Reduced CO2 this year, in kilo


Home » Security

IT security when reusing pre-owned IT equipment

It is one thing to be sure that your data is deleted, but it’s another to be sure that the process and everything surrounding it are secure.

If the machines are lost or stolen, it does not matter how thoroughly they have been deleted. Tier1 Asset therefore thinks in terms of a 360 degree security solution. We ensure that the customer does not have to think about anything other than entrusting the equipment to our certified employees. From there, the responsibility is ours. Once the equipment has been through our system, the customer receives a report that contains a process for audit.

Secure transport

All of the equipment that Tier1 Asset transports is driven in our own trucks by our own drivers.

At Tier1Asset there are no third parties. Therefore the uncertainty of lost and/or stolen equipment is minimized. Our employees pack and record all equipment when picking it up from the customer and again when they come back to our warehouse. This allows us to optimize security and minimize the risk of data leakage. Our trucks are also specially equipped to carry IT equipment. This expertise also minimizes transport damage, and damage in general, and optimizes the benefit to the customer!

Contact ourfor more information

Reporting - process documentation

A comprehensive overview of what each unit has gone through.

Reporting includes, among other things, documentation about the time, indication of all serial numbers and documentation that all data has been deleted, as well as which units have been destroyed in an environmentally responsible manner. It provides assurance that no data has been released and that none of the materials have a negative effect on the environment.

Book a pickup of used

Get a quote on installation and deployment

It’s cheaper than you think

As part of our services regarding the handling of used equipment, T1A also offers staging of your new hardware. Our solutions for staging includes:

• Installation of image
• Asset tag
• Logistics
• Deinstallation of your old equipment
• Install new equipment
• Project management and reporting
We have years of experience of handling small and large assignments.

Contact ourfor more information

The process in practice, step by step

  1. 1.

    We unpack and make sure that all cardboard, packaging and paper is discarded in an environmentally friendly manner.

  2. 2.
    We install Standard Image on all PCs so they are ready to be put to use.
  3. 3.
    We pack the old IT equipment up and make sure that it is packaged securely so waste is minimized.
  4. 4.
    We set up the new IT equipment and ensure that the machines are up and running.
  5. 5.
    We take the old IT equipment away and make sure that the data is 100% deleted.
  6. 6.
    We provide the best market price for the used IT equipment.
  7. 7.
    Deployment and set-up is really very simple, but there are many pitfalls that experience and set processes can eliminate.
  8. 8.
    The advantage of allowing us to be in charge of deployment and set-up is that it frees up a lot of resources in your IT department. Another advantage of using us is that we take the used IT equipment back and pay a price for it that can sometimes match the price of the set-up of the new equipment.

What we need to know:

What do we need to set up? Is it just the computer, or should there also be a new monitor? Does it need to be tested after set-up?

How much do we need to be in charge of? Is there anything that the customer will do himself?

Is it a single office, or all of the offices? Should it be over the weekend? Maybe after working hours?

Should Image be installed? Any special programs? Should the customer be able to control the application of Image?