IT Management Info

May 23 , 2017 | Posted by TechR2 Media |

TechR2 utilizes proprietary asset management Customer Portal software

TechR2 had developed and fully utilizes proprietary asset management software through which clients have unlimited access. Among other things, customers have access to: Customer reports – including device tracking along with audit and reconciliation reports Green reports – the client’s carbon footprint report to confirm R2 responsible recycling Certificates of Destruction – to confirm compliance with applicable regulations and industry [...]
April 25 , 2017 | Posted by TechR2 Media |

Top 10 features which differentiate an industry leader

What sets TechR2 apart? Here are ten features which differentiate an industry leader: Patented process – the only of its kind in the industry RFID tagging combined with proprietary software – we are not aware of any better A training program that ensures business partner personnel adhere to strict protocol – you would be hard-pressed to find a vendor that

Read more

May 24 , 2016 | Posted by Sepp Rajaie |

New TechBox Elite for Enterprise

New TechBox Elite for Enterprise Have you ever processed an executive’s old laptop or tablet and need to secure it from theft or harm? Did you ever need a secure, protected area in the office that is large enough to hold computers? Wouldn’t it be convenient to place an old computer in a secure container and then wheel it away

Read more

April 27 , 2016 | Posted by TechR2 Media |

The 3 Mistakes that Led to Your Data Breach

Let’s get right to the point: in today’s world, we must track, contain and destroy the data-bearing devices when they reach the end of the life or use in order to prevent your data being compromised. At TechR2, we deploy NSA-certified degaussers to quickly overwrite each magnetic data-bearing device, which is discussed in NATIONAL SECURITY AGENCY / CENTRAL SECURITY SERVICE [...]
April 27 , 2016 | Posted by TechR2 Media |

International Certifications: TechR2 Client Reach Demands

Why does Columbus, Ohio based TechR2 (leading data eradication company) have so many expensive, difficult to earn, difficult to maintain, globally respected certifications? Why are standards critical to controlling data eradication processes? Why should e-waste not use destruction technologies meant for paper? When building anything, it is important to create a solid foundation to assure customers that quality, security, safety [...]
December 15 , 2015 | Posted by TechR2 Media |

The 2-Person Security Rule Should Be Common Sense

'Saving a Few Dollars Cost Enterprise Millions' In a data center, there are two types of systems, those that are working and can be managed by the storage manager software written by companies like IBM and EMC. Then there are the systems that are being decommissioned or containing data bearing devices that no longer function. Because the majority of data centers do not have systems in place to [...]
October 20 , 2015 | Posted by TechR2 Media |

TechR2 RFID Tags Will Enable Full Verification of Any Disk Drive Destruction

THE CONCERN The tracking of removable or portable media has become critical due to the large amount of sensitive, confidential, personal and identifiable information contained in any such media. Loss and theft ranks high as the primary means by which sensitive data is inadvertently disclosed to sources of ill will. In the case of portable media, any kind of information [...]