Arrow IT Asset Disposition Trends Report

Size: px
Start display at page:

Download "Arrow IT Asset Disposition Trends Report"

Transcription

1 IT Asset Disposition ITAD Trends Report Arrow IT Asset Disposition Trends Report The data is in, and IT-industry practitioners have made it clear that concern over data security is the number one reason to implement an IT asset disposition strategy. This trend isn t surprising considering the ongoing media reports about data breaches and retired assets found to contain sensitive data. Companies are becoming more aware of penalties arising from improper disposal of IT assets. There is a heightened awareness among IT managers and stakeholders of the need to include IT asset disposition (ITAD) as a strategic business solution, with the number of companies budgeting for ITAD up 38% over 2012 data. Despite the increased focus on data security, there appears to be some uncertainty (among the companies surveyed) surrounding the actual data security methods, with a misunderstanding of the most effective methods of ensuring data destruction. About Arrow Arrow s group provides specialized IT asset disposition (ITAD) and reverse supply chain solutions that protect clients brands, reduce their risks, and enable technology users to uncover opportunities for greater efficiencies and value capture at the end of the IT product lifecycle. Innovating in ITAD services for more than 15 years, Arrow s business is among the leaders in the Gartner Magic Quadrant for IT Asset Disposition, Worldwide. Environmental issues continue to rank highly among IT asset disposition concerns. Although the adoption of industry-recognized compliance standards is the most important factor in selecting a 3rd-party provider, just which standards are the most important is not entirely clear. As might be anticipated, companies with more than 50,000 employees show significantly higher adoption rates across nearly all compliance standards surveyed than do smaller companies. In comparing the e-stewards standard with the R2 standard, most (59%) of the companies surveyed said the standards are equally important and an astonishing 88% felt they should be combined. In addition to data security and environmental standards, concerns over the financial and legal risks associated with the proper disposition of electronic assets are strong motivators for companies employing an ITAD strategy. Shifts in technology trends such as Bring Your Own Device (BYOD), a great emphasis on the cloud, and ongoing concerns regarding the implications of these various trends on data security continue to compel companies to expand their IT asset disposition program and data security policies. Corporate social responsibility and sustainability have gained widespread momentum; however, there is strong evidence that many end users still don t handle electronics properly - from either an environmental or a data security perspective. As the business environment continues to evolve with the adoption of so many new devices, it is clear that companies are paying more attention to the need for an IT asset disposition strategy. A well-planned ITAD strategy is necessary to mitigate risks and protect the organization and brand. arrowvaluerecovery.com

2 Professional IT Asset Disposition and Strategy 1. Does your company have a formal, end-of-life IT asset disposition strategy for technology equipment? % (yes) % (yes) Companies with a formal ITAD strategy based on size (number of employees) 1,001 to 5,000 5,001 to 10,000 10,001 to 50,000 More than 50,000 85% 90% 93% 97% 2. How important are the following factors in motivating the creation of your current end-of-life IT asset disposition strategy? Compared to 2012,* data security, Green business practices, and mitigation of legal and financial risks remain the most important factors. Other important factors include philanthropy programs and redeploying assets to reduce costs. Percentage of companies considering each factor to be Important (either Very Important or Extremely Important ) 99% 95% 92% 87% 87% 80% Concern about data security To be part of our company s commitment to Green business and IT practices To mitigate our legal and financial risks To redeploy assets to reduce costs To be part of our company s philanthropy objectives (donating old equipment) To offset original acquisition costs by remarketing our old equipment 2

3 Professional IT Asset Disposition and Strategy (continued) 3. How do you currently handle your end-of-life IT assets? Method * Give them to an IT asset disposition (ITAD) provider 59% 41% Donate them to charity 41% 45% Use a local recycler 37% 82% Return them to an OEM / leasing company 36% 29% Redeploy them within the company 36% 51% Place them in storage until a solution is found 31% 14% Sell them to employees 31% 23% Place them in the trash 15% 6% 4. Are you currently using a 3rd-party service provider to manage your end-of-life IT assets? In 2014, nearly 2 out of 3 companies surveyed chose to have a 3rd-party service provider manage their end-of-life assets. Yes 63% No 35% Do Not Know 2% 3

4 Best Practices for Selecting ITAD Providers 5. How important are the following factors in selecting a 3rd-party service provider to handle your IT asset disposition? Percentage of companies considering each factor to be Important (either Very Important or Extremely Important ). 97% 95% 95% 89% 87% Adoption of industry-recognized compliance standards Well-documented and enforced chain of custody High-quality, thorough client reporting Availability of a global service delivery model Strong remarketing capabilities 6. Which industry certifications play a role in the selection of an IT asset disposition provider? 64% ISO % NAID 46% ISO % R2 38% e-stewards 24% TAPA 38% OHSAS % No industry certifications 36% ADISA 2% Other 36% RIOS 4

5 Best Practices for Selecting ITAD Providers (continued) 7. Which environmental standard is the most important to your company? 95% of companies feel that R2 and/or e-stewards are the most important environmental standards related to ITAD. 59% 23% 13% R2 and e-stewards are equally important e-stewards only R2 only 8. When it comes to environmental stewardship standards, how important is it to you that R2 and e-stewards be combined into one standard? Nearly 9 out of 10 companies feel that R2 and e-stewards should be combined into a single standard. Important 88% Do Not Know 2% Not Important 10% 5

