finance, and government.

At a Glance

  • ​​Company Type: Private
  • Year Founded: 1994
  • Website: https://www.dmdsystems.com/ 
  • No. of Employees: 50+
  • Headquarters Location: Tempe, Arizona,
  • Reviews: As of March. 2025, has a rating of 4.5 based on 5 reviews on Gartner Peer Insights™, Trustpilot: No reviews found, Google: 3.8 of 5 based on 16 reviews

Bottom Line: DMD Systems is a good choice for West Coast organizations seeking compliant and environmentally responsible IT asset disposition solutions.

Hummingbird International, LLC

Hummingbird InternationalHummingbird International, LLC specializes in IT asset disposition (ITAD) services, focusing on secure data destruction, asset remarketing, and environmentally responsible recycling. Founded in 2010, the company offers comprehensive solutions for the collection, auditing, recycling, and safe disposal of laptops, monitors, hard drives, and other IT equipment. Hummingbird International provides customized ITAD services tailored to clients’ specific needs. Their services include free e-waste pickup for both residential and commercial clients, ensuring a hassle-free process for disposing of obsolete electronics. 

The company adheres to NIST 800-88 standards for data destruction, utilizing software to overwrite personal data and physically shredding hard drives to eliminate any chance of data retrieval. Hummingbird International provides service to Philadelphia, New York, New Jersey, Pennsylvania, and Texas. Specific certifications are not mentioned on the Hummingbird website.

At a Glance

  • ​​Company Type: Private
  • Year Founded: 2010
  • Website: https://hummingbirdinternational.net/ 
  • No. of Employees: 2-10
  • Headquarters Location: Yardley, PA
  • Reviews: As of March. 2025, Hummingbird International has a rating of 5.0 based on 4 reviews on Gartner Peer Insights™, Trustpilot: No reviews found, Google: 3.4 of 5 based on 5 reviews

Bottom Line: Hummingbird may be a good choice for organizations in the New York area but make sure certifications such as R2v3 and NAID AAA are in place before proceeding.

Guardian Data Destruction

Guardian Data Destruction partners with ITADs, MSPs, Resellers, and value-added resellers (VARs) to deliver best-in-class onsite drive shredding services.  They are  NAID AAA certified, NIST-compliant equipment, and have a process that can help protect customers from data breaches.  Their mobile trucks serve most of the lower 48 U.S. States and have partnerships to destroy data internationally.

In May 2024, Guardian Data Destruction announced an investment by San Francisco-based private equity firm Housatonic Partners. They also announced that Glen Laga was retiring and Rob Alston was taking his place as CEO.

At a Glance

  • ​​Company Type: Private
  • Year Founded: 2009
  • Website: https://guardiandatadestruction.com/
  • No. of Employees: 80
  • Headquarters Location: Hackensack, NJ
  • Reviews: As of May. 2025, Guardian Data Destruction does not have reviews on Gartner Peer Insights™ as they are not a ITAD vendor, Google: 4.4 of 5 based on 10 reviews

Bottom Line: Guardian is a good choice for organizations looking for on-site shredding when they already have an R2v3-certified recycling partner.

Advancing IT Asset Inventory Management

How Securis is Increasing Accuracy and Efficiency with Cutting-Edge Scanning Technology

Inventory accuracy is a cornerstone of effective IT Asset Management and Disposal (ITAD). Securis has recently invested substantially in state-of-the-art handheld mobile computers in our ongoing pursuit to provide industry-leading asset-tracking accuracy. Our latest investment propels us even further towards delivering the most accurate and efficient IT asset inventory tracking available.

Introducing Zebra TC58 Scanners Advancing Asset Tracking

Scanner TC58Securis has recently upgraded our handheld scanners to Zebra TC58s, a powerful, enterprise-class handheld mobile computer designed to streamline and improve inventory management. The TC58 is fantastic at capturing barcodes, even if they are damaged or poorly printed. Powered by a robust Qualcomm Snapdragon 8-core processor, the TC58 enables faster and more efficient operation, allowing it to handle demanding applications effortlessly, ensuring a seamless and efficient scanning process.

Enhanced cameras in the TC58 (16MP rear and 5MP front) make it easier to capture high-quality images for proof of delivery, asset tracking, or inspection tasks. The enhanced cameras have improved the ability of our DriveSnap AI technology, our AI-powered asset label scanning innovation that enhances speed and accuracy in asset scanning and provides a photo record of each scanned asset slated for destruction. 

Beyond speed and accuracy, these handheld mobile computers align with our broader technology upgrades to tackle persistent IT Asset Management and Disposition challenges. Two key issues historically plaguing the industry are duplicate scanning and matching drives to their respective storage controllers, servers, and cabinets. Our enhanced scanning capabilities directly address these pain points, significantly improving efficiency and accuracy.

Eliminating Duplicates: Enhancing Accuracy and Efficiency

Eliminate duplicate scanningMistakes are inevitable when scanning thousands of assets daily. Industry data suggests that scanning accuracy typically falls below 85%. A common issue is the inadvertent duplication of scanned items, leading to time-consuming investigations.

Our new scanning technology has significantly improved duplicate detection, allowing us to eliminate errors and streamline operations. This advancement has dramatically reduced the time required to investigate discrepancies, ensuring our clients receive the most accurate reporting possible. As our Mobile Device Administrator Michelle Armon notes, “Not having to worry about duplicate items being scanned has significantly increased our efficiency around asset scanning and brings us closer to our goal of 100% accurate reporting.”

One-to-Many Matching: A Tailored Solution for Client Needs

One to many scanningOne of the most significant challenges in ITAD is ensuring that every asset is correctly matched to its corresponding storage device before being securely disposed of. Many of our clients, particularly those in the banking and financial services sectors, require assets to be matched to their storage cabinets for compliance and financial reasons.

For example, financial institutions often track their IT assets using asset tags and serial numbers. Before destruction, they must confirm that all drives in a storage cabinet have been purged or destroyed according to NIST 800-88 standards. Furthermore, some clients receive trade-in credits when they return storage arrays or servers to vendors such as IBM, HP, or Dell. Our new scanning technology facilitates the seamless matching of one storage array or cabinet to all associated drives, providing comprehensive and accurate inventory lists tailored to client requirements.

The Future of IT Asset Management at Securis

Implementing our new scanning technology marks a significant leap forward in our mission to provide the industry’s most precise and reliable IT asset inventory tracking solutions. By addressing key challenges such as duplicate scanning and one-to-many asset matching, we are enhancing our clients’ security, compliance, and efficiency.

Securis remains committed to setting new standards in IT Asset Management and Disposition as we continue to evolve and invest in cutting-edge solutions. Our latest advancements in scanning technology are just one example of how we strive to provide unparalleled service and innovation to meet our clients’ evolving needs.

Stay tuned for more updates as we push the boundaries of what’s possible in IT asset inventory management!

