Uncertainty about warranties gives buyers pause when they consider the secondary market.

Fear of buying equipment out of warranty is costing buyers thousands in potential savings. This fear is completely valid, if misplaced. Though there are items on the secondary market that do not qualify for manufacturer warranty, many items sold on the secondary market are still under manufacturer warranty, and those that aren’t are often under the reseller’s warranty—if you are buying from a reputable reseller.

IT hardware is a huge commitment, and buying under warranty ensures quality and insures against hardware failure. When buying on the secondary market, make sure the seller has systems in place to check the quality of its hardware and passes this surety on to you through a warranty.

Items on the Secondary Market are Often Under Manufacturer’s Warranty

The original manufacturer’s warranty is for a certain number of years (assuming the conditions of the warranty are kept), and many items on the secondary market remain under this warranty. Even when this equipment changes hands, as long as conditions are kept, it does not lose its warranty. This warranty usually lasts between three to five years and follows the manufacturer’s suggested refresh cycle. Many pieces of hardware that make it to the secondary market are less than 5 years old, therefore retaining the manufacturer’s original warranty and eligible for manufacturer support.

Our Warranty

Of course, many items on the secondary market have made it past the manufacturer’s warranty. Despite being veritably ancient in manufacturer years, third-party maintenance providers can provide support to keep these older units going for years longer. All items sold by CentricsIT are under our own warranty and are eligible for third-party maintenance. Our experts inspect each piece of hardware before it is shipped to ensure quality, and our warranties are a testament to the quality of hardware we deliver. If there are any issues, visit our returns and exchanges form.


No one wants to be the next big data breach—especially through your old data storage assets.

Learn how to protect your company's reputation and data during the decommissioning process with this free comprehensive guide to secure ITAD.