Are you prepared for the GDPR?

READ MORE

How can we protect
your enterprise?

With Tear-A-Byte®, our patented comprehensive track-contain-destroy process, we provide unmatched media / data / information security solutions including:

  • Secure onsite device containment
  • RFID IT Asset real-time tracking and inventory control
  • Fully automated audit trail via client portal
  • Certified degaussing to Department of Defense requirements
  • Data security, management and destruction with ISO 27001 compliance
  • Meets the NIST 800-88 Federal Guidelines for media sanitization
READ MORE
The Tear-A-Byte patented process

What differentiates TechR2
as an industry leader?

TechR2 offers a risk assessment and analysis to make certain that you’re not only compliant with the state & federal laws specific to your industry but that you are also receiving competitive rates and excellent service.

  • Immediately following your assessment, TechR2 will provide an analysis and can then customize a media security program that fits the needs of your enterprise.
READ MORE

A plan is created to secure the datacenter and all loose media devices throughout the enterprise.

TechR2 Onsite Training:

  • To ensure business partner personnel adhere to strict protocol, company managers and technicians receive training and certification supporting the entire Tear-A-Byte process.
  • We are careful to invest necessary support toward our business partners.

Tear-A-Byte is our patented onsite media security process which:

  • Securely contains all failed and decommissioned data-bearing devices
  • Integrates RFID IT Asset real-time tracking, inventory control and automated audit trail
  • Provides inventory of all registered devices through our customer portal
  • Meets the Department of Defense requirements for purging classified information
  • Meets the NIST 800-88 Federal Guidelines for media sanitization
  • Maintains ISO 9001, ISO 14001, ISO 27001, OHSAS 18001, R2, HIPAA, HITECH, PCI, SOX, and GLBA compliance
READ MORE

Tear-A-Byte for Enterprise is our patented onsite media security process

  • Failed and decommissioned data-bearing devices are registered and catalogued through our proprietary console, then contained within the Tear-A-Byte appliance
  • Provides data security, management and destruction with ISO 27001 compliance
  • Our certified and trained technicians will be dispatched onsite when a specified number of devices have been contained
  • For single or multiple locations
READ MORE

Data is captured & secured onsite.

  • Data destruction is performed by certified TechR2 technicians.

Devices that do not contain critical data are collected & recycled in our techBOX to EPA & R2 standards.

READ MORE

Compliance checkups are conducted quarterly and according to ISO 27001 best practice policies.

  • Sidestepping strict federal regulations regarding the environment can cost an organization tremendous fines, exploitation, loss of reputation, and lost inherent value.
READ MORE

Our RFID IT asset tracking features include:

  • Real-time daily tracking and inventory control
  • Automated audit trail
  • Up to 90% reduction in compliance costs
  • Up to 60% reduction in operating costs
  • Complete lifecycle management from installation to decommission
READ MORE

More About TechR2:

  • TechR2 is experienced with dealing with IBM manufactured devices
  • TechR2 is prepared for full compliance with GDPR
  • TechR2 acts as an objective 3rd party, trained to assess your security risk and customize a complete solution for you.
  • We will provide you with an independent certification of data destruction, backed by a world renowned insurer, Lloyd’s of London.
READ MORE
TechR2 Media Security Solutions

Tear-A-Byte® Datacenter

The Tear-A-Byte® Datacenter appliance, along with our patented track-contain-destroy process securely contains all failed and decommissioned data-bearing devices onsite, integrates RFID IT Asset real-time tracking, inventory control, automated audit trail, meets NIST 800-88 guidelines & more.

Tear-A-Byte® Enterprise

Designed to fit permanently inside a designated and secure setting, the Tear-A-Byte® Enterprise provides the best security for controlling data bearing devices once removed from company laptops and desktops.

Tear-A-Byte® Co-Lo

Our smallest unit, the Tear-A-Byte® Co-Lo is a 19-inch rack mount unit, designed for co-location datacenter sites.

Certification & Compliance Matters.

We are certified in five different international Standards of Management Systems to maximize business security best practices:

  • ISO 27001 for a secured environment
  • ISO 14001 to minimize environmental impact
  • ISO 9001 to maximize customer care
  • OHSAS 18001 for control over relevant hazards
  • R2 for maintaining global recycling standards
  • HIPAA, HITECH, PCI, SOX, and GLBA for additional compliance
READ MORE
Backed by Industry ISO Certifications

The Techr2 process and global ISO certifications fully comply with GDPR mandates, setting us far apart from anyone in the industry.

After four years of debate, the General Data Protection Regulation (GDPR) was ratified by the European Union during April 2016 and has now become law, although member states have a two year period to implement into national law. This means that companies will be expected to be fully compliant by May 25th 2018.

Individuals are increasingly data-savvy and;

  • Understand how brands use their data for sales and marketing purposes
  • Are aware of their rights with regard to their personal data
  • Are concerned about the well-publicized threat of cyber data theft

Companies will be required to “implement appropriate technical and organizational measures” in relation to the nature, scope, context and purposes of their handling and processing of personal data.

In the event of a personal data breach, companies must notify the appropriate supervisory authority “without undue delay and, where feasible, not later than 72 hours after having become aware of it” if the breach is likely to “result in a risk for the rights and freedoms of individuals”.

Most organizations are concerned about the potential significant financial penalties the Regulation can bring, but some forward-thinking companies are also planning to be prepared now.

Innovation, experience and compliance are what it takes to deploy today’s most advanced procedures for data breach prevention.

innovation for data and loose media protection
experience in protecting data
security for data management and disposal