6 Data Security and Compliance 9. Does your company have a data security policy that applies to the end-of-life processing of assets? Most companies are concerned with data security. Companies with a formal ITAD strategy and companies who use a 3rd-party service provider are more likely to have a data security policy. Yes 92% No 8% 10. What steps does your company take to alleviate concerns regarding data security? Multiple tactics are used to alleviate data security concerns. In fact, nearly two thirds of the companies use 3 of the 5 tactics listed below. However, there appears to be some uncertainty and misunderstanding surrounding which methods are truly effective, with a majority of companies selecting Delete the file directory on the hard drive in addition to other tactics. A deeper analysis of the results shows that about 4 out of 100 companies selected Delete the file directory on the hard drive as the only tactic they use. Use tactic to alleviate data security concerns Tactic 68% 66% 65% 38% Less than 1% Hard drive is overwritten Delete the file directory on the hard drive Hard drives are destroyed (i.e., shredded, degaussed, pinned) A 3rd party handles this for us Other 11. Does your company have a Bring-Your-Own-Device (BYOD) policy that allows employees to use personal devices for work purposes? 48% Allow multiple devices 10% Laptops only 23% Does not allow BYOD 2% Tablets only 17% Smartphones only 6

7 Data Security and Compliance (continued) 12. What percentage of employees are provided with a company-owned computer, tablet or smartphone? Computer 1% 27% 72% Smartphone Tablet 3% 6% 35% 39% 59% 59% More than 50% of Employees Less than 50% of Employees Do Not Provide 13. Does your company have a policy and process to ensure that company data on BYOD devices is secure during active use? Compared with 2012,* companies have significantly increased their efforts to ensure that company data on BYOD devices is secure % (yes) 2012* 59% (yes) 7

8 Data Security and Compliance (continued) 14. Does your company have a policy and process to ensure that company data on BYOD devices is eradicated once the employee s device is no longer active on the company network? Yes 88% No 10% Do Not Know 2% 15. On a scale from 1 to 5, where 5 equals extremely aware and 1 equals not at all aware, how aware are you of the negative potential impact of each of the following issues related to improper IT asset disposal on your business? Awareness of penalties due to improper disposal and awareness of the total cost of ownership among companies surveyed is high and increasing. Issue * Penalties arising from breaches of data security Penalties arising from non-compliance with environmental regulations 4.4 NA Total cost of ownership and return-on-investment opportunities Negative impact on your brand 4.2 NA 8

9 Corporate Social Responsibility and Sustainability 16. Does your company have a formal corporate social responsibility or sustainability program in place? Larger companies are more likely than smaller companies to have a program in place. Slightly less than one third of the smaller companies surveyed plan to have a program in place by the end of Yes 70% No, but we are planning to do so before the end of % No, and we have no plans to do so in the near future 5% Do Not Know 2% 17. Do you report the progress of your corporate social responsibility or sustainability program? Yes 89% No 10% Do Not Know 1% 18. Do you include the impact of your IT asset disposition program in your environmental reporting? Yes 82% Not yet, but we are actively working to integrate it into our environmental considerations 10% No 8% 9

10 Budgeting and Measurement 19. Does your company budget for the IT asset disposition process? Companies are becoming more aware of the need for ITAD and are budgeting for it % (yes) 2012* 63% (yes) Percentage of companies with a budget for ITAD. 20. How often is each of the following company-owned assets replaced with new equipment? Servers 1% 36% 63% Three Years or Longer Less than Three Years Desktops 37% 60% Do Not Have This Asset 2% Laptops 52% 47% 1% Tablets 40% 52% 6% Smartphones 36% 61% 3% 10

11 Budgeting and Measurement (continued) 21. What impact is the cloud having on your IT asset purchases? Compared to 2012,* the cloud is having significantly more impact on a company s IT asset purchases. Impact * We are purchasing more enterprise assets to support our private cloud We are purchasing fewer enterprise assets as we migrate to the cloud We are purchasing more server equipment to support the cloud The cloud is having no impact on our purchase of enterprise assets We are currently investigating whether to use the cloud 34% 26% 23% 27% 19% NA 14% 45% 5% 2% We have chosen not to use the cloud 5% NA Methodology Data for the 2014 ITAD Trends report was obtained by Blumberg Advisory Group, an independent research and consulting firm specializing in strategic IT issues for mid-size to large enterprises. Findings were derived from questionnaires completed by 235 respondents. Interpretation of this data has been provided by IT asset disposition experts at Arrow Electronics and by Blumberg Advisory Group. *Data for the 2012 ITAD Trends report was obtained by Osterman Research from a survey of 100 companies utilizing a similar methodology as described above. 11