Sustainability Meets National Security

Sustainability Meets National Security-Interview  Transcript

Attendees

Kurt Greening, EVP Securis

Richard “Dick” C. Schaeffer, Jr

Mr. Schaeffer is a former Senior Executive with the National Security Agency (NSA), with almost 50 years in the Information Security, Cyber Security, and Intelligence space. Since retiring in 2010, Mr. Schaeffer has continued to pursue his passion for improving the security of U.S. and partner interests in the Cyber domain. He started a private consulting firm, Riverbank Associates, LLC, located in Severna Park, Maryland, bringing visionary leadership, management, technical experience and expertise to his client’s challenges. His client base has included a full range of private sector companies from small start-ups, middle market companies, large system integrators, commercial businesses, and international entities.  He also leads the Paladin Strategic Advisory Group and is a Principal in Endeavor Technology Group.

Bill Downer

Bill is a Managing Director at Rare Element Solutions, a company that was formed to solve supply chain challenges for the U.S. Department of Defense.   Before starting Rare Earth Element Solutions Bill was vice president of national programs at Seagate Government Solutions, a provider of data management solutions to federal agencies.  Downer previously held several sales-related directorial roles in companies such as Sun Microsystems, DEC, StorageTek, Quantum, Mellanox Technologies and DataDirect Networks. Downer earned a master’s degree in business administration from Averett University and a bachelor’s degree in religious studies from Randolph-Macon College.

Transcript

Kurt Greening: Welcome Dick and Bill. For anyone who doesn’t know,  my name is Kurt Greening and I am an executive VP with Securis. We’re an industry leader in drive shredding and IT asset disposal. And today we’re here to talk about two important issues, sustainability and national security. For those of you who may or may not know Bill and Dick, I’ll just read a quick bio, and if I miss anything, maybe the two of you can help me a little bit.

Kurt Greening: But Dick Schaefer actually is a former executive with the National Security Agency, NSA, and he spent almost 50 years in the information security cyber security, and, intelligence., and he’s still pretty active these days, doing things like working for Riverbank Associates, working for Paladin.

Kurt Greening: in terms of investing in some up-and-coming technologies. and he’s also a principal in Endeavor Technology. Did I miss anything Dick you want me to point out?

Richard Schaeffer: No, that’s it.

Richard Schaeffer: I’m an old guy who’s been seen a lot.

Kurt Greening: Awesome. That’s great.  And Bill, it’s great to have you on as well. I’m excited to introduce people to Rare Element Solutions which is a company that recently has been created to solve supply chain issues for the US Department of Defense.

Bill Downer: Yeah.  Thanks, Kurt.

Kurt Greening: And I know you’ve been around also for a while working for people like Seagate, Sun, DAX, Storage Tech, Quantum if there’s an expert out there in the data storage industry, I think your resume kind of screams that. So I’m really excited to have you on and introduce people to what Rare Element is doing. So, maybe if I could start with you, to help our audience, can you explain to people how supply chain became a national security issue or became an issue that maybe more people are now aware of today?

Richard Schaeffer: Yeah, I think it’s more the latter. Supply chain has always been a national security issue. whether that is in the aerospace and defense, whether that’s in intelligence, whether anytime the US government has built something to execute or conduct a mission, the things that go into the technology that supports those missions has always been critical. we haven’t always thought about it in the context of supply chain.  We would design things, we would order material, we would build things, we would test them, we would deploy them. and eventually they’d reach end of life and they’d probably end up in a warehouse somewhere or I started out life in the Marine Corps. we were the folks that got everything after the other services were done using them.

Richard Schaeffer: So we learned how to do a lot with very little. But over the last 10 years the concept of understanding protecting the supply chain has become more and more important.  And then I think during the COVID era when all of a sudden the containers sat on ships in harbors on the west coast or on the east coast and components couldn’t be brought ashore because of the shortage of personnel or the inability to move the material off the docks and so forth.

Richard Schaeffer: people became more aware of just what it meant when you couldn’t order get material, build things, deliver things, and so forth. and there’s always been an issue with at end of life, how do you ultimately take something that has been a critical mission component? I’ll say all my years at NSA we worried about national security systems.  of those systems that procified that process classified information or were part of weapon systems and you worry how do you destroy devices that are part of that ecosystem such that if an adversary was to obtain those devices they couldn’t extract anything from them that was useful.

00:05:00

Richard Schaeffer: and NSA was responsible for setting the standards for how that was done. the discipline to do that I’m not always sure was at the highest level that it needed to be because I think IG’s and others would find warehouses where there was equipment stored that probably should have been destroyed years ago or things were done just out of expediency the people who were actually doing it weren’t even aware of the requirements for how things should be processed.

Richard Schaeffer: But I think we’re in a time now in a phase when supply chain’s important and it’s important to think about supply chain from whether it’s mining or that that creates the aluminum, titanium, other metals from which gearboxes or other kinds of devices that go into aerospace and defense components or whether it’s the sand that forms the silicon devices from which micro electronic devices are produced and then ultimately at the end how those things are recovered. I think it’s a much much bigger issue today but it’s not new.

Richard Schaeffer: It’s the attention we’re bringing to the capabilities that we can bring to that environment and then ultimately how do we ensure that we’re maximizing the value chain that’s part of this whole process as well.

Richard Schaeffer: So probably more than you wanted on just the national security aspects of it but it’s an extraordinarily complex topic. not well understood by a lot of people who are outside of the immediate area impacted by supply chains.

Kurt Greening:. Perfect. Yeah, thanks for that. Bill when I talk to a lot of people about sustainability, they’re thinking about Earth Day recycling cans, can I buy an electric car? But maybe an area that they might be less familiar with is electronics. How does electronics play a role in sustainability?

Richard Schaeffer: Well I’ll start and then maybe kick it over to Bill. As I pointed out earlier, NSA is responsible for the destruction piece.  So, there are materials that we’re able mine in partner, countries that become the feed stock, if you will, for the microelectronic devices. we used to produce a lot of them here. actually NSA used to have its own foundry. we used to build our own chips.

Richard Schaeffer: NSA doesn’t do that anymore. there are a few microelectronic fabrication facilities here in the US. Maybe there will be more in with thrust of the current administration, but a lot of that comes from offshore. and so the devices are fabricated, they’re manufactured, they’re delivered, and then they’re put into systems here. And it used to be that when we destroyed something like a solid-state drive or a hard drive or something like that, we crush it up and then take it to a landfill. it became part of the terrain.

Richard Schaeffer: and that was done because we didn’t have the ability to recover the devices, even the precious metals in a lot of cases. you look at a printer wiring board today, there’s silver there, there’s gold there, and a lot of cases, we just crush it up and it goes to the landfill. and you say now are there ways in which we can actually at a reasonable price point recover some of that material so that we can feed it back to the front end of that big supply chain loop.

Kurt Greening: Yeah, maybe we’ll talk about the economics at the end. Bill, any thoughts or things you want to add to that?

00:10:00

Bill Downer: No, and I agree with Dick and his opening remarks that there was a lot of focus coming to this prior to COVID and the pandemic and where a lot of our materials for what the US government uses and the banks and everyone else were coming from China.  But to Dick’s point, the pandemic really put a microscope on so much when we could no longer get it into the country.

Bill Downer: we really became very evident of where the products or the sub-asssemblies or materials are coming from and as a result created rightfully so an alarm around where are these things coming from and how much at risk was the US because it didn’t really understand all the dynamics of the supply chain and now it has really become very much a focus

Bill Downer: which I think is great. sorry it had to be a pandemic that brought us to this point but for good outcome as a result

Kurt Greening: To the good outcomes, what are some of the things, strategies or programs that the US government is employing to solve some of these issues?

