Data Security Awareness

July 30 , 2018 | Posted by TechR2 Media |
Studying of the Use of Digitalization
During the mid-1980s, I worked for Siemens and our division made complete lines of airfield systems from the tower equipment to programmable logical controllers to digital power units to airfield navigation solutions. Our total analog line [...]  0
July 9 , 2018 | Posted by TechR2 Media |
TechR2 is excited to sponsor JDX Racing Porsche driver Trenton Estep
Racing enthusiasts may have spotted our Tear-a-Byte logo flashing by on the bumper of car 3 in the number 1 spot at Watkins Glen International during Sahlen's Six Hours of the Glen.  TechR2 is excited to [...]  0
June 21 , 2018 | Posted by TechR2 Media |
End of Life Compliance
End of Life Compliance by Charles Robbins Unsecured Physical Security of Data Bearing Devices (DBDs) that hold thousands to millions of protected records for Health information (PHI), Personally Identifiable Information (PII), or Sensitive Personal Information (SPI) [...]  0
April 25 , 2017 | Posted by TechR2 Media |
A Patented Process to Fully Protect Our Business Partners
TechR2 is the only company in the industry that has been awarded a patent (U.S. Patent 9,430,654) for its comprehensive Track-Contain-Destroy process. TechR2’s patent recognizes the unique process that TechR2 has developed to fully protect its [...]  0
April 25 , 2017 | Posted by TechR2 Media |
Top 10 features which differentiate an industry leader

What sets TechR2 apart? Here are ten features which differentiate an industry leader: Patented process – the only of its kind in the industry RFID tagging combined with proprietary software – we are not aware of

Read more

 0
April 25 , 2017 | Posted by TechR2 Media |
Industry Differentiators
This is a detailed comparison between TechR2 and other vendors who perform fully compliant media storage security and data / information eradication services.  There are companies that provide segments of TechR2's services, but we are confident [...]  0
May 24 , 2016 | Posted by Sepp Rajaie |
What You Might Have Missed: RFID Journal LIVE

On May 4, 2016, Charles Robbins, Director of Research and Development for TechR2, lead a presentation at the RFID Journal LIVE conference in Orlando, Florida  and discussed the  Tear-A-Byte® solution, which utilizes  RFID technologies. Aside from

Read more

 0
May 24 , 2016 | Posted by Sepp Rajaie |
Efficient Tear-A-Byte® Method Saves Money

…and is a Cleaner Solution for Data Eradication All processes in a data center and within the enterprise have direct and indirect costs. Managers know what the direct costs are because they are budgeted and invoiced

Read more

 0
May 24 , 2016 | Posted by Sepp Rajaie |
New TechBox Elite for Enterprise
New TechBox for Enterprise Have you ever processed an executive’s old laptop or tablet and need to secure it from theft or harm? Did you ever need a secure, protected area in the office that is [...]  0
April 27 , 2016 | Posted by TechR2 Media |
The 3 Mistakes that Led to Your Data Breach
Let’s get right to the point: in today’s world, we must track, contain and destroy the data-bearing devices when they reach the end of the life or use in order to prevent your data being compromised. [...]  0
April 27 , 2016 | Posted by TechR2 Media |
International Certifications: TechR2 Client Reach Demands
Why does Columbus, Ohio based TechR2 (leading data eradication company) have so many expensive, difficult to earn, difficult to maintain, globally respected certifications? Why are standards critical to controlling data eradication processes? Why should e-waste not [...]  0
December 15 , 2015 | Posted by TechR2 Media |
The 2-Person Security Rule Should Be Common Sense
'Saving a Few Dollars Cost Enterprise Millions' In a data center, there are two types of systems, those that are working and can be managed by the storage manager software written by companies like IBM and EMC. Then [...]  0
December 15 , 2015 | Posted by TechR2 Media |
Data at Rest = Data at Risk!
Tear-A-Byte® provides an on-going solution for the client that includes a detailed audit trail, secure containment, onsite reconciliation and certified onsite data destruction. This solution is ideal for any client with hard drive retention, providing the client with a secure solution [...]  0