12 Are You Five Years Out? Most people live in the present. The world of now. But a handful of us work in a unique world that doesn t quite exist yet the world of Five Years Out. Five Years Out is the tangible future. And the people who live and work there know that new technologies, new materials, new ideas and new electronics will make life not only different, but better. Not just cheaper, but smarter. Not just easier, but more inspired. Five Years Out is an exciting place to be. So exciting that, once you ve been there, it s hard to get excited about the present. Because we know what s coming is going to be so much better. Five Years Out is a community of builders, designers, engineers and imaginers who navigate the path between possibility and practicality. Creating the future of everything from cars to coffeemakers. Are you one of them? Then you re probably working with us. Contact Us Today! Call to speak to one of our account representatives, or us at valuerecovery@arrow.com for more information. Arrow Electronics, Inc South Lima Street Englewood, CO 80112, USA 2014-ITAD-TRENDreport_01/15_CDS1.1

Value Recovery. arrow.com

Value Recovery. arrow.com Value Recovery arrow.com Value Recovery With Arrow Value Recovery, it s often not the end of a product s life it s the beginning of a different one. The world of Five Years Out is all about new thinking,

More information

Value Recovery Enterprise IT Asset Disposition

Value Recovery Enterprise IT Asset Disposition Value Recovery Enterprise IT Asset Disposition arrowvaluerecovery.com Enterprise IT Asset Disposition The world of Five Years Out is all about new thinking, new materials, new standards New everything.

More information

Value Recovery. arrow.com

Value Recovery. arrow.com Value Recovery arrow.com Value Recovery With Arrow Value Recovery, it s often not the end of a product s life it s the beginning of a different one. The world of Five Years Out is all about new thinking,

More information

Cloud Enterprise Computing Solutions Americas. Arrow Cloud Solutions ArrowSphere. arrow.com

Cloud Enterprise Computing Solutions Americas. Arrow Cloud Solutions ArrowSphere. arrow.com Cloud Enterprise Computing Solutions Americas Arrow Cloud Solutions ArrowSphere arrow.com The cloud. It possesses extraordinary promise. And comes with complex challenges. ArrowSphere. Where Cloud meets

More information

A Guide to Minimizing the Risk of IT Asset Disposition

A Guide to Minimizing the Risk of IT Asset Disposition A Guide to Minimizing the Risk of IT Asset Disposition Who is concerned about risk? They may not think about it terms of risk, but almost everyone at your organization is worried about the chinks in its

More information

Protecting MIT Data. State Laws & Regulations. T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia

Protecting MIT Data. State Laws & Regulations. T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia Protecting MIT Data T. McGovern, M. Yeaton, M. Halsall, S. Burke, B. DiMattia State Laws & Regulations General Laws, Chapter 93H: Massachusetts Data Breach Law, outlines when to notify (2007) 201 CMR 17.00:

More information

Building an ITAD Program:

Building an ITAD Program: Building an ITAD Program: What Your Company Needs To Know By: Integrated Communications & Technologies Contents 3 4 6 7 8 9 Introduction Understanding The Concepts of IT Asset Disposition Evaluating by

More information

Data Center. Business Intelligence. Enterprise Computing Solutions North America. Education Services. arrow.com

Data Center. Business Intelligence. Enterprise Computing Solutions North America. Education Services. arrow.com Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions North America Education Services arrow.com Education Services The most critical success factor in the installation and re-purchase

More information

Cloud Enterprise Computing Solutions North America. ArrowSphere xsp Central. arrow.com

Cloud Enterprise Computing Solutions North America. ArrowSphere xsp Central. arrow.com Cloud Enterprise Computing Solutions North America ArrowSphere xsp Central arrow.com The cloud. It possesses extraordinary promise. And comes with complex challenges. ArrowSphere xsp Central Changing How

More information

Enterprise Computing Solutions

Enterprise Computing Solutions Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions Security Solutions arrow.com Security Solutions Secure the integrity of your systems and data today with the one company

More information

CENTRALLY MANAGED PROCESS MINIMIZING RISK MAXIMIZING REMARKETING VALUE

CENTRALLY MANAGED PROCESS MINIMIZING RISK MAXIMIZING REMARKETING VALUE IT ASSET DISPOSITION Technology is introduced to business workflows to increase productivity and boost earnings. When the time comes to remove off-lease and end-oflife IT assets, shouldn t those goals

More information

Mobility. Mobility is a major force. It s changing human culture and business on a global scale. And it s nowhere near achieving its full potential.

Mobility. Mobility is a major force. It s changing human culture and business on a global scale. And it s nowhere near achieving its full potential. Mobility arrow.com Mobility This year, the number of mobile devices is expected to exceed the world s population. Soon, smartphones will surpass PCs as the device of choice for Internet access. A startling

More information

HARD DRIVE REMARKETING

HARD DRIVE REMARKETING A PUBLICATION BY HORIZON TECHNOLOGY THE SUPPLY CHAIN PROFESSIONAL S GUIDE TO HARD DRIVE REMARKETING THE INTRODUCTORY GUIDE TO HARD DRIVE DISPOSITION & REMARKETING TO MAXIMIZE COMPANY PROFIT TABLE OF CONTENTS

More information

DOCUMENT CURRENT VENDORS AND CONTRACTS 2014 IT ASSET DISPOSITION PLAN

DOCUMENT CURRENT VENDORS AND CONTRACTS 2014 IT ASSET DISPOSITION PLAN DOCUMENT CURRENT VENDORS IT ASSET AND CONTRACTS DISPOSITION 2014 PLAN ASSESSMENT Organizations that lack an actively managed and well thought-out IT asset disposition (ITAD) program may be exposing themselves

More information

Cloud Enterprise Computing Solutions EMEA. ArrowSphere. arrow.com

Cloud Enterprise Computing Solutions EMEA. ArrowSphere. arrow.com Cloud Enterprise Computing Solutions EMEA ArrowSphere arrow.com The cloud possesses extraordinary promise and comes with complex challenges. ArrowSphere. Where Cloud Meets the Channel. That s why we at

More information

How To Build A Data Center

How To Build A Data Center Data Center arrow.com The data center. Few people ever see it, but precious little of consequence happens without passing through it. It is the core of the infrastructure. The foundation of the cloud.