Kurt Greening: I don’t know, Dick, you want to take that one?

Richard Schaeffer: Yeah. Let me start. And again, I’ll let let Bill chime in here as well. I think it’s okay. The US government now recognizes that there’s an issue. the problem is and we do with so many big challenges in the federal government, there’s a lot of people who are involved. And whenever there’s a lot of people involved, it usually ends up where no one’s in charge. So if you think of supply chain security today, everybody’s got a little piece of it. Everybody in the federal government. So you’ve got the Department of Defense, yeah, they’ve got a big role. You’ve got Department of Homeland Security, they’ve got a role. Department of Commerce has a role. and in defense, if you look down amongst all the defense departments and agencies, everybody’s got a little role. And there there really isn’t,  there are there are policies, there are regulations, there are best practices, but there really isn’t a US government champion who is what I would call the great advocate for both the materials and the processes and who can set priorities.

Richard Schaeffer: So if if we need I’ll do something simple like if we need aluminum for manufacturing of aerospace and defense systems that can be air breathers, it can be satellites, it can be remotely piloted vehicles, unmanned aerial systems, drones, it can be a whole series of things. and there’s probably 20 different kinds of aluminum. if you go to the mines and you say, “Okay, I think it’s oxite that you create aluminum Okay, here, here’s a mine, we mine the ore, we process it somewhere. We create the alloys of aluminum by adding stuff to them and then they go off to be satellite components or airframe components whatever they do. Oh and some of this stuff has to be of a form where it can be machined, where it can be and so the manufacturer, the supply chain for that from the mining all the way through to the delivery of the components is there’s probably 10 or 15 departments and agencies that are involved in that whole process. The health and human services from an OSHA standpoint, what can people do? what can’t they do?

Richard Schaeffer: but there’s nobody who’s sort of sitting at the top saying aluminum is a critical component to aerospace and defense and we need to ensure that we’ve got input into that supply chain into the beginnings of manufacturing the creation of the material and then in the end how do we recycle  that stuff? Okay, we’ve got an F-15 that’s longer serviceable. we were flying A4s when I was in Vietnam and when they got shot up, we took them out in South China Sea and a big CH53 would carry them out there and dump them in the ocean or dump them in the sea and they’re probably disintegrated by now. That wasn’t very effective.

00:15:00

Richard Schaeffer: But it’s kind of a government mindset if there’s nobody saying here’s the priorities, here’s the processes, here’s what we need to do in order to be able to create, here’s what we need to be able to do to at end of life to recover, and here’s how all the agencies will play together in order to make that all happen. We just don’t have that today.

Kurt Greening: Yeah, great great background.

Kurt Greening: So, you gave us some examples of, planes and weapon systems and aluminum. Bill, you’re kind of our resident expert here on the interview on data storage. Tell me about What do hard drives have in inside of them that make them so valuable to the DoD?

Bill Downer: So to Dick’s point, a lot of the connectors use precious metals. in fact, the platters have been different materials over time, whether they were aluminum or glass. and all of that is recyclable, well both of those particular things are very recyclable, but at the end of the day data storage is about zeros and ones and historically how we’ve created the data on any storage device. The zeros and ones has to do with magnetism and using magnets.  And as we get more and more sophisticated, as we shrink these things down, you made more and more sophisticated magnets, which has led us to building the magnets out of rare earth metals. because everything Dick said earlier about the difficulty in mining those ores, the difficulty in processing them, they have become more and more valuable. And that’s why responsible retirement and reclamation becomes such an imperative because those materials are so hard to

Kurt Greening: Thanks for that. Dick, you kind of answered this question that, telling us there’s at least 15 different agencies in the federal government helping with this problem. I have some knowledge that DOE is also helping with some research grants and in this area. Is there anything that stands out there in terms of work that’s exciting?

Richard Schaeffer: I’m probably not as sort of current on Yeah,…

Kurt Greening: And that’s an area outside of your experience.

Kurt Greening: I mean, I know that they’re one of the 15. yeah, right.

Richard Schaeffer: I would just say, from a DOE perspective I mean, the US government has long used the DOE labs as I’ll say think tanks, and basic research components to explore of doing kind of a simple term ways of doing things.

Kurt Greening: Yeah. Yeah.

Richard Schaeffer: Anytime we had a hard problem, whether it was nuclear fusion or fission or whether it is possibly recovery of material, we’ve used the national labs as think tanks within the government classified environments in many cases to explore solutions to big hard problems and so the ability to create those solutions is interesting, but it’s not very helpful if you can’t get them out and then make them commercially viable. And tech transfer is always hard.

00:20:00

Richard Schaeffer: But if you can find ways to move the science, move the process from the laboratory to the commercial entity that can create a value proposition for executing the process, then what we’ve got is a winner. We’ve got government investment in a national lab creating a solution to a problem that can then be productized and turned into a moneymaking commercial entity which then satisfies the need of a large group of people not just a couple of scientists inside a lab.

Kurt Greening: That’s a good point Dick. So, speaking of winners and commercial viability, Bill, what made you think that you needed to start a company to help solve this problem?

Bill Downer: It’s funny and it perfectly goes off what you just talked about. While still working at Seagate Federal, they were looking for a more responsible way to they’re very much into doing the responsible things for the Earth.  And I got tasked by my manager to go figure out what was going on in responsible retirement and reclamation around hard drives. It led me to do a year-long research to look at various technologies.

Bill Downer: What I found was multiple DOE labs had developed differing technologies to get the magnets out of hard drives and to effectively get the materials back to a certain state. and we evaluated all those and the DOE and I’ve been on the hill a number of times since while I was doing this project. they started doing a lot of this research in 2010 before it was quite the crisis that it is now. and they have now created these various technologies. They have made them licensable to commercial firms, so we stood up a firm purpose-built to go take some of these DOE technologies and prove them out commercially but in particular with a focus on how to help DoD and the intelligence community responsibly retire the equipment from those sites in a certain manner, and to get the materials into the strategic reserve that has been set up for the rare earth elements. And so a perfect cycle to take both in from terms of chain of custody. These are devices owned by the government and giving back whatever products are produced back to the government for their own use.

Kurt Greening: I love it, solving some of both the economic problems, the data security problems as well as sustainability.

Kurt Greening: Is there anything more that you want to say about the methods that you plan to use or more detail? You talked about how you’re going to recover and then store the rare earth. Anything more you want to say about either of those, Bill?

Bill Downer: Yeah, I would say that we’re not fixated on just doing this with hard drives. DOE has done a great job of research reclaiming rare earth elements from all manners of magnets in everything, whether it’s in EVs or it’s in windmills or whatever. the windmills are a huge issue on how we retire those and what we do with them.  So we’re looking at all manners of technology that have been developed by the US government labs and how to build a commercial capability that allows us to do a full life cycle of anything that has been pot bought and paid for by the government whether it’s the research or it’s the actual devices.

