[vc_row type=”grid” video_bg=””][vc_column width=”1/2″ dp_animation=””][vc_column_text dp_animation=””]

TechR2 Mobile Device Wiping Assemblies have 64 bit, Intel Core I5 Wiping Computers with powered hubs along with individual cables for ease of hook up to each portable piece of equipment. Each
TechR2 technician can perform data erasure on many Android tablets or iOS mobile devices simultaneously.

The software erases all Android devices running OS V1.6 or higher software, all iOS Phone, iPod, iPad devices on the market and Blackberry and Windows Phone support on all models.[/vc_column_text][/vc_column][vc_column width=”1/2″ dp_animation=””][vc_column_text dp_animation=””]A report is generated for each device tested. A Certificate of Data Erasure is created for each device wiped successfully. The document shows:

  • Serial number with barcode
  • Time and date for the start and end time
  • Memory size
  • Manufacturer and model
  • Erasure method
  • Software version
  • Status

If a mobile device cannot be securely wiped, the device is dissembled with the case, screen, battery and printed circuit boards separated for recycling to the ISO 14001 standard. Electronic boards containing Solid State data storage integrated circuits are destroyed using a crusher that pulverizes the unit while simultaneously ejecting a damaging electrical charge rendering the low voltage components inoperable.

  • Pulverizes the circuit board and electrical components to miniature size
  • Ejects a damaging electrical charge rendering the low voltage components inoperable
  • Recycle the components to the ISO 14001 standard

[/vc_column_text][/vc_column][/vc_row][vc_row type=”grid” video_bg=”” row_type=”section” bg_image_repeat=”repeat” padding_top=”24″ padding_bottom=”24″][vc_column dp_animation=””][vc_separator][/vc_column][/vc_row][vc_row type=”grid” video_bg=””][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-left”][/vc_column][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-right”][/vc_column][/vc_row]

case studies

See More Case Studies

Datacenters are a cybersecurity target

I’m a recovering intelligence officer. I’m always a recovering intelligence officer for one trauma or another. And I’ve had the benefit, the pleasure, the honor to apply a lot of those skills I use in defense of our nation in the commercial section and in the commercial world as well, rising all the way to chief operating officer of a company that I thought was pretty obscure.

Learn more

Loss of data hurts everyone

Whether I’m a nation state targeting data, whether I’m a criminal enterprise targeting data, or a transnational organization targeting that, that data is valuable. And while it’s valuable to me, there is a negative externality to the people that I’m taking it from as well. It’s not a victimless crime, right?

Learn more

Datacenters are the obvious target

Anybody ever watch storage wars?
You can go on the dark web and buy drives like you were buying a storage unit. “I’ll give you a thousand dollars for that storage unit”. I know there’s got to be a couple thousand bucks worth of stuff in it. Your data out there is the same way.

Learn more
Contact us

Why risk it alone?
Get started today.

We’re happy to answer any questions you may have and help you determine which of our services best fit your needs.
Your benefits:
What happens next?
1

Schedule a call at your convenience

2

We do a discovery and consulting meeting 

3

We prepare a proposal 

Schedule a Free Consultation