SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
SECURISSM
Secure IT Asset End of Life Solutions
Fall 2015
Securis Enterprise Customers
▪ US Airways
▪ Cerner Corporation
▪ Amtrak
▪ Boeing
▪ Airbus
▪ C.B. Richard Ellis
▪ Jones Lang LaSalle
▪ General Dynamics
▪ Navy Federal Credit Union
▪ Federal Department of Transportation
2
Core Strengths
Data Shredding
Mobile industrial shredder destroys computer hard drives, cell phones, back-up
tapes, DLT, LTO, and other data storage devices onsite with staff witness or off-
3site at our secure processing facility
Data Degaussing
Mobile State-of-the-art LM-4 degausser is specially designed to destroy large
quantities of magnetically-stored electronic media onsite at your facility with a
staff witness or off-site at our secure processing facility
Responsible E-waste Recycling & End of Life Disposition
Onsite removal service for recycling and resale of retired IT assets in compliance
with our Zero-Export, Zero-Landfill Policy
Chain of Custody Auditing & Reporting
Final documentation includes auditable inventory list of all IT assets that were
recycled or destroyed as well as a notarized Certificate of E-waste Recycling and
Destruction for your records
Development of Written Policies and Procedures
Ability to develop a professional corporate policy and procedure to protect from
liability and serve as a guideline when handling and destroying media
3
Chain of Custody Components
Ensure a Comprehensive, End-to-End Process to Ensure Zero Data Loss or Exposure
Components:
1. On-site inventory by serial number and corporate
identifying information stripped from equipment (i.e.
logos and company stickers)
2. Degaussing of magnetic data storage devices*
3. Shredding of data for security redundancy*
4. Resale of appropriate equipment
5. Domestic recycling of e-waste and shredded particles*
6. Delivery of nationally-recognized documentation of the
entire process
*As necessary per customer engagement
The Securis Mission
Improve the Environment & the Security of Our Clients’ Data by
Promoting Appropriate, Responsible and Secure IT Asset
Recycling & Destruction
Our IT Asset Auditing, Recycling & Destruction Services are:
✓ Leak-Proof. Data devices and IT assets are destroyed and recycled using a closed-loop
process.
✓ Certified. Certified by Defense Logistics Information Service to store and transport military
critical technical data, R2 Certified
✓ Reliable. Services meet or exceed industry standards set by NSA, NAID and DLA Logistics
Information Service
✓ Responsible. Compliant with NIST, NISP, HIPAA, FACTA, Gramm-Leach-Bliley and various
other state and federal compliance measures
✓ Flexible. Onsite or off-site e-waste recycling and data destruction services available
✓ Environmentally-friendly. 100% Zero-Export, Zero-Landfill policy
Securis
Data Destruction
Process
Secure Transport
Data DegaussingData Shredding
Domestic
Processing
Inventory
Scanning
Securis Compliance Profile
All of Securis’ processes and methods are in compliance with:
✓ Department of Defense (DOD)
✓ National Security Agency (NSA)
✓ National Institute of Standards and Technology (NIST) Special Publication Series 800-88
✓ National Industrial Security Program (NISP) Operating Manual (DOD 5220.22-M)
✓ Health Insurance Portability and Accountability Act (HIPAA)
✓ Health Information Technology for Economic and Clinical Health (HITECH)
✓ Sarbanes-Oxley Act of 2002
✓ Fair and Accurate Credit Transactions Act (FACTA)
✓ Gramm-Leach-Bliley Act
✓ Bank Secrecy Act
✓ Patriot Act of 2002
✓ Identity Theft and Assumption Deterrence Act
✓ US Safe Harbor Provisions
✓ FDA Security Regulations (21 C.F.R. part 11)
✓ PCI Data Security Standard
✓ Various state laws
7
Inventory and Reporting
Securis provides each client a detailed inventory list and Certificate of E-waste
Recycling and Data Destruction following the completion of the project.
8

Más contenido relacionado

La actualidad más candente

Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Blancco
 
Securus records management corporate presentation
Securus records management corporate presentation Securus records management corporate presentation
Securus records management corporate presentation Abhishek Upadhyay
 
scanning_&_digitisation_helpsheet_v2
scanning_&_digitisation_helpsheet_v2scanning_&_digitisation_helpsheet_v2
scanning_&_digitisation_helpsheet_v2Gaynor Deal
 
fieldcloud corporate overview and hardware product portfolio 2014
fieldcloud corporate overview and hardware product portfolio 2014fieldcloud corporate overview and hardware product portfolio 2014
fieldcloud corporate overview and hardware product portfolio 2014fieldcloud SAS
 
Dsi overview fema registration
Dsi overview fema registrationDsi overview fema registration
Dsi overview fema registrationDynamic Systems
 
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001ControlCase
 
Petro-Chemical
Petro-ChemicalPetro-Chemical
Petro-ChemicalMike Locke
 
Cloud: Should I Stay or Should I Go?
Cloud: Should I Stay or Should I Go?Cloud: Should I Stay or Should I Go?
Cloud: Should I Stay or Should I Go?Marcelo Martins
 
Executive Overview
Executive OverviewExecutive Overview
Executive Overviewmjordan100
 
