Data Security Awareness

July 18 , 2017 | Posted by TechR2 Media |
Act now for GDPR compliance
Act now for GDPR compliance! ​Time is quickly running out for businesses ill-prepared for the May 2018 introduction of the EU's GDPR. Those who fail to comply face fines up to 4% of annual global revenue or €20 million — whichever is greater!  0
May 23 , 2017 | Posted by TechR2 Media |
TechR2 utilizes proprietary asset management Customer Portal software
TechR2 had developed and fully utilizes proprietary asset management software through which clients have unlimited access. Among other things, customers have access to: Customer reports – including device tracking along with audit and reconciliation reports Green reports – the client’s carbon footprint report to confirm R2 responsible recycling Certificates of Destruction – to confirm compliance with applicable regulations and industry [...]  0
May 23 , 2017 | Posted by TechR2 Media |
Data Security News

Data Security News

 0
April 25 , 2017 | Posted by TechR2 Media |
A Patented Process to Fully Protect Our Business Partners
TechR2 is the only company in the industry that has been awarded a patent (U.S. Patent 9,430,654) for its comprehensive Track-Contain-Destroy process. TechR2’s patent recognizes the unique process that TechR2 has developed to fully protect its business partners from data breaches that might otherwise result from mismanaged loose data-bearing devices. TechR2’s patented process is unmatched in the industry and, more [...]  0
April 25 , 2017 | Posted by TechR2 Media |
Top 10 features which differentiate an industry leader

What sets TechR2 apart? Here are ten features which differentiate an industry leader: Patented process – the only of its kind in the industry RFID tagging combined with proprietary software – we are not aware of any better A training program that ensures business partner personnel adhere to strict protocol – you would be hard-pressed to find a vendor that

Read more

 0
April 25 , 2017 | Posted by TechR2 Media |
Industry Differentiators
This is a detailed comparison between TechR2 and other vendors who perform fully compliant media storage security and data / information eradication services.  There are companies that provide segments of TechR2's services, but we are confident that no other company provides the comprehensive, A-to-Z, full compliance media security / data / information eradication solution that TechR2 provides.  TechR2’s patented method [...]  0
May 24 , 2016 | Posted by Sepp Rajaie |
What You Might Have Missed: RFID Journal LIVE

On May 4, 2016, Charles Robbins, Director of Research and Development for TechR2, lead a presentation at the RFID Journal LIVE conference in Orlando, Florida  and discussed the  Tear-A-Byte® solution, which utilizes  RFID technologies. Aside from  giving a demonstration of the Tear-A-Byte® process’ ability to TRACK data-bearing devices, securely CONTAIN them and then use a certified, patent-pending and responsible method

Read more

 0
May 24 , 2016 | Posted by Sepp Rajaie |
Efficient Tear-A-Byte® Method Saves Money

…and is a Cleaner Solution for Data Eradication All processes in a data center and within the enterprise have direct and indirect costs. Managers know what the direct costs are because they are budgeted and invoiced regularly. The indirect expenses spring up when a process is not completed correctly. Most business professionals know that it is rare for everything in

Read more

 0
May 24 , 2016 | Posted by Sepp Rajaie |
New TechBox Elite for Enterprise

New TechBox Elite for Enterprise Have you ever processed an executive’s old laptop or tablet and need to secure it from theft or harm? Did you ever need a secure, protected area in the office that is large enough to hold computers? Wouldn’t it be convenient to place an old computer in a secure container and then wheel it away

Read more

 0
April 27 , 2016 | Posted by TechR2 Media |
The 3 Mistakes that Led to Your Data Breach
Let’s get right to the point: in today’s world, we must track, contain and destroy the data-bearing devices when they reach the end of the life or use in order to prevent your data being compromised. At TechR2, we deploy NSA-certified degaussers to quickly overwrite each magnetic data-bearing device, which is discussed in NATIONAL SECURITY AGENCY / CENTRAL SECURITY SERVICE [...]  0