More information

Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods

Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods SECURIS SM Protecting Data in Decommissioned IT Assets: Factors, Tools and Methods Information Systems Security Association (ISSA) Baltimore Chapter Monthly Meeting January 27, 2016 Hugh McLaurin, CSDS

More information

Data Center. Business Intelligence. Enterprise Computing Solutions North America. Remote Monitoring & Management Solutions. arrow.

Data Center. Business Intelligence. Enterprise Computing Solutions North America. Remote Monitoring & Management Solutions. arrow. Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions North America Remote Monitoring & Management Solutions arrow.com Remote Monitoring & Management Solutions Remote Monitoring

More information

IT asset disposal for organisations

IT asset disposal for organisations ICO lo Data Protection Act Contents Introduction... 1 Overview... 2 What the DPA says... 3 Create an asset disposal strategy... 3 How will devices be disposed of when no longer needed?... 3 Conduct a risk

More information

Driving the Green Data Center Strategy in Established Environments

Driving the Green Data Center Strategy in Established Environments Driving the Green Data Center Strategy in Established Environments November 2008 Agenda Green IT defined Arrow Green Initiatives Data Center Other Initiatives Green Challenges Green IT Optimal use of information

More information

Data Centre. Business Intelligence. Enterprise Computing Solutions United Kingdom. Security Solutions. arrow.com

Data Centre. Business Intelligence. Enterprise Computing Solutions United Kingdom. Security Solutions. arrow.com Business Intelligence Data Centre Cloud Mobility Enterprise Computing Solutions United Kingdom Security Solutions arrow.com Safeguarding Data, Securing Business At Arrow, we work in a unique world that

More information

Cloud Enterprise Computing Solutions EMEA. ArrowSphere xsp Central. arrowsphere.net

Cloud Enterprise Computing Solutions EMEA. ArrowSphere xsp Central. arrowsphere.net Cloud Enterprise Computing Solutions EMEA ArrowSphere xsp Central arrowsphere.net The cloud. It possesses extraordinary promise. And comes with complex challenges. ArrowSphere xsp Central. Improving software

More information

Cloud Enterprise Computing Solutions BeLux. ArrowSphere xsp. arrow.com

Cloud Enterprise Computing Solutions BeLux. ArrowSphere xsp. arrow.com Cloud Enterprise Computing Solutions BeLux ArrowSphere xsp arrow.com The Arrow Difference At Arrow we aggregate. Enable. Build ecosystems. We anticipate market momentum, technology demands and adoption

More information

Cloud Enterprise Computing Solutions United Kingdom. ArrowSphere xsp. arrow.com

Cloud Enterprise Computing Solutions United Kingdom. ArrowSphere xsp. arrow.com Cloud Enterprise Computing Solutions United Kingdom ArrowSphere xsp arrow.com The cloud. It possesses extraordinary promise. But comes with complex challenges. ArrowSphere Enabling cloud service providers

More information

Table of Contents 01 How to minimize cost in the ITAD Process. 02 Four ways to maximize investment recovery

Table of Contents 01 How to minimize cost in the ITAD Process. 02 Four ways to maximize investment recovery IT Asset Manager s Guide to Disposition As the person accountable for managing the life cycle of your organization s IT assets, you have a number of unique concerns in regard to the disposition of those

More information

Responsibly Retiring IT Assets, Medical or Laboratory Equipment

Responsibly Retiring IT Assets, Medical or Laboratory Equipment Responsibly Retiring IT Assets, Medical or Laboratory Equipment Agenda Introductions David Zimet, President, Hesstech, LLC Industry Overview Key Issues When Retiring Electronic Equipment Data Security

More information

Make the move to The Next Generation Firewall

Make the move to The Next Generation Firewall Make the move to The Next Generation Firewall Tech xcelerate SIEM Dear Partner, Security is changing new threats, new evasion techniques and a new breed of cyber criminal. Help your customers make the

More information

Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace

Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace Everything You Need to Know About Effective Mobile Device Management mastering the mobile workplace Table of Contents Introduction... 3 1. What exactly is Mobility Management Anyway?... 4 Impenetrable

More information

Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide

Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide. Four steps for success Implementing a Data Loss Prevention solution to address PCI requirements may be broken into four key

More information

Dublin City University

Dublin City University Asset Management Policy Asset Management Policy Contents Purpose... 1 Scope... 1 Physical Assets... 1 Software Assets... 1 Information Assets... 1 Policies and management... 2 Asset Life Cycle... 2 Asset

More information

MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER

MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER MEDIA AND IT ASSET DISPOSITION: YOUR GUIDE TO SELECTING A SUPPLIER EXECUTIVE SUMMARY The combination of an increasingly mobile workforce and rapid technology innovation means organisations must work harder

More information

Data Center. Business Intelligence. Enterprise Computing Solutions North America. Learning Solutions IBM Training. Brand Photo Here. arrow.