Kurt Greening: Perfect. thank you for that answer, Bill. Dick    , I understand you worked at the NSA. You were explaining a little bit of this to me earlier. You mentioned it’s the center for storage device sanitization try to get it right I think now it is under what is called the cyber direct directorate can you talk about any of the standards that NSA has developed or maybe working in concert with some of the NIS standards that protect the DoD and also the DIB or  the defense industrial base when it comes to cyber security risk associated with end of life electronics,

00:25:00   

Richard Schaeffer: So again I’m going to use this term life cycle.  If there is a national security system, so a system that processes classified information, then NSA as in its national manager role sets the standards for destruction. So they set the standard for we’ll use Bill’s example of a hard drive. they’ll tell you, you’ve got a  big, you’ve got to try to remove all of the information that’s on the drive. So, you want to degauss it, you want to make  sure that you’ve done as much as you can do. we talk about writing ones and zeros to the platters. that’s a method. but ultimately you’re gonna grind that thing up. you’re going to turn it into essentially a handful of metallic particles and what NSA will say this is how small those particles have to be.  And so they will set the specification for the machine. Think of it as a grinder. so you’re going to throw it into a grinder, and it’s gonna, a bunch of particles are going to come out the bottom and they’re going to be of a size that NSA will say we have a high degree of assurance that no one could recover information from that device when processed through this cycle this writing of ones and zeros or degassing or grinding and ultimately you’re left with something and NSA will do that  for not just hard drives, but they’ll do it for micro electronic devices, solid state drives, and so forth.

Richard Schaeffer: The challenge is so people in the national security community are aware of those specifications because they’re part of that community, but they also form a corpus of best practices that private sector that has sensitive information on their devices should also be following.  So it’s in this life cycle and this happens quite often, it’ll be the Department of Defense or the intelligence community will create a process because of classified information data objects that are very sensitive and ultimately as the private sector looks at that and says it’s not classified in a national security sense but it’s damn important to me. it is the lifeblood of my company and therefore I’m going to treat that information, those data objects in the same way that the US government might treat their classified information. I’m going to be assured that in the end, nobody can recover that information and steal my intellectual property or whatever.

Richard Schaeffer: So gradually things leak from the defense and intelligence space into the private sector become common usage and the nation is better off from it. We don’t do enough, and this is where I get back to nobody being in charge.  Nobody’s really pulling all the pieces together and saying, Yes, we have national security information, but we also have very industrial information. We have very sensitive health care information and we’ll all have to ensure that we’re treating all of these categories of data appropriately.

00:30:00

Richard Schaeffer: And ultimately scale means everything. if Bill’s company is only processing a thousand hard drives a week,  that’s one price point. But if somebody said, Bill, I need you to process a 100,000 a week.” He’s going to get a whole lot more efficient in the way that he does that.  And then the output which is sort of these rare earth elements that are ultimately recovered from these processes, become more plentiful. They become less expensive.

Richard Schaeffer: And by the way, there’s more of them that can go back into I don’t care whether they come out of the private sector or whether they come out of the national security sector. If I can feed them back into that national need for rare earth elements, I’m minimizing then the amount of material that we’ve got to import from other countries. and so there’s this term life cycle takes on a much more significant meaning because it’s Bill and rare earth elements is sort of sitting almost at the end of that life cycle.

Richard Schaeffer: something has to be done probably to process that material to get it back into the national stockpile. But that becomes a very critical part of the supply chain not just for government, but for private sector as well. And I use private sector to mean everything that’s not US government.

Kurt Greening: Thank you for that Dick. We do have some educated customers that come to us here at Securis, and they will ask us about the National Industrial Security Program operating manual. many times they will quote, 32 CFR part 117. some of my older customers will still ask about DoD 5220, which is pretty outdated. but you talk about what’s spilling into the private sector.

Kurt Greening: You know, traditionally what I hear from civilian agencies is that they are following NIST publication 800-88. but I’m also hearing that from banks and hospitals in the private sector.  So the good news is the work that the taxpayer is funding around cyber security that is flowing out into organizations that are protecting citizen data our financial systems energy sector etc.

Richard Schaeffer:  Let me just give you one additional piece of good news or what should be good news. NSA creates specifications, NIST creates specifications. and I’ll say people inside the system understand those things but you don’t understand the specifications for the tires that are on your car right?  You just go to Goodyear, and you buy a set of tires, or you go to Firestone or whoever you go to. you go there and you buy a set of tires for your car, that’s the endpoint.  That’s where we’ve got to get this to where people don’t need to know the specifications. They don’t need to know sort of, is the grinding machine, does it meet this spec?

Richard Schaeffer: What they need to know is that for the national good, they’re taking their outdated, no longer usable microelectronic devices and they’re putting them into a process that ultimately ends up doing good for the nation. And again I’m looking for this grand pooba, who’s going to be the sage on the mountain, but we don’t talk about it in that way. we talk about it in terms of the geek speak for those organizations that are mandated to do it, most of whom do.

Richard Schaeffer: But if we made it easy, if we made it economically feasible if we made it so that they felt like they were contributing to the national good in some way, and sort of other hats that I wear, I meet with investors who don’t have a clue about national security. They don’t have a clue about complex IT systems.  But what they say is, “I’ve made a lot of money in my life. It’s real estate or it’s whatever they’ve done.” and I want to contribute to the national good. and so that’s the context, I think, that when we can get companies to understand that they’re contributing to the national good simply by not throwing this stuff into a landfill somewhere.

00:35:00

Richard Schaeffer: and it’s it beyond recycling. it’s actually a contribution to the national and then I think we begin to build scale. We begin to bring prices down. We begin to fill that national supply need for rare earth elements. we do the things that we need to be to become a much more self- sustaining and truly a much more self- sustaining because we’ve got the life cycle part down. Then companies Securus become a critical link in that chain as well because you’re the outward-looking face to the private sector.

Kurt Greening: Yeah, perfect.

Kurt Greening: And I probably should have mentioned the good work that folks over at NSA have done on the evaluated products list for shredders and degausers. So that’s certainly helpful. But maybe I wanted to switch the conversation a little bit. I’ve got a lot of friends who are chief information security officers, sisos, and the defense industrial base.

Kurt Greening: And I’ve had conversations with them and some of the hot cyber security topics today are software supply chain cloud security that’s all the new rage and what you have these folks talking about but do you think that the defense industrial base and the government should be paying as much attention to end-of-life electronics as some of these new hot cyber security issues?

Richard Schaeffer: Without a doubt. I believe that there are devices sitting in warehouses that have highly sensitive industrial secrets on them. I’ll use the term secrets. Maybe that’s a small S but intellectual property I think. So I’m going to give you another example, and it can be edited away but my wife has a friend who does estate sales and so occasionally he’ll need help setting up somebody’s parent dies or grandparent or some friend or some there’s nobody left and they hire a company to come in and sort of run an auction or run a sale and get rid of all the stuff. So, she did this a couple of weeks ago and she comes home and she says, “You’re not going to believe this”. This guy who died had a box and I think there were 27 hard drives in a cardboard box. and the guy who runs the estate sale said we’ll sell them for $2 a piece or $5 a piece or whatever it was. and I said, go tell Duke, don’t you dare. I said, ‘You have no idea what is on those hard drives. What if you’re selling somebody’s pornographic library? worse, what if it’s child pornography on there?

