Data security and quantum computing: Part 1

Posted by Eric Dorn on July 2, 2019

Data security is at the forefront of IT asset management and disposition, at every step in the lifecycle. Data must be protected while it’s actively in use as a part of IT inventory all the way to its end-of-life, whether that means remarketing, recycling, or destruction. We’ve talked before about how the ITAD industry (and the IT asset industry in general) is in a state of constant change. 2019 is no different and is already likely to usher in new standards for data sanitization and the first wave of high-capacity drives in mainstream use.

Read More

Topics: What's New in ITAD, Industry and Market News, Secure Data Destruction, Data Security

What New Storage Technology Means For The Future Of Secure IT Destruction

Posted by John McLeod on December 13, 2018

At Sipi Asset Recovery, data is a central part of what we do. Specifically, how we help our clients protect their brand, ensure that data is securely destroyed at the right time, and keep costs low while returning as much value as we can.

But the storage landscape is changing, and it’s changing fast. This means that companies are encountering new challenges when it comes to how those drives can and should be handled, from data security to end-of-lifecycle destruction.

Read More

Topics: The Asset Lifecycle, What's New in ITAD, Secure Data Destruction

Why Does Having a Portfolio of Secure Destruction Matter?

Posted by John McLeod on August 28, 2018
When your IT equipment reaches end of life or retirement, what’s the next step in electronic data destruction? How do you protect your customer data or your own data so it doesn’t fall into the wrong hands?

Sipi Asset Recovery is the only ITAD company with the complete portfolio of all four methods of secure data destruction. John McLeod, VP of Sales & Marketing and Eric Dorn, Senior Vice President & General Manager of Sipi Asset Recovery explain the importance of having a trusted partner portfolio of secure destruction.

Read More

Topics: Secure Data Destruction