Company Logo

50 Innovators of the Year 2021

TechR2- Providing Comprehensive Data Bearing Device Security Solutions

TechR2- Providing Comprehensive Data Bearing Device Security Solutions

Value-added resellers exist because they represent an important distribution channel for manufacturers, particularly in the IT sector. Founded in 1997, TechR2 has revolutionized and modernized the media destruction industry. TechR2’s Tear-A-Byte® is a comprehensive, patented, media destruction process (Track-Contain-Destroy-Verify™). The process fully protects TechR2’s business partners from data breaches resulting from mismanaged loose data-bearing devices. TechR2 is backed by multiple ISO Certifications and also offers compliant risk assessment, auditing, decommissioning, and secure transport services to ensure their clients’ utmost protection. We had an interview with Sepp Rajaie, Founder of TechR2, to know more about the company. Here are a few important takeaways from the interview.

What are your strategies to remain at the front of your industry?

We know our industry. As subject matter experts and active members of legal, healthcare, financial services, retail, education, and banking industry associations, TechR2 is aware of the challenges its customers face in managing data-bearing assets and the unique requirements for each industry. As an ISO-certified company, we are required to look for and address any opportunities for improvement. TechR2 implements this proactive approach in its business.
TechR2’s core patented Tear-A-Byte® solution is unmatched in the industry and coupled with TechR2’s ISO 31000 compliant risk assessment, auditing, decommissioning, and secure transport services ensure the utmost protection of our clients. End of Life ISO 31000 risk assessment is essential to reveal and pinpoint a customer’s vulnerability and security weaknesses. This provides TechR2 the perfect opportunity to optimize value for brand protection and minimize brand compromise.

Educate us on Tear-A-Byte.

Tear-A-Byte® is TechR2’s comprehensive Track-Contain-Destroy-Verify™ patented process developed to fully protect its business partners from data breaches resulting from mismanaged loose data-bearing devices. Designed to fit permanently inside a designated and secure setting, Tear-A-Byte® provides the best security for controlling data and data-bearing devices once decommissioned. The Tear-A-Byte® process provides RFID IT asset tracking and inventory control; secure onsite device containment, onsite data sanitization; complete lifecycle management; and 100% customer control. The Tear-A-Byte® solution fully complies with international laws (e.g., GDPR), federal regulations (such as NIST, SOC, HIPAA, PCI, FERPA, and FFIEC), and state statutes including the California Privacy Act, New York Data Privacy Law, and Ohio Safe Harbor Act.

What is your environmental mission?

We believe in Zero Landfill Policy. Responsibility is something TechR2 does not take lightly, as it upholds its obligation to honor and protect the environment. TechR2 is ISO 14001 certified for its Environmental Health and Safety Systems. The company has honored its environmental mission for more than two decades, either by partnering with responsible R2 compliant recycling vendors downstream or repurposing retired assets to fulfill our zero-landfill policy or impacting the community through a donation to philanthropy of our customer’s choice. Responsible technology recycling is essential for end-of-life computer equipment. We keep a vigilant eye on the global technology life cycle and environmental culture to better understand and fulfill our role while maintaining optimum value for our clients. As stewards of the environment and students of sound business practices, we have developed strategic alliances with organizations that share our environmental goals. We constantly vet and manage our downstream vendors, ensuring that our mission is complete.

How do risk assessments help managers?

ISO 31000 Risk Assessments serve dual purposes: first, they identify weaknesses in an organization’s cybersecurity framework and, second, affords a safe harbor against liability for breach. The Act provides an affirmative defense to a lawsuit that alleges a data breach caused by a business’ failure to implement reasonable information security controls. One of the key components to establishing the defense is that the entity is operating under an industry-recognized cybersecurity framework. The culmination of a properly conducted risk assessment results in the creation of a cybersecurity program that is reflective of the size and complexity of the organization, the sensitivity of the information, and the resources and tools available to the entity.

What does techBOX service include, and how is it efficient?

For retired assets that do not contain critical data, the techBOX® is a perfect disposal solution and offers complete containment-to-disposal management. The flat rate includes containment, processing, transportation, recycling, and a detailed audit report with a Certificate of Destruction. techBOX® creates a secure, protected designated space for collecting and containing those recyclable assets that are not data bearing. It is effortless: TechR2 drops it off, the customer fills it up, and we pick up. The final disposition of the equipment will be to either reuse, resell or recycle in accordance with EPA and ISO 14001 guidelines.

Tell us something about onsite data wiping projects.

The Tear-A-Byte® (TAB) process is the best practice for onsite data eradication for data-bearing devices. Data wiping is only one of the three approved data destruction methods under NIST regulations: Degaussing, shredding, and wiping. All three methods of data destruction may be implemented in the TAB process. Which method we use depends upon the types of data-bearing devices that the customer wishes to decommission.