Richard Schaeffer: What if there is? You have no idea. What they ought to do is take them to a place that’s going to grind them up and shred them and get rid of them. And I think that situation occurs, all over the country probably a thousand times a day. It’s probably not pornographic libraries, but it’s probably personal banking information. social security numbers, all sorts of personal information and it’s so easy for somebody to go to a sale. I mean, these estate sales are all over, go to a high netw worth area, go to an estate sale and buy a used computer and see what’s on it.  

00:40:00

Kurt Greening: Yeah Dick you’re right. So I-Sigma did a study and bought electronics off of eBay. More than 40% of them had either corporate or personal personally identifiable information on them. Rapid 7, who’s a cyber security company, they bought infusion pumps off of eBay that were in hospitals and they were able to get the wireless configuration data from seven hospital chains. So, you’re right, those things are a risk. So, I’m going to ask one last question and then maybe we’ll call it a wrap. this has been awesome. Thank you, Dick, and thank you, Bill.

Kurt Greening: So, Bill, not too long ago, maybe, I think in the last two years, it was probably going back to your time at Seagate, you started to approach Securis to, help what now became, your company, and I’ll post the link in the show notes to help the DoD solve this issue that is at the intersection of supply chain, cyber security, and sustainability. what made you decide to partner with Securus on this?

Bill Downer: So just like I did a due diligence on all the various reclamation technologies, I did a similar thing on information technology asset disposal companies and the name of Securis came up multiple times for the quality of the recordkeeping, the responsible method in which they did the work, and the fact that you were doing work for both the federal and state and local governments.  And I became such a fan, and this predates you, Kurt, that I actually hosted multiple tours, I’m not sure if you’re part of these, but we hosted the industrial policy people for supply chain from the Pentagon. We hosted Defense Logistics Agency who’s responsible for the strategic reserve.

Bill Downer: we hosted the Department of Energy industrial or advanced manufacturing group and it’s interesting to me every time I was at a meeting with various government executives often that were set up by Dick what we found was that many of the people that set the policies around the supply chain around defense logistics had never visited an asset disposal facility. and so I brought them out and typically they’d say, ” I’ll give you 45 minutes and I’m out.” Couple of times, Dan and I had to run them off the facility at the end of the day because they didn’t leave because they had so many questions and here they are setting policy around responsible destruction and reclamation and yet have not had an opportunity to tour such facility.

Bill Downer: Given your proximity to the beltway, your company, it is ripe for bringing people out from various headquarter locations in the federal government to see a very responsible company do what you do. and how you do worry about the full supply chain, and keeping the proper records and keeping up to speed and being a leader in the certifications required in that industry. You are always ahead of the game. And so it was easy for me to become an advocate and host those tours. And y’all did a great job of hosting the various government representatives so they could learn more about how their policies were affecting industry.

Kurt Greening: Thank you, Really appreciate having you on, your partnership, what you’re doing for sustainability, what you’re doing to protect our national security interest, and looking forward to more great work on solving these problems.

Richard Schaeffer: Yeah. Thank you,  And I just leave you with you should be unapologetic and ruthless in demanding of your government, and my government, the  best process, the best approaches, you’re you live it day to day. You know what works. You know what doesn’t work. You know what what works well, what needs to be fixed.And you should be demanding of the government solutions that actually work for the masses, not just for the people as Bill pointed out, people that set the policy who’ve never actually done the work to understand what do those policies actually mean. So, be unapologetic and be ruthless.

Kurt Greening: With that, we’ll end.

Kurt Greening: Thank you for that advice, Dick.

Richard Schaeffer: Thank you.

How to Lower the Risk Associated with the Disposal of Organizational IT Assets

The transcript and the full video of the conversation between Kurt Greening, EVP at Securis, Greg Crabb, and Nick Crabb of TEN EIGHT Cyber appear below

Contact Information

Gregory Crabb:  https://www.linkedin.com/in/gregorycrabb/

Nicholas Crab: https://www.linkedin.com/in/nicholas-crabb/

Kurt Greening:  https:https://www.linkedin.com/in/kurtgreening

Website Information

Securis:   https://securis.com/

Ten Eight Cyber:   https://teneightcyber.com/ 

Assessment mentioned in the video:  https://assessments.teneightcyber.com/

 

Kurt Greening, Securis: 

For those of you who don’t know me, my name is Kurt Greening, and I am an EVP with Securis. Securis is an industry leader in IT asset Disposal. Today, we are here to discuss how to lower the risk associated with the disposal of organizational I.T. assets. Gregg, before we get into that topic, can you briefly introduce yourself and tell me who TEN EIGHT Cyber is?

Greg Crabb, TEN EIGHT Cyber: 

Absolutely. Thank you so much, Kurt. My colleague Nick and I work together here at TEN EIGHT cyber. We’re a cybersecurity advisory firm focused on empowering organizations to build resilience against cyber threats. And we provide a variety of different offerings. Today we’ll talk about what we’re doing in order to be able to support organizations, in conducting assessments against, proper I.T asset management practices. And, we provide a variety of other advisory services, anything from incident response and management to third-party risk management. So thanks for having us, Kurt. Really excited to collaborate, and Nick and I are really excited to support you.

Kurt Greening, Securis: 

Yeah. Great. Yeah. We’re glad that you’re here. Nick, can you do the same thing? introduce yourself. I understand that over the last few months, you’ve been doing a lot of research, around this space. Maybe you can introduce yourself, but then also share some of the things that you found, in terms of vulnerabilities, breaches, fines, really in the space of  IT Asset management.

Nick Crabb, TEN EIGHT Cyber: 

Yeah, totally. So my name is Nick Crabb. I currently work as a cyber security engineer for TEN EIGHT Cyber, and I create presentations, policies, assessments, and daily threat reports. every day, talking about anything from ransomware to, end-of-life systems and kind of nation-state threat actors. And today I kind of want to go over some end-of-life systems that pose risks to organizations. And I’ve done a little bit of, research on that. And there are two main breaches I kind of want to go over. The first one is the Filefax HIPAA violation. And this is a great example because even after shutting down, Filefax was fined $100,000 for improperly handling 2150 patient records. And they were later sold at a recycling center. And, these threat actors were able to sell that information. And obviously, they had to go to court and HIPAA was able to, fine them for not properly, disposing their assets.

The next one is Morgan Stanley and they were  fined $60 million by the U.S. Treasury Department for failure on IT Asset destruction. And this includes,   proper oversight and decommissioning, two data centers, failure to track customer data and inadequate vendor management. Now, more than ever, I think, companies need to focus on IT Asset Destruction And from when I was researching it from kind of knowing nothing to knowing a lot, now I think, I took a new company perspective.

It’s hard to think about IT Asset destruction when you’re a new company, when you have a small inventory and new equipment. But as the years go on and the equipment that you use gets older and the inventory grows week after week, without secure IT Asset destruction policies and kind of procedures go out the window. And I think, organizations can’t kind of live with the regulatory fines, legal liability and the devastating breaches that the two, kind of examples I went over.

