How can we protect
With Tear-A-Byte®, our patented comprehensive track-contain-destroy process, we provide unmatched media / data / information security solutions including:
- Secure onsite device containment
- RFID IT Asset real-time tracking and inventory control
- Fully automated audit trail via client portal
- Certified degaussing to Department of Defense requirements
- Data security, management and destruction with ISO 27001 compliance
- Meets the NIST 800-88 Federal Guidelines for media sanitization
What differentiates TechR2
as an industry leader?
TechR2 offers a risk assessment and analysis to make certain that you’re not only compliant with the state & federal laws specific to your industry but that you are also receiving competitive rates and excellent service.
- Immediately following your assessment, TechR2 will provide an analysis and can then customize a media security program that fits the needs of your enterprise.
A plan is created to secure the datacenter and all loose media devices throughout the enterprise.
TechR2 Onsite Training:
- To ensure business partner personnel adhere to strict protocol, company managers and technicians receive training and certification supporting the entire Tear-A-Byte process.
- We are careful to invest necessary support toward our business partners.
Tear-A-Byte for Enterprise is our patented onsite media security process
- Failed and decommissioned data-bearing devices are registered and catalogued through our proprietary console, then contained within the Tear-A-Byte appliance
- Provides data security, management and destruction with ISO 27001 compliance
- Our certified and trained technicians will be dispatched onsite when a specified number of devices have been contained
- For single or multiple locations
Data is captured & secured onsite.
- Data destruction is performed by certified TechR2 technicians.
Compliance checkups are conducted quarterly and according to ISO 27001 best practice policies.
- Sidestepping strict federal regulations regarding the environment can cost an organization tremendous fines, exploitation, loss of reputation, and lost inherent value.
Our RFID IT asset tracking features include:
- Real-time daily tracking and inventory control
- Automated audit trail
- Up to 90% reduction in compliance costs
- Up to 60% reduction in operating costs
- Complete lifecycle management from installation to decommission
More About TechR2:
- TechR2 is experienced with dealing with IBM manufactured devices
- TechR2 is prepared for full compliance with GDPR
- TechR2 acts as an objective 3rd party, trained to assess your security risk and customize a complete solution for you.
- We will provide you with an independent certification of data destruction, backed by a world renowned insurer, Lloyd’s of London.
The Tear-A-Byte® Datacenter appliance, along with our patented track-contain-destroy process securely contains all failed and decommissioned data-bearing devices onsite, integrates RFID IT Asset real-time tracking, inventory control, automated audit trail, meets NIST 800-88 guidelines & more.
Designed to fit permanently inside a designated and secure setting, the Tear-A-Byte® Enterprise provides the best security for controlling data bearing devices once removed from company laptops and desktops.
Our smallest unit, the Tear-A-Byte® Co-Lo is a 19-inch rack mount unit, designed for co-location datacenter sites.
Certification & Compliance Matters.
We are certified in five different international Standards of Management Systems to maximize business security best practices:
- ISO 27001 for a secured environment
- ISO 14001 to minimize environmental impact
- ISO 9001 to maximize customer care
- OHSAS 18001 for control over relevant hazards
- R2 for maintaining global recycling standards
- HIPAA, HITECH, PCI, SOX, and GLBA for additional compliance
The Techr2 process and global ISO certifications fully comply with GDPR mandates, setting us far apart from anyone in the industry.
After four years of debate, the General Data Protection Regulation (GDPR) was ratified by the European Union during April 2016 and has now become law, although member states have a two year period to implement into national law. This means that companies will be expected to be fully compliant by May 25th 2018.
Individuals are increasingly data-savvy and;
- Understand how brands use their data for sales and marketing purposes
- Are aware of their rights with regard to their personal data
- Are concerned about the well-publicized threat of cyber data theft
Companies will be required to “implement appropriate technical and organizational measures” in relation to the nature, scope, context and purposes of their handling and processing of personal data.
In the event of a personal data breach, companies must notify the appropriate supervisory authority “without undue delay and, where feasible, not later than 72 hours after having become aware of it” if the breach is likely to “result in a risk for the rights and freedoms of individuals”.
Most organizations are concerned about the potential significant financial penalties the Regulation can bring, but some forward-thinking companies are also planning to be prepared now.