Data Center. Business Intelligence. Enterprise Computing Solutions North America. Learning Solutions IBM Training. Brand Photo Here. arrow. Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions North America Learning Solutions IBM Training Brand Photo Here arrow.com IBM Training At Arrow, we think Five Years Out.

More information

Preventing Final Disposition Data Breaches

Preventing Final Disposition Data Breaches Preventing Final Disposition Data Breaches How to Evaluate an ITAD Vendor for Your Organization By: Jim Kegley Founder, President and CEO, U.S. Micro Corporation The IT asset disposition (ITAD) industry

More information

Other terms are defined in the Providence Privacy and Security Glossary

Other terms are defined in the Providence Privacy and Security Glossary Subject: Device and Media Controls Department: Enterprise Security Executive Sponsor: EVP/COO Approved by: Rod Hochman, MD - President/CEO Policy Number: New Date: Revised 10/11/2013 Reviewed Policy Owner:

More information

The Future of Information

The Future of Information Place image here The Future of Information Management Bill Tolson Iron Mountain In the face of an ongoing electronic information explosion, information management becomes an imperative. Organizations need

More information

Waste, Not! Recovering Value from Unused and Surplus IT Assets

Waste, Not! Recovering Value from Unused and Surplus IT Assets Waste, Not! Recovering Value from Unused and Surplus IT Assets A CNE Direct Whitepaper Contents 2 Introduction 3 The Asset-Value Recovery Landscape 4 Five Steps to Maximizing Asset-Value Recovery 6 Conclusion

More information

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious

More information

IT Asset disposition services

IT Asset disposition services IT Asset disposition services Serverhuset help you do business while following the EU-directive on WEEE Table of contents We help our customers become more cost efficient and environmentally friendly by

More information

IBM Infrastructure Resource Management Services Offering Overview. IBM Global Services

IBM Infrastructure Resource Management Services Offering Overview. IBM Global Services IBM Infrastructure Resource Management Services Offering Overview The role of IT infrastructure within the enterprise has evolved as business functions have become virtually inseparable from the IT that

More information

Data Center. Business Intelligence. Enterprise Computing Solutions North America. IBM Group Marketing Guide for Business Partners. arrow.

Data Center. Business Intelligence. Enterprise Computing Solutions North America. IBM Group Marketing Guide for Business Partners. arrow. Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions North America IBM Group Marketing Guide for Business Partners arrow.com Introduction To shorten your time to market and begin

More information

How Cloud Computing Can Accelerate Endpoint Encryption:

How Cloud Computing Can Accelerate Endpoint Encryption: How Cloud Computing Can Accelerate Endpoint Encryption: Managing Self-Encrypting Drives in the Cloud Executive Summary Cloud computing is transforming IT for businesses of all sizes, but not without significant

More information

IT ASSET DISPOSAL ISO 27001. ISO 14001 Registered Environmental Management. ISO 9001 Registered Quality Management

IT ASSET DISPOSAL ISO 27001. ISO 14001 Registered Environmental Management. ISO 9001 Registered Quality Management ISO 27001 IT ASSET DISPOSAL ISO 14001 Registered Environmental Management Registered Information Security Management ISO 9001 Registered Quality Management CONTENTS PAGE 04 WHO ARE STONE? PAGE 05 IT ASSET

More information

Gain Efficiency, Cost Savings and Compliance with Iron Mountain s Portfolio of Services

Gain Efficiency, Cost Savings and Compliance with Iron Mountain s Portfolio of Services ONE SOLUTION Maximize the Business Value of Your Information Gain Efficiency, Cost Savings and Compliance with Iron Mountain s Portfolio of Services In today s world, information whether in paper or digital

More information

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh

People-centric IT: Bedeutung für das Identity und Access Management. Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh People-centric IT: Bedeutung für das Identity und Access Management Uwe Lüthy Solution Sales Specialist Core Infrastructure Microsoft Schweiz Gmbh Cloud OS Vision Microsoft s vision of the unified platform

More information

SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure

SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure SOAS Controlled Procedure CP-PP06 IT Asset Management Procedure Page 1 of 6 Martin Whiteside Version 1.1 March 2015 CP-PP06 IT Asset Management Procedure 1 Document Overview This document provides the

More information

SOFTWARE LICENSING AWARENESS IN DYNAMIC ENVIRONMENTS

SOFTWARE LICENSING AWARENESS IN DYNAMIC ENVIRONMENTS SOFTWARE LICENSING AWARENESS IN DYNAMIC ENVIRONMENTS 3 CLOUD TECHNOLOGIES AND EMPLOYEE COLLABORATION MAY SATISFY BUSINESS FLEXIBILITY, DYNAMISM AND INSTANT DEMAND BUT THE LICENSING IMPACT AND FINANCIAL

More information

Data Security for ITAD, Corporate & Consumer Electronics

Data Security for ITAD, Corporate & Consumer Electronics Up cy cle \ ŭp-sỳ-kil\ v (ca. 2011) 1. the action of giving devices a second life 2. the mission to keep electronics out of landfills 3. to fund important causes without writing a check 4. to nearly double

More information

Multi-factor Authentication

Multi-factor Authentication Multi-factor Authentication Current Usage and Trends whitepaper Executive Summary In this digital age, validating identities and controlling access is vital, which is why multifactor authentication has

More information

5 Steps to Building a Successful Channel Program in the Cloud. Ron Huddleston SVP, ISV Alliances

5 Steps to Building a Successful Channel Program in the Cloud. Ron Huddleston SVP, ISV Alliances 5 Steps to Building a Successful Channel Program in the Cloud Ron Huddleston SVP, ISV Alliances Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation

More information

Challenges and Solutions for Effective SSD Data Erasure

Challenges and Solutions for Effective SSD Data Erasure Challenges and Solutions for Effective SSD Data Erasure Blancco White Paper Published 8 October 2013 First Edition Table of contents Introduction...3 The Simplicity And Complexity Of SSDs...4 Traditional

More information

Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business

Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Asset Management Ireland (AMI) The secure IT Asset Disposal Company that generates revenue for your business Allow AMI to unlock the value in your redundant IT equipment by extending the lifecycle of your

More information

Look around any workplace and you see Information Technology (IT) assets. If you are working in an average office environment, you probably have a

Look around any workplace and you see Information Technology (IT) assets. If you are working in an average office environment, you probably have a 1 Look around any workplace and you see Information Technology (IT) assets. If you are working in an average office environment, you probably have a computer monitor with a CPU at your desk along with

More information

INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY

INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY INFORMATION TECHNOLOGY EQUIPMENT PROCUREMENT AND DISPOSAL POLICY Version: 1.4 Ratified by: Date Ratified: 14 October 2014 Name of Originator/Author: Name of Responsible Committee/Individual: Date issued:

More information

Technology Lifecycle Management. A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs

Technology Lifecycle Management. A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs Technology Lifecycle Management A Model for Enabling Systematic Budgeting and Administration of Government Technology Programs Even as technology improves, government s fundamental IT challenge remains

More information

Managing Data Erasure in the Enterprise: Automated Processes for Optimal Efficiency

Managing Data Erasure in the Enterprise: Automated Processes for Optimal Efficiency Managing Data Erasure in the Enterprise: Automated Processes for Optimal Efficiency Blancco White Paper Published 30 June 2014 Table of contents Introduction...2 Threats from improperly disposed IT equipment...4

More information

Data Centre Enterprise Computing Solutions BeLux

Data Centre Enterprise Computing Solutions BeLux Data Centre Enterprise Computing Solutions BeLux NetApp and Veeam Product Bundles arrow.com The Challenge The Solution With data growing at astounding rates, IT managers are depending more and more on

More information

Asset Management Equipment Redeployment And Termination Services. A Service Offering From Data Center Assistance Group, Inc.

Asset Management Equipment Redeployment And Termination Services. A Service Offering From Data Center Assistance Group, Inc. DCAG Data Center Assistance Group, Inc. Revision Date: 5/20/2013 Asset Management Redeployment And Termination Services A Service Offering From Data Center Assistance Group, Inc. (DCAG) Prepared by: Thomas

More information

EMPOWERING THE DYNAMIC WORKPLACE

EMPOWERING THE DYNAMIC WORKPLACE EMPOWERING THE DYNAMIC WORKPLACE Matrix42 has been positioned in the visionary quadrant of the Gartner Magic Quadrant as the only vendor that enables organizations to manage physical, virtual and mobile

More information

THOMAS R FINNERAN PRINCIPAL CONSULTANT - IDENNEDY PROJECT

THOMAS R FINNERAN PRINCIPAL CONSULTANT - IDENNEDY PROJECT Privacy Engineering for Cloud and Geolocation and Data Governance THOMAS R FINNERAN PRINCIPAL CONSULTANT - IDENNEDY PROJECT Some Privacy Requirement Questions related to the Cloud How does Cloud Provider

More information

OUR SERVICES... SUPPLY CHAIN SERVICES ONSITE SERVICES IT RECYCLING SERVICES

OUR SERVICES... SUPPLY CHAIN SERVICES ONSITE SERVICES IT RECYCLING SERVICES SERVICES OVERVIEW OUR SERVICES... ONSITE SERVICES Onsite Shredding Services Onsite Data Erasure Services Onsite Document Destruction Services Onsite Hard Drive Destruction Services Data Centre Decommissioning

More information

Secure Your Success. Intel Security Partner Program

Secure Your Success. Intel Security Partner Program Secure Your Success Intel Security Partner Program Today s digital security threats are more sophisticated and complex than ever. At the same time, computing advancements are opening up new possibilities

More information

Corporate Enterprise Computing Solutions Denmark. Marketing Packages. arrow.com

Corporate Enterprise Computing Solutions Denmark. Marketing Packages. arrow.com Corporate Enterprise Computing Solutions Denmark Marketing Packages arrow.com Marketing Services Denmark Marketing Packages Arrow ECS Marketing has produced a number of marketing packages that make it

More information

Hot Topics in IT. CUAV Conference May 2012

Hot Topics in IT. CUAV Conference May 2012 Hot Topics in IT CUAV Conference May 2012 Baker Tilly Virchow Krause, LLP Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International.

More information

Setting BYOD Policy: A New Partnership for IT and HR

Setting BYOD Policy: A New Partnership for IT and HR Introduction As the line between office and home life continues to blur, employees increasingly rely on their own smartphones, tablets, and laptop computers for work-related tasks. Today, more than 70

More information

trends and audit considerations

trends and audit considerations Bring your own device (BYOD) trends and audit considerations SIFMA IT audit session 4 October 2012 Disclaimer Ernst & Young refers to the global organization of member firms of Ernst & Young Global Limited,

More information

Bring Your Own Device Policy. Report to the Joint Legislative Oversight Committee on Information Technology

Bring Your Own Device Policy. Report to the Joint Legislative Oversight Committee on Information Technology Bring Your Own Device Policy Report to the Joint Legislative Oversight Committee on Information Technology Chris Estes State Chief Information Officer March 2014 This page left blank intentionally Contents

More information

Adams County, Colorado

Adams County, Colorado Colorado Independent Consultants Network, LLC Adams County, Colorado Bring-Your-Own-Device Policy Prepared by: Colorado Independent Consultants Network, LLC Denver, Colorado March 20, 2014 Table of Contents

More information

Navigating the NIST Cybersecurity Framework

Navigating the NIST Cybersecurity Framework Navigating the NIST Cybersecurity Framework Explore the NIST Cybersecurity Framework and tools and processes needed for successful implementation. Abstract For federal agencies, addressing cybersecurity

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

The Emperor s New Clouds

The Emperor s New Clouds WHITEPAPER Author: Stuart James The Emperor s New Clouds Challenging cloud myths and misinformation Challenging cloud myths and misinformation Author: Stuart James If Cloud can be simply broken down into

More information

Dell s Transformation Final Assignment CNAS

Dell s Transformation Final Assignment CNAS Dell s Transformation Final Assignment CNAS A New Dell Emerges (2009-2012) Dell gets serious about ramping its solutions skills and capabilities with organic and inorganic investments in key intellectual

More information

How To Write A Mobile Device Policy

How To Write A Mobile Device Policy BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the

More information

Desktop Solutions SolutioWhitepaper

Desktop Solutions SolutioWhitepaper Author: Mike Herrmann With organizations looking for new ways to cut costs and increase productivity, the use of cloud computing has grown. The most common form of cloud computing is for vendors making

More information

VIRTUALIZATION: THE PUBLIC KNOWLEDGE GAP

VIRTUALIZATION: THE PUBLIC KNOWLEDGE GAP VIRTUALIZATION: THE PUBLIC KNOWLEDGE GAP A Cisco mconcierge Study July 2013 Executive Summary art 11 A group of Cisco partner firms commissioned a study to examine the working public s knowledge of desktop

More information

6 Things You Need to Know When Purchasing Service Lifecycle Management Software

6 Things You Need to Know When Purchasing Service Lifecycle Management Software 6 Things You Need to Know When Purchasing Service Lifecycle Management Software By: Michael R. Blumberg, CMC President Table of Contents 1. What to expect in the sales process?... 3 2. What to look for

More information

Managing and Automating Data Erasure for Mobile Devices: STRATEGIES FOR RECYCLERS AND IT ASSET DISPOSAL SPECIALISTS

Managing and Automating Data Erasure for Mobile Devices: STRATEGIES FOR RECYCLERS AND IT ASSET DISPOSAL SPECIALISTS Managing and Automating Data Erasure for Mobile Devices: STRATEGIES FOR RECYCLERS AND IT ASSET DISPOSAL SPECIALISTS Blancco White Paper Published 14 February 2013 Introduction Advanced mobile devices like

More information

Rossmoor Website SEO Tracking Sheet 2012-2014 Updated: April 1, 2014

Rossmoor Website SEO Tracking Sheet 2012-2014 Updated: April 1, 2014 As of 5/4/2012 As of 5/14/2012 active senior living no n/a active senior living no n/a adult golf community no n/a adult golf community no n/a 55+ community yes 8th 55+ community yes 8th retirement living

More information

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail.

That s why outsourcing using a Qualified Contractor is the best solution to the problem of assuring a compliant hard drive destruction audit trail. Why Zak Enterprises? Information contained on the hard drives of retired computers must be destroyed properly. Failure to do so can result in criminal penalties including fines and prison terms up to 20

More information

Secure Data Destruction

Secure Data Destruction Secure Data Destruction Secure Data Elimination (Degauss) Onsite Magnetic Degaussing service eliminates data from Tape and Magnetic Hard Disk media Portable machines allow for degaussing to be competed

More information

Vernon Turner Senior Vice President, Research

Vernon Turner Senior Vice President, Research Sustainability, Green IT and Climate Change Management. Bringing Together Opportunities Within ICT Vernon Turner Senior Vice President, Research Copyright 2009 IDC Reproduction is forbidden unless authorized.

More information

Why Endpoint Backup Is More Critical Than Ever

Why Endpoint Backup Is More Critical Than Ever A Custom Technology Adoption Profile Commissioned By Code42 April 2014 Why Endpoint Backup Is More Critical Than Ever Introduction The mobile mind shift is here, and as employees increasingly favor using

More information

The Software Experts. Training Courses and Events

The Software Experts. Training Courses and Events The Software Experts Training Courses and Events one HELPING UK ORGANISATIONS Ensure IT Compliance Education, Training & Development Many companies in the UK are finding that without accurate information

More information

The Power to Take Control of Software Assets

The Power to Take Control of Software Assets The Software Asset Management Specialists 781-569-0410 www.aid.com The Power to Take Control of Software Assets The Benefits of SAM: Building the case for Conducting a SAM Assessment and Implementing a

More information

The Power of the Platform

The Power of the Platform The Power of the Platform Cloud & Hosting Network Mobility 2 Technology Trends Reshaping Business Cloud Computing Amazing s That Change Our World Fast, Widespread Wireless/Wireline IP Networks Powerful

More information

CA Technologies saves $23 million through greater control of global IT assets

CA Technologies saves $23 million through greater control of global IT assets CUSTOMER SUCCESS STORY AUGUST 2015 CA Technologies saves $23 million through greater control of global IT assets CLIENT PROFILE Industry: Technology Company: CA Technologies Employees: 11,500 Revenue:

More information

Social Media and Sales Quota

Social Media and Sales Quota Social Media and Sales Quota The Impact of Social Media on Sales Quota and Corporate Revenue (A Research Report for B2B Companies) SOCIAL MEDIA & SALES QUOTAS 2 TABLE OF CONTENTS Executive Summary...3

More information

GETS AIRWATCH MDM HANDBOOK

GETS AIRWATCH MDM HANDBOOK GETS AIRWATCH MDM HANDBOOK October 2014 Abstract Using AirWatch, a mobile device management tool, within the public sector. GTA Product and Services Group EXECUTIVE SUMMARY.. 2 INTRODUCTION TO THE GETS

More information

RAIDERS OF THE LOST FILE SHARES: DEFENDING ENTERPRISE DATA AGAINST DESTRUCTIVE MALWARE

RAIDERS OF THE LOST FILE SHARES: DEFENDING ENTERPRISE DATA AGAINST DESTRUCTIVE MALWARE RAIDERS OF THE LOST FILE SHARES: DEFENDING ENTERPRISE DATA AGAINST DESTRUCTIVE MALWARE White Paper 2 Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware The game has

More information

Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch

Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch Enable a secure Digital Workspae in Your Enterprise Tuni Baraka Enterprise Account Executive VMware AirWatch 2016 VMware Inc. All rights reserved. A Leader in Enterprise Mobility Management & Security

More information

BMC Remedyforce Asset Management. Frequently Asked Questions

BMC Remedyforce Asset Management. Frequently Asked Questions BMC Remedyforce Frequently Asked Questions Table of Contents BMC Remedyforce 2 Overview 2 Frequently Asked Questions 2 Definitions 2 1. What is Configuration Management? 2 2. What is IT? 2 3. What is a

More information

Selecting an IT Asset Disposition Service Provider

Selecting an IT Asset Disposition Service Provider Research Publication Date: 12 December 2007 ID Number: G00154024 Selecting an IT Asset Disposition Service Provider Frances O'Brien Gartner has long recommended outsourcing the task of IT asset disposition

More information

Setting BYOD Policy: A New Partnership for IT and HR

Setting BYOD Policy: A New Partnership for IT and HR Introduction As the line between office and home life continues to blur, employees increasingly rely on their own smartphones, tablets, and laptop computers for work-related tasks. Today, more than 70

More information

Protecting Patient Data in the Cloud With DLP An Executive Whitepaper

Protecting Patient Data in the Cloud With DLP An Executive Whitepaper Protecting Patient Data in the Cloud With DLP An Executive Whitepaper. Overview Healthcare and associated medical record handling organizations have, for many years, been utilizing DLP, Data Loss Prevention

More information

Governance Takes A Central Role As Enterprises Shift To Mobile

Governance Takes A Central Role As Enterprises Shift To Mobile A Forrester Consulting Thought Leadership Paper Commissioned By Druva October 2014 Governance Takes A Central Role As Enterprises Shift To Mobile Table Of Contents Executive Summary... 1 Mobility Adds

More information

Cloud Backup and Recovery for Endpoint Devices

Cloud Backup and Recovery for Endpoint Devices Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,

More information

Practical Enterprise Mobility

Practical Enterprise Mobility Practical Enterprise Mobility Authored by Sponsored by Introduction In the traditional IT model of a few years ago, when the employees of a company needed to access an enterprise application or business

More information

Top Unified Communications Trends For Midsize Businesses

Top Unified Communications Trends For Midsize Businesses A Custom Technology Adoption Profile Commissioned By Cisco January 2014 Top Unified Communications Trends For Midsize Businesses 1 Introduction As the corporate landscape becomes increasingly mobile, and

More information

Best Practices for DLP Implementation in Healthcare Organizations

Best Practices for DLP Implementation in Healthcare Organizations Best Practices for DLP Implementation in Healthcare Organizations Healthcare organizations should follow 4 key stages when deploying data loss prevention solutions: 1) Understand Regulations and Technology

More information