Kurt Greening, Securis: 

Yeah, I agree, I mean, it’s the big companies that, tend to have the lawsuits, tend to have the fines. And obviously that creates the biggest risk of, you know, breaches, employee or customer, data. So that’s a big deal. And, yeah, Nick you didn’t mention that you produced a cyber threat report on a daily basis. I’ve seen that. I will, post in the show notes. You’re on LinkedIn for those who want to follow you, you want to make sure that, there avoiding vulnerabilities and risk in multiple areas. So, thanks for that. Greg, I’m going to throw you a question here. So, maybe people don’t know you’re a former CISO. You served, in the federal government, both in law enforcement and later, as a CISO of the U.S. Postal Service. But one of the things that I’m curious about as I talk to, other CISO’s, I’m just curious why other CISO’s might not be doing more to lower risk in this particular area.

Greg Crabb, TEN EIGHT Cyber: 

Yeah, really good question, Kurt. And I’m going to kind of look at it from a couple of different lenses. The first is competing priorities. CISOs are focusing on so many different things, whether it’s ransomware prevention, supply chain attacks, all of the NIST CSF controls or CIS controls. There’s a lot there, and quite frankly, IT asset disposal gets overlooked. And there are other reasons as well. Because they’ve got so many different things going on, they might delegate that to the IT  help desk function for the organization. You know, you  distribute the technology, you know, you also get rid of the technology. You know, I don’t want to worry about it. You guys do it. And that also speaks to some of those business processes in that  I.T. technology management asset, management track and that many organizations don’t have a comprehensive IT asset inventory, so it makes it difficult for them to track, even if they have assets that need to be decommissioned, right. And that kind of speaks to that cross-departmental responsibility confusion that I, that I alluded to. 

So, you know, and I think, we need to kind of re-examine, I think we’re getting to the point where, from a NIST, and policy perspective, we need to take a look at this whole concept of encrypted hard drives and reexamine that in the face of what threat actors are doing right now is buying, outdated, hard drives and decommissioned hard drives with the hope that, you know, when, quantum cryptography, is developed and the ability to break that encryption, arises. and so we need to look at those policies and think, you know, BitLocker is great right now, but BitLocker, in the face of, the quantum threat will not be sufficient. And, you know, is that five years from now is that ten years from now, we don’t know. But I don’t want any of the information that’s on my drives exposed ten years from now because we didn’t take care of our assets properly today.

Kurt Greening, Securis: 

Yeah. I definitely agree with the competing priorities. And, you know, I don’t think we’re on this call to beat up CISO’s because they get beat up enough and, you know, just, I think just watching Nick’s threat report every day, can make it difficult to get sleep at night. So, thanks for that. So, Nick, in  the vein of trying not to be beat up organizations, you know, we talked about some of the risks and where organizations have made mistakes, but there’s probably more people that are doing things right than making mistakes. Can you provide a few examples? in terms of the research that you’ve done or companies that you’ve talked to and things that you’re seeing them do right in terms of I.T. Asset Management?

Nick Crabb, TEN EIGHT Cyber: 

Yeah, totally. So these are more kind of, general examples, companies that are getting their IT Asset destruction process correct, are typically the ones not in the news. And that makes a lot of sense. So, to ensure secure and compliant IT Asset destruction I think it’s important to align with NIST 800-88. From my journey learning about NIST 800-88 was significant, and I’ve learned a lot through that. And I think some leading practitioners are Amazon,  financial institutions, and government agencies, and they implement strong asset tracking and secure disposal processes. And I think that’s very important for organizations to secure all their assets after end-of-life. So organizations that maintain a comprehensive inventory and enforce proper destruction protocols not only enhance security but also build customer trust and regulatory compliance.

Kurt Greening, Securis: 

Yeah, I agree, Nick. I haven’t reviewed Amazon’s policies, but I have reviewed Microsoft’s policies. And they’re pretty good in this area. I’ve also worked with some banks that have incredible, I.T. asset management, policies. They have really good oversight of third-party, ITAD vendors. So there are definitely some people out there getting it right, and people that in the industry that we can learn, some best practices from.  Now, Greg, switching gears and going back to you, how does getting I.T. asset management, right, relate to cybersecurity best practices?

Greg Crabb, TEN EIGHT Cyber: 

Several lenses that, Nick kind of, opened us up into, I think I want to expand on and, first and foremost, it’s risk reduction. Right. Improperly disposed of I.T assets are targets for cybercriminals, and, a CISO’s role is to reduce risk for the organization. So, making sure that, a proper I.T. asset management practices are in place are critical. The next is really looking at this from a zero-trust perspective. When you look at both the data pillar, and the device pillar, they converge at  I.T. asset destruction. Right. When you look at, you know, the, termination of those life cycles, are at I.T. asset destruction. And so, to have a proper zero trust, organization, based on those principles, I think you really need to look at, I.T. asset destruction as an endpoint for those, and then, obviously, the regulatory compliance aspects Nick’s talked about HIPAA. Organizations that face GDPR, and the FFIC regulations, obviously with what Nick reported on relative to Morgan Stanley, those are excellent examples of, kind of the regulatory, compliance requirements that exist in this area. So, you know, those are kind of the lenses that I’m thinking about relative to some of the cybersecurity best practices.

Kurt Greening, Securis: 

Okay. Yeah. Great. that’s helpful. Greg, I got another question for you. So, I talked to a couple of lawyers about this area and some other risk management professionals, and they referred to a, I guess, a term of having defensible IT asset management policies. Can you help our audience understand what they might be referring to?

Greg Crabb, TEN EIGHT Cyber: 

Yeah. So, I think any regulated agency or, maybe that’s the DOD supply chain for CMMC perspective or the financial services from a FFIEC perspective, defensibility, documentation, compliance and verification, those kinds of terms rings through. So, do you have a well defined asset management lifecycle, including,  asset destruction policies and procedures? Are you complying with those policies and procedures? And do you have a means to verify that the performance of those controls are done in a complete manner? And so, I think it goes back to, like I say, documentation compliance and verification.

 Kurt Greening, Securis: 

And Greg, I would guess that proper oversight of third-party vendors would be included. In those three things.

Greg Crabb, TEN EIGHT Cyber:

Absolutely. You know, just, I guess I generally alluded to it when I mentioned CMMC, that’s a that’s a whole supply chain related, body of compliance requirements. And so, by all means, having a proper, third party, visibility and assurance is necessary. When you think about the complexities of the supply chain and, any technology service provider or financial institution or, or government contracting context,

Kurt Greening, Securis: 

Perfect, great answer, I think. I think I have a better understanding now. Nick, So I’d love to hear from you again. I understand that you and your team have actually developed an offering that’s going to help busy CISO’s lower this risk in the area in particular. I think what got me excited is I talked to a number CISO’s and they said similar things are busy. you know, one said, hey, you know, the most amount of time my team has spent on it is to set up a policy and then, you know, expect that the team follows it. But, you know, this particular individual did acknowledge, hey, if there was something else I could do, like, maybe hire a third party to help me with this. He seemed really open to it. So, could you describe the offering that you developed or the assessment that you developed and then maybe let people know how they could get started with ten eight cyber if, you know, they think, hey, I probably need to improve my I.T. asset management or my I.T. disposition practices, but I maybe I don’t know my level of risk, or I don’t really know what things I should be improving on first. You know, how could they approach your team?