Executive Overview
Executive OverviewExecutive Overview
Executive Overviewaaa0
 
Executive Overview
Executive OverviewExecutive Overview
Executive Overviewneprel
 
ControlCase Data Discovery and PCI DSS
ControlCase Data Discovery and PCI DSSControlCase Data Discovery and PCI DSS
ControlCase Data Discovery and PCI DSSControlCase
 
CASE STUDY: Hills Group Transformed by Virtualisation
CASE STUDY: Hills Group Transformed by VirtualisationCASE STUDY: Hills Group Transformed by Virtualisation
CASE STUDY: Hills Group Transformed by VirtualisationITS
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Securitybryanpsu
 

La actualidad más candente (16)

Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Data Sanitization: When, Why & How
Data Sanitization: When, Why & How
 
Securus records management corporate presentation
Securus records management corporate presentation Securus records management corporate presentation
Securus records management corporate presentation
 
scanning_&_digitisation_helpsheet_v2
scanning_&_digitisation_helpsheet_v2scanning_&_digitisation_helpsheet_v2
scanning_&_digitisation_helpsheet_v2
 
fieldcloud corporate overview and hardware product portfolio 2014
fieldcloud corporate overview and hardware product portfolio 2014fieldcloud corporate overview and hardware product portfolio 2014
fieldcloud corporate overview and hardware product portfolio 2014
 
NISO Webinar: RFID Systems in Libraries Part 1: An Introduction
NISO Webinar: RFID Systems in Libraries Part 1: An IntroductionNISO Webinar: RFID Systems in Libraries Part 1: An Introduction
NISO Webinar: RFID Systems in Libraries Part 1: An Introduction
 
Dsi overview fema registration
Dsi overview fema registrationDsi overview fema registration
Dsi overview fema registration
 
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
 
Petro-Chemical
Petro-ChemicalPetro-Chemical
Petro-Chemical
 
RW_RMS (english)
RW_RMS (english)RW_RMS (english)
RW_RMS (english)
 
Cloud: Should I Stay or Should I Go?
Cloud: Should I Stay or Should I Go?Cloud: Should I Stay or Should I Go?
Cloud: Should I Stay or Should I Go?
 
Executive Overview
Executive OverviewExecutive Overview
Executive Overview
 
Executive Overview
Executive OverviewExecutive Overview
Executive Overview
 
Executive Overview
Executive OverviewExecutive Overview
Executive Overview
 
ControlCase Data Discovery and PCI DSS
ControlCase Data Discovery and PCI DSSControlCase Data Discovery and PCI DSS
ControlCase Data Discovery and PCI DSS
 
CASE STUDY: Hills Group Transformed by Virtualisation
CASE STUDY: Hills Group Transformed by VirtualisationCASE STUDY: Hills Group Transformed by Virtualisation
CASE STUDY: Hills Group Transformed by Virtualisation
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Security
 

Destacado

Jos Breas - Nooit meer reorganiseren
Jos Breas - Nooit meer reorganiseren Jos Breas - Nooit meer reorganiseren
Jos Breas - Nooit meer reorganiseren WOW! Het kan anders
 
René Jansen - "Samenwerken: verstoppen of versterken?"
René Jansen - "Samenwerken: verstoppen of versterken?"René Jansen - "Samenwerken: verstoppen of versterken?"
René Jansen - "Samenwerken: verstoppen of versterken?"WOW! Het kan anders
 
Ton van der Greef - Exponentieel Groeien
Ton van der Greef - Exponentieel GroeienTon van der Greef - Exponentieel Groeien
Ton van der Greef - Exponentieel GroeienWOW! Het kan anders
 
Web services Overview in depth
Web services Overview in depthWeb services Overview in depth
Web services Overview in depthAbdulImrankhan7
 
Malik Safdar saharan marketing plan
Malik Safdar saharan marketing planMalik Safdar saharan marketing plan
Malik Safdar saharan marketing planmalik safdar
 
Patrick Davidson & Hans van der Loo - Maak van je team een powerhouse
Patrick Davidson & Hans van der Loo - Maak van je team een powerhousePatrick Davidson & Hans van der Loo - Maak van je team een powerhouse
Patrick Davidson & Hans van der Loo - Maak van je team een powerhouseWOW! Het kan anders
 
Burj al arab by oubaid majeed
Burj al arab by oubaid majeed Burj al arab by oubaid majeed
Burj al arab by oubaid majeed junaid bashir
 
2016 Update on sustainability in project management by Gilbert Silvius
2016 Update on sustainability in project management by Gilbert Silvius2016 Update on sustainability in project management by Gilbert Silvius
2016 Update on sustainability in project management by Gilbert SilviusGilbert Silvius
 

Destacado (13)

For each component
For each component For each component
For each component
 
Doc1
Doc1Doc1
Doc1
 
ABSTRACT_EN
ABSTRACT_ENABSTRACT_EN
ABSTRACT_EN
 
SABINA ZVINYATSKY-2015
SABINA ZVINYATSKY-2015SABINA ZVINYATSKY-2015
SABINA ZVINYATSKY-2015
 
Jos Breas - Nooit meer reