The Guardian team recently flew back (and boy, are our arms tired) from the i-SIGMA (International Secure Information Governance & Management Association) National Conference and […]
April is the harbinger of Earth Day – a renewed and energetic effort toward environmental stewardship and community leadership. For many ITADs, VARs, resellers and
- Chain of Custody
- Compliance
- Data Destruction
- Guardian
- IT Packing & Logistics
- Processes & Procedures
- Secure Transport
How is data security enforced when you hand over IT assets for disposition? After all, you’re entrusting your data and your reputation to an outside service provider. Read these recommended guidelines to ensure the confidentiality, integrity and security of all data-bearing devices in their custody.
- Chain of Custody
- Data Destruction
- Events
- Guardian
- Industry News
- IT Packing & Logistics
- Processes & Procedures
- Secure Transport
John Shegerian of ERI helps businesses make wise choices about safeguarding data stored on IT assets and responsibly managing electronic reuse while protecting company and client privacy (a National Data Privacy Day focus).
- Chain of Custody
- Compliance
- Data Destruction
- Events
- Guardian
- Industry News
- IT Packing & Logistics
- Processes & Procedures
- Secure Transport
The first article in Data Privacy weeklong series focusing on enterprise IT concerns. Melissa Graham of SHI shares the questions you should be asking to keep your IT infrastructure both flexible and a fortress.
- Chain of Custody
- Data Destruction
- Events
- Guardian
- Industry News
- IT Asset Disposition
- IT Packing & Logistics
- Processes & Procedures
- Secure Transport
Most companies don’t think about their data privacy and data destruction as part of asset disposition until something goes wrong. Learn how to make data security a part of every day not just National Computer Security Day.
New services, custom solutions and project experiences to meet customer needs are the focus of Guardian’s new site South Hackensack, NJ, Oct 21, 2021 –
If your goal is to ensure that data doesn’t show up where it shouldn’t, these 15 essential factors for IT asset management and data destruction will help you develop a defensible data destruction policy and secure IT asset management process.
- Case Studies
- Chain of Custody
- Decommissioning
- Enterprise Data Center Services
- Equipment Migration
- IT Packing & Logistics
- Recycling
- Secure Transport
- White glove & EOL packing
The Client APEX Global Systems is a full-service IT management provider for nursing homes across the US. Their mission is to create, develop and support