ITAD

/ITAD

Blog topics relating to IT Asset Disposition.

Data Destruction vs Data Erasure: To Shred or Not to Shred

Security doesn’t end when your hardware does. As you prepare to decommission equipment, you need to plan for your data security. Do you destroy the latent data or erase it? You must continue security best practices beyond the lifecycle use of your physical equipment. And the most critical part of that is deciding what to do with your hard drives and storage devices before final decommissioning. The question being: to shred or not to shred? What Are Your Restrictions? If your company is under compliance requirements to destroy all your hard drives, then, at this point, your answer is pretty straightforward. Erasure is out of the question, so punching or shredding become the only options for you to remain within compliance. However, if destruction-only compliance is not a factor—and you [...]

The Data Security Benefits of On-Site Data Destruction

There is no “out of sight; out of mind” when it comes to latent data. In the age of breaches, companies can’t take risks when it comes to data security and data destruction. Dispose of your hardware without properly sanitizing the drives first, and you leave your company open, not only to data breaches, but also to heavy fines and legal repercussions. It’s likely that you don’t have the in-house equipment or expertise to conduct proper sanitization yourself, so you will need to outsource these tasks to an external vendor. And if your compliance plans require on-site data destruction, then that vendor will need to come to you. Get Secure Data Destruction to Come to You There’s no need to move equipment off-site. You can bring data security directly to [...]

ISO Certifications: Standing Out in Safety and Efficiency

Certifications delivered by the International Organization for Standardization (ISO) are a system of world-wide quality management standards focused on global, industrial, and commercial best practices for each industry. These quality certifications serve as a way to ensure that organizations across the world follow the same outlines and processes to maintain quality and ensure employee safety. Occupational Health and Safety Assessment Series (OHSAS) similarly establishes standards for workplace safety. By adopting and staying in compliance with these global standards, organizations demonstrate their dedication to maintaining effective operating procedures and meeting customer expectations. So what does it take to earn these certifications? Below, we’ll take a deeper look at the process and what difference these certifications make to you when you work with these certified organizations. ISO Certification Process CentricsIT maintains three [...]

Review of the 2018 Gartner Market Guide for ITAD

When it comes to IT Asset Disposition (ITAD), Gartner finds that IT leaders struggle most with data security and proper environmental recycling. The rapid growth of IoT and connected smart devices especially has forced users and vendors alike to rethink their traditional ITAD processes and security protocols. In response to these challenges, Gartner created the 2018 Market Guide for ITAD as a benchmark for current ITAD strategies and protocols. Compare your ITAD methodologies to Gartner’s recommendations to ensure that you have the best processes and vendors in place for your specific environments. The Current ITAD Landscape The ITAD industry has seen a gradual shift in product and global compliance requirements. Because of the dramatic increase of IoT, mobile, and connected smart devices, there is exponentially more critical data to sanitize [...]

Our Disruptive Approach to IT Lifecycle Management

The logistics necessary to sustain your enterprise IT lifecycle management processes are considerable. To continue production and keep your infrastructure optimized, you have to choose between one of two difficult options: Muscle through and coordinate IT operations yourself with your already-lean IT team. Outsource your IT operations to a large-scale management corporation. But which option should you choose? Working with What You’ve Got In-house management can be costly, stressful, and inefficient, especially if you already have a lean IT team. If it’s all you can do to keep your current IT infrastructure “well-oiled,” it becomes impractical to think about digital transformations or advances towards more complex cloud initiatives. Simply put, if your (very expensive W2) L5 engineers are stuck doing laptop battery troubleshooting, then they don’t have the time to [...]

2018 Gartner ITAD Market Guide: CentricsIT Among Profiled Vendors

Leading IT research firm Gartner has released its official market guide for IT Asset Disposition companies (ITAD) and profiled CentricsIT as a representative vendor. Gartner releases report titled, “Market Guide for IT Asset Disposition,” authored by analysts Rob Schafer and Christopher Dixon. The report was published on July 26, 2018. You must be a Gartner subscriber to access the full document (Gartner ID: G00355990). CentricsIT has been helping its clients make smarter decisions about their IT delivery for more than a decade. We are well known in the industry for our innovative approach to IT lifecycle management, which prioritizes asset value alongside security and environmental sustainability. When it comes to IT Asset Disposition (ITAD), our goal has always been to help our clients recoup the value of their retired assets [...]

What to Expect When Your Hardware is Approaching EOSL

You conducted extensive research, you did the necessary POC testing, and you judiciously procured server equipment for its proven performance rate and longevity. It has operated well for you, and it continues to do so. The corresponding OEM support is responsive and efficient. But OEM support won’t last forever. Eventually, your OEM will announce EOL on that line of equipment. This will drastically raise maintenance and support rates. Soon after, they’ll announce your hardware is approaching EOSL. EOL vs EOSL To clarify the difference between the two terms: End-of-Life, or EOL, indicates that the hardware has reached the end of its use life according to the manufacturer. The OEM stops marketing, selling, and refurbishing the product line. They will continue to offer maintenance on the existing EOL equipment for a [...]

What It Takes to Earn an R2 Certification

R2’s website touts the slogan, “Quality, Transparency, and Proven Success.” As the leading environmental, worker health, and safety standard for the global electronics refurbishing and recycling industry, R2 is constantly improving and intensifying their standards and requirements for an R2 certification. Such a rigorous, escalating requirement cycle is meant to hold companies accountable and maintain an unadulterated global network of standardized environmental and industry responsibility. As one can imagine, companies who wish to become—and remain—R2 certified have their work cut out for them. Here’s how it’s done. Attaining an R2 Certification As a company who has successfully been through several R2 audits, CentricsIT has a close familiarity with the process of gaining and maintaining an R2 certification, as well as the added benefits of its construct for improved operational and [...]

Pure Play TPM vs. Full Spectrum Life Cycle Management

There are many companies that only do third-party maintenance (TPM). And more than likely, they’ve told you that, because they only offer hardware support, they are intrinsically the most qualified for the job. These “pure play TPM” vendors deem themselves the industry “specialists,” touting that their singular focus produces higher-quality maintenance support solutions than those of vendors who offer multi-tiered services. That claim, however, is wrong. The Truth About Pure Play TPM Support Models The truth? Full spectrum IT management providers can offer multi-tiered services that enhance the quality of and expertise behind their support offerings. Comprehensive IT support is capable of surpassing pure play TPM. As compared to that pure play vendor that only knows one element out of the multitude in your entire IT life cycle management processes, [...]

Moving Your Infrastructure to the Cloud Securely

This post was contributed by CentricsIT Account Executive Michael Sulka. Michael is a data center solutions expert who specializes in third-party maintenance and cost optimization throughout the IT lifecycle. He works from the CentricsIT office in Charlotte, NC (USA). When moving your infrastructure to the cloud, what’s the best way to decommission your storage? The key to keep your data secure during cloud migration is accounting for every state in which your data occurs. This can range from when the data is at-rest, which includes all information’s storage types that exist statically on physical media, or in-transit, whenever the data is going through an input/output process. However, there is another tier that cannot be overlooked when it comes to data security: how you go about decommissioning your storage once those assets have [...]