Nick Crabb, TEN EIGHT Cyber: 

Yeah, totally. So I just want to preface first. They’re definitely cost-effective. TEN EIGHT is currently offering a few different I.T. asset disposal assessments with various tiers aligning with large and small organizations. The introduction assessment is our first one. It’s very basic, with 12 questions allowing the company to answer them on their own, and then a consultation will be scheduled with TEN EIGHT to go over and kind of go in and talk about their, depth and the specific gaps they have in the company’s answers. We then create in a report an analysis on how the company can best improve based on that. We then have larger assessments that allow TEN EIGHT to go into the organization, which we can be on-site or on a call, and we can talk about how an organization can create a comprehensive I.T. asset destruction process based on the company’s personnel, policies, and procedures. And this is all aligning with NIST 800-88. The easiest way to get started with us is to visit our website to set up an introduction meeting with TEN EIGHT and we get to start with the company right away and kind of help them develop a strong I.T. asset destruction process that is safe and secure for not only them, but their clients as well.

Kurt Greening, Securis:

Sounds like an easy choice. And and to get to TEN EIGHT cyber, I believe it’s, is it www.teneightcyber.com or can you help me with your, I will post it in the show notes. 

Greg Crabb, TEN EIGHT Cyber:

It’s, www.teneightcyber.com

Kurt Greening, Securis: 

Thanks, Nick. Thanks, Greg. I think I learned something. I think that there’s an opportunity here, with a relatively small, financial and time investment that organizations can lower their, their risk in this area. And and I think CISOs can have one less area to stress about. So really appreciate you guys, and, thanks so much.

Greg Crabb, TEN EIGHT Cyber:

Thank you, Kurt. Really grateful for the opportunity. and collaborating with Securis.

Nick Crabb, TEN EIGHT Cyber: 

Yeah. Thank you I appreciate it.

NIST 800-88 Infographic

Organizations across various sectors use NIST Special Publication 800-88 (SP 800-88) for media sanitization guidelines due to its comprehensive approach to securely erasing sensitive data and preventing unauthorized access. NIST SP 800-88 was originally developed for U.S. federal agencies under the Federal Information Security Management Act (FISMA) but is now used by healthcare organizations, financial institutions, educational institutions, private sector companies, and international organizations. By adopting NIST SP 800-88 guidelines, these organizations enhance their data security posture while ensuring compliance with both national and international standards. Below is a handy infographic detailing the guidelines for the three categories of NIST Media sanitization: Clear, Purge, and Destroy.   To learn more about the NIST 800-88 standard, please read our blog about NIST 800-88 here.

NIST 800-88 Infographic

Using Unified Endpoint Management Tools to Maximize IT Asset Value and Increase Security

 Using UEM Automation to Prepare Computers for ITAD

IT Asset lifecycle management, especially at end-of-life, can be complex and costly without the right tools. Unified Endpoint Management (UEM) systems can be invaluable in this process, helping organizations simplify asset preparation for secure IT recycling for end-of-life assets while providing valuable help with maintaining data security and optimizing environmental and operational goals throughout the asset’s life. 

As IT asset disposition (ITAD) professionals, we have learned that clients who employ UEM systems are more prepared for efficient and cost-effective disposition processes.  This blog discusses how UEM ITAD integration can simplify the journey from active use to the responsible retirement of end-of-life IT assets. 

UEM for ITADWhat is Unified Endpoint Management (UEM)?

UEM is a comprehensive platform that allows IT teams to centrally manage and secure all endpoint devices—laptops, desktops, mobile devices, IoT devices, and more. It goes beyond Mobile Device Management (MDM) by incorporating advanced features like device performance tracking, compliance management, and integration with security tools. UEM tools are typically integrated with security tools such as Managed Detection and Response (MDR) and Endpoint Detection and Response (EDR).

Common UEM tools in use at our customers include Intune, JAMF, IBM MaaS360, VMware Airwatch, Citrix, Connectwise, BigFix, Google Device Manager, Ivanti Nuerons, Cisco Meraki Systems Manager, and Absolute Software.

UEM  increases security and improves the management of computers throughout the IT asset lifecycle. Its capabilities make it a perfect ally in preparing IT assets for safe and efficient disposition.

How UEM Can Prepare IT Assets for Recycling with an IT Asset Disposition Vendor

  1. Comprehensive Asset Inventory: UEM tools provide real-time visibility into all endpoints within your organization. This centralized inventory makes tracking devices’ location, status, and configuration easy, ensuring no asset is overlooked during ITAD planning.  This inventory may be integrated with IT Asset Management (ITAM) databases like ServiceNow.
  2. Secure Data Erasure: UEM allows IT administrators to perform initial wipes before disposing of devices. This adds a layer of security to your IT recycling and complements Securis’ certified data destruction processes. As a NAID AAA-certified company, Securis ensures your devices are completely sanitized, including hard drive shredding or data purging, that meets or exceeds industry, state, and federal compliance standards. 
  3. IT Asset Lifecycle Management: UEM tracks device age, performance, and usage patterns, helping IT teams determine when an asset should be retired or recycled. Devices flagged for end-of-life can be prioritized for UEM-based preparation and secure IT asset recycling.
  4. Policy Enforcement: Features like BIOS locks, encryption enforcement, and Trusted Platform Module (TPM) settings protect your devices from breaches before they reach an ITAD vendor.
  5. Compliance Assurance: UEM platforms facilitate adherence to data protection regulations, such as GDPR or HIPAA, by standardizing data handling and ensuring devices meet compliance requirements throughout their lifecycle.

Issues with ITAD when BIOS locks are not removed from IT Assets

BIOS Lock

A BIOS lock is a security feature restricting unauthorized access to a computer’s Basic Input/Output System (BIOS) settings. The BIOS is responsible for initializing hardware components during the boot-up process, and setting a password can prevent unauthorized users from tampering with hardware configurations or altering system settings. UEM can automate the removal of BIOS locks and resetting devices, ensuring that customer data is removed and recycling or reuse happens quickly. However, BIOS locks can also slow down the ITAD process in several ways:

  1. Access Restriction: If a device is BIOS-locked and the password is unknown, it can prevent access to the system. This restriction can complicate the data wiping process, which is essential for ensuring that no sensitive data remains on devices before recycling, re-use, or resale.
  2. Hardware Configuration: A locked BIOS might prevent changes to the boot order or other hardware configurations necessary for running data erasure software from external media. This limitation can hinder the ability to erase data from storage drives.
  3. Disposal Challenges: For organizations disposing of large numbers of devices, managing BIOS locks can be resource-intensive. It may require additional time and effort to unlock devices or ensure they are disposed of securely without compromising data security.

To mitigate these issues, IT departments should use their UEM  software to reset the device, remove it from management, and wipe corporate data before the disposition process begins.  If this step is not performed and the asset has a bios lock, the asset will become stuck in limbo and unable to be sanitized to NIST 800-88 standards by the ITAD firm.