TechR2 System Engineers are dispatched to a customer’s facility when requested or scheduled to process the data-bearing devices either collected in the TAB appliance or for a decommission of a facility or as a result of a refresh of IT assets. There are various scenarios in which TechR2 would be onsite. At least two TechR2 System Engineers are present along with a verifier of the customer’s organization at all times. Once the data-bearing devices are accounted for per the TAB process, their data is then eradicated per the NIST regulations. This is again verified, and a certificate of destruction is immediately issued by TechR2 backed by Lloyd’s of London.

About the Founder

Sepp Rajaie is the Founder of TechR2. He has used his 35+ years of leadership experience in technology and data life cycle management to build the company’s strong foundation and core offering to drive growth & champion the business as asset management and data retention powerhouse. Mr. Rajaie immigrated to the United States as a student from Iran to pursue higher education and escape political persecution and unrest. 

Upon graduation in 1985, Mr. Rajaie embarked upon his career of entrepreneurialism by successfully building three multinational companies, after which he turned his attention to the technology industry. With an innovative mindset, Mr. Rajaie realized that the ITAD industry was susceptible to breaches. Out of concern for his clients and desire to seek change and improvement, he began to look at security regulations and developed his process, which is now patented (US Patent 9430654), which is the basis for TechR2’s Tear-A-Byte process. Even with the success of TechR2 being named an IBM Partnerworld Member offering its Tear-A-Byte process and solutions to IBM customers worldwide, Mr. Rajaie continues to seek improvements.

“TechR2 is the global leader in Media and data destruction with several patents in EOL storage compliance solutions.”

Business News

Recommended News

Most Featured Companies

ciobulletin-aatrix software.jpg ciobulletin-abbey research.jpg ciobulletin-anchin.jpg ciobulletin-croow.jpg ciobulletin-keystone employment group.jpg ciobulletin-opticwise.jpg ciobulletin-outstaffer.jpg ciobulletin-spotzer digital.jpg ciobulletin-virgin incentives.jpg ciobulletin-wool & water.jpg ciobulletin-archergrey.jpg ciobulletin-canon business process services.jpg ciobulletin-cellwine.jpg ciobulletin-digital commerce bank.jpg ciobulletin-epic golf club.jpg ciobulletin-frannexus.jpg ciobulletin-growth institute.jpg ciobulletin-implantica.jpg ciobulletin-kraftpal technologies.jpg ciobulletin-national retail solutions.jpg ciobulletin-pura.jpg ciobulletin-segra.jpg ciobulletin-the keith corporation.jpg ciobulletin-vivolor therapeutics inc.jpg ciobulletin-cox.jpg ciobulletin-lanner.jpg ciobulletin-neuro42.jpg ciobulletin-Susan Semmelmann Interiors.jpg ciobulletin-alpine distilling.jpg ciobulletin-association of black tax professionals.jpg ciobulletin-c2ro.jpg ciobulletin-envirotech vehicles inc.jpg ciobulletin-leafhouse financial.jpg ciobulletin-stormforge.jpg ciobulletin-tedco.jpg ciobulletin-transigma.jpg ciobulletin-retrain ai.jpg
ciobulletin-abacus semiconductor corporation.jpg ciobulletin-agape treatment center.jpg ciobulletin-cloud4wi.jpg ciobulletin-exponential ai.jpg ciobulletin-lexrock ai.jpg ciobulletin-otava.jpg ciobulletin-resecurity.jpg ciobulletin-suisse bank.jpg ciobulletin-wise digital partners.jpg ciobulletin-appranix.jpg ciobulletin-autoreimbursement.jpg ciobulletin-castle connolly.jpg ciobulletin-cgs.jpg ciobulletin-dth expeditors.jpg ciobulletin-form.jpg ciobulletin-geniova.jpg ciobulletin-hot spring it.jpg ciobulletin-kirkman.jpg ciobulletin-matrix applications.jpg ciobulletin-power hero.jpg ciobulletin-rittenhouse.jpg ciobulletin-stt logistics group.jpg ciobulletin-upstream works.jpg ciobulletin-x2engine.jpg ciobulletin-kastle.jpg ciobulletin-logix.jpg ciobulletin-preclinical safety (PCS) consultants ltd.jpg ciobulletin-xcastlabs.jpg ciobulletin-american battery solutions inc.jpg ciobulletin-book4time.jpg ciobulletin-d&l education solutions.jpg ciobulletin-good good natural sweeteners llc.jpg ciobulletin-sigmetrix.jpg ciobulletin-syncari.jpg ciobulletin-tier44 technologies.jpg ciobulletin-xaana.jpg

Latest Magazines

© 2024 CIO Bulletin Inc. All rights reserved.