614-322-2222 or 877-770-8324

Attention Arrow ITAD Clients:

Immediate support will be needed to rectify Arrow’s outdated ITAD services to the NEW Cybersecurity Framework.

TechR2 implements the NEW Cybersecurity Framework, including upholding all critical ISO certifications.

Important facts to keep in mind:

1. Arrow discontinued ITAD Services as of August, 2019
2. Compliance requires ITAD Clients to implement the Cybersecurity framework by vendors supporting a Cybersecurity Framework
3. New Federal and State laws require organizations to meet all Cybersecurity Framework compliance

is the only company in the industry that has been awarded a US patent for its Track-Contain-Destroy-Verify data security process, is OEM approved by IBM as its Top Tier offering, upholds critical ISO certifications, and is recognized for compliance with GDPR, NIST and all governmental regulations concerning data destruction.

Arrow ITAD Clients: SAVE UP TO 30%!

Clients switching from the Arrow ITAD model could save up to 30% (from their old ITAD expenses) for their 2020 budget. To qualify, a consultation is required with TechR2 prior to 12/31/2019!

Tear-A-Byte® is a patented Track-Contain-Destroy-Verify process
developed to fully protect your enterprise.

Tear-A-Byte Onsite Data Eradication Patented Process


What differentiates us as an industry leader?

TechR2 is the only company in the industry that has been awarded a patent (U.S. Patent 9,430,654) for its comprehensive Track-Contain-Destroy-Verify process. Additionally, TechR2’s information security patented process is unmatched in the industry, and provides:

  • Risk Assessment
  • Implementation Roadmap
  • Training
  • Cleanout
  • Tear-A-Byte® Datacenter, Enterprise and Co-Lo
  • Onsite Data Reconciliation and Destruction
  • IT Asset Retirement
  • ISO 14001 Recycling
  • Risk Mitigation and Compliance

Cyber security protocols are ineffective and non-compliant when data bearing devices leave the four walls of a facility for any reason and/or allow loose media to be handled outside of certified SOC or ISO audited processes.

Such protocol is susceptible to a data breach due to improper inventory management systems and could result in devastating loss to any corporation.

IBM Implements Tear-A-Byte® As Their Exclusive Global Media Destruction Process!

IBM places Tear-A-Byte® at the front line of their global offering for certified data destruction.


Tear-A-Byte® provides unmatched media / data security solutions including:

  • Secure onsite device containment
  • RFID IT Asset real-time tracking and inventory control
  • Fully automated audit trail via client portal
  • Certified degaussing to Department of Defense requirements
  • Data security, management and destruction with ISO 27001 compliance
  • Meets the NIST 800-88 Federal Guidelines for media sanitization

TechR2 News & More

Tear-A-Byte® For Every Site

Tear-A-Byte® is TechR2’s patented process developed to fully protect its business partners from data breaches resulting from stolen and mismanaged loose data-bearing devices.

The process begins with the implementation of intricate RFID technologies, tagging each device for communication with TechR2’s proprietary Customer Portal software. The Tear-A-Byte® appliance then receives and contains each tagged device.

No device (or data contained on the device) can leave the enterprise facility without a real-time, immediate alert. Once filled to capacity, TechR2 dispatches engineers to reconcile all of the devices with the data contained on each, then completely and irretrievably destroys them through the use of NSA certified degaussers.
TechR2’s engineers not only audit and fully assess any risk, but double verify the reconciliation process to ensure a completely successful process.

Tear-A-Byte® Datacenter

Along with our patented track-contain-destroy-verify process, Tear-A-Byte® Datacenter securely contains all failed and decommissioned data-bearing devices onsite, integrates RFID IT Asset real-time tracking, inventory control, automated audit trail, meets NIST 800-88 guidelines & more.

Tear-A-Byte® Enterprise

Designed to fit permanently inside a designated and secure setting, the Tear-A-Byte® Enterprise provides the best security for controlling data bearing devices once removed from company laptops and desktops.


The Tear-A-Byte® Co-Lo is a 19-inch rack mount unit, designed for co-location datacenter sites.


Certification & Compliance Matters.

TechR2 upholds multiple Standards in Security, Safety and Environmental Management Systems to maximize business management best practices:

  • ISO 27001 for a secured environment
  • ISO 31000 to provide principles and generic guidelines on risk management
  • ISO 14001 to minimize environmental impact
  • ISO 9001 to maximize customer care
  • ISO 45001 for control over relevant hazards
  • HIPAA, HITECH, PCI, SOX, and GLBA for additional compliance

Innovation, experience and compliance are what it takes to deploy today’s most advanced procedures for data breach prevention.


*2018 Cost of Data Breach Study: Global Analysis, Ponemon Institute, July 2018

  • Providing complete “Cradle to Grave” data eradication solutions, sound experience, industry best practices and resources to support you.

    Why risk it? Get started today! Call 614-322-2222

  • TechR2 is a leading provider for secure onsite data eradication and technology retirement solutions. We are ISO 27001 certified, ISO 14001 certified, ISO 9001 certified, and ISO 45001 certified.


Request Information