The Benefits of Removing BIOS Locks Before Initiating ITAD Service

Reasons to make sure that you remove BIOS locks before sending assets to a certified ITAD vendor include: 

  1. Frees Up Software Licenses: Removing corporate data and unregistering devices from management through UEM releases software licenses, making them available on newer devices.
  2. Enhanced Security: By wiping devices before sending them to an ITAD provider, UEM reduces the risk of breaches. Companies should choose a NAID AAA ITAD provider that will also sanitize the data, but an initial software sanitization is easy when automated and provides an extra layer of security for protecting data during storage or transport.
  3. Supports Environmental Goals Properly prepared devices have greater reuse or donation potential because value is reduced over time.  This process supports sustainability efforts and reduces e-waste.
  4. Speeds Up ITAD Processing: Devices reset and removed from UEM are ready for immediate processing by your ITAD vendor, saving time and ensuring quicker asset turnaround.

Your Next Steps in ITAD Success

By integrating UEM into your IT asset management strategy, your organization can unlock more value from its devices while ensuring data security and regulatory compliance. At Securis, we’re here to partner with you, offering certified ITAD services that complement your use of UEM. Together, we can streamline the final stage of your IT lifecycle and positively impact the environment.

Don’t let outdated devices slow you down.  Securis can make sure your IT Asset disposition projects are successful and efficient. Contact Securis today for a consultation on how UEM and certified ITAD services can benefit your business.

Secure Data Destruction and Responsible Electronics Recycling: Protecting Data While Helping Others

The Growing E-Waste Problem: A Call for Responsible IT Recycling

E-waste is dangerous for the environmentIn a fast-paced digital environment, businesses must constantly upgrade their technology to remain competitive. Millions of electronic devices are discarded or replaced yearly, creating an escalating e-waste recycling dilemma. Many of these devices still function perfectly but have become obsolete for corporate use. At the same time, there is a significant demand for technology in schools, non-profits, and developing communities. The challenge is ensuring that data security is not compromised while responsibly recycling these electronics. The solution lies in a robust process combining data security, electronic recycling, and environmental responsibility. Secure data destruction and IT recycling play a critical role in this effort, ensuring that sensitive information is completely erased without the complete physical destruction of hard drives. This ultimately benefits the schools or non-profits that receive the donated electronic assets and keeps e-waste out of the environment. 

A Comprehensive Solution for Secure Data Erasure and Electronics Donation

Ensure all device data is fully sanitized and/or destroyed before donating or sellingUltra-secure IT recycling services, such as those offered by Securis, provide businesses an efficient and responsible way to recycle computers and donate electronics. Securis ensures that companies can donate their old equipment without exposing sensitive corporate data to risk by utilizing secure data destruction techniques. Companies can confidently recycle their electronics using advanced data erasure software and certified destruction processes, allowing them to donate these unneeded IT assets with the assurance that their data has been completely and securely destroyed before donation. 

 

The Process of Secure Data Erasure and Electronics Recycling 

  1. Securis mobile ServicesCollection and Inventory
    Securis starts by collecting and inventorying the company’s outdated devices. Every item is carefully cataloged to maintain a complete chain of custody.
  2. Data Erasure and Destruction
    The data destruction process can occur onsite using our mobile services or offsite at the secure Securis facilities. Using advanced software, Securis completely overwrites all data on the devices, ensuring no recoverable data remains. This secure data erasure is a far more secure solution than simple file deletion or re-formatting.
  3. Verification and Certification
    After the data is securely erased, each device is verified to confirm that no data remains. Securis then provides a certificate of data destruction for each device, which can be used to prove compliance with industry regulations and offer peace of mind.
  4. Refurbishment
    Once the devices are completely wiped clean, they are refurbished if necessary. This may involve cleaning, minor repairs, or software updates to ensure the devices are in good working condition for their next user.
  5. Donation or E-Waste Recycling
    Finally, the refurbished electronics are ready to donate to schools, non-profits, or other needy organizations. If the devices are beyond repair, they are responsibly recycled, ensuring they do not contribute to harmful environmental impacts. Our R2V3 certification ensures environmentally responsible electronics recycling practices.  

Meeting Global Standards for Secure Data Destruction

hard drive data destructionSecuris’ data erasure processes meet or exceed industry standards such as NIST 800-88 and the U.S. Department of Defense’s DoD 5220.22-M. We also comply with many other specific industry standards for data protection, as detailed on this web page.  Our mobile services and facilities are NAID AAA certified to ensure the highest data security standards. 

Benefits of Secure Data Destruction and IT Recycling for Companies

Partnering with Securis for IT recycling and secure data destruction offers numerous advantages for businesses:

  • Enhanced Data Security: Companies can rest assured that their sensitive data will not be exposed to unauthorized individuals, minimizing the risk of data breaches and the associated financial and reputational damage.
  • Regulatory Compliance: Securis’ certified data erasure process helps companies meet strict industry regulations, providing comprehensive documentation for data protection compliance.
  • Corporate Social Responsibility (CSR): Donating refurbished electronics supports communities in need and enhances a company’s CSR efforts, improving its public image and potentially providing tax benefits. 
  • Environmental Impact: Companies that donate working devices reduce e-waste and contribute to environmental sustainability. Devices beyond repair are responsibly recycled in compliance with e-waste recycling standards.
  • Cost-Effective: The cost of securely erasing data and donating or recycling electronics is significantly less than the risks associated with data breaches or the storage costs of outdated devices.

Real-World Impact: Bridging the Digital Divide Through Donations

Bridging the Digital Divide Through Donations The benefits of computer and device donation extend beyond the donating company, making a significant impact on communities in need:

  • Bridging the Digital Divide: Many schools and non-profits operate with limited resources, making it difficult to provide up-to-date technology. Donations of refurbished electronics help close this gap.
  • Supporting STEM Education: Donated devices provide students with hands-on experience, support STEM education, and prepare them for careers in technology and engineering.
  • Empowering Entrepreneurs: Some donated devices are given to small businesses or aspiring entrepreneurs, helping them get the technology they need to grow their ventures.
  • Global Impact: Donated recycled electronics can also be shipped to developing countries, where they improve access to technology, education, and healthcare, making a lasting difference in underserved communities.

Choosing the Right Partner for Data Security and IT Recycling

When selecting a partner for secure data destruction and electronics recycling, choosing a reputable provider like Securis is essential. With certifications such as NAID AAA and R2v3, Securis ensures that your electronic assets are handled securely and responsibly. Securis also offers comprehensive logistics solutions to simplify the process, even for large enterprises with multiple locations.

The Future of E-Waste Recycling and Electronics Donation

reduce e-waste and support the environmentAs technology evolves, the need for responsible e-waste recycling and secure IT recycling will only grow. Increased awareness of data protection and electronic recycling challenges will likely encourage more companies to adopt IT Asset donation programs. This shift towards a circular economy, where devices have multiple lifecycles, will help reduce e-waste and support environmental and social causes. 

Conclusion: Protecting Data and the Planet with Secure Electronics Recycling

In an increasingly digital world, data security and environmental responsibility are critical priorities. With services like secure data destruction and IT recycling, companies can protect their sensitive data while contributing to a more sustainable and equitable future. By partnering with trusted providers for e-waste recycling, businesses safeguard their information and help bridge the digital divide, support education, and reduce environmental impact. It’s a win-win for both business and society.

As we move toward a more sustainable digital future, the importance of secure IT recycling and data protection will continue to grow. Companies that prioritize responsible IT Asset disposal today will be better positioned to meet the challenges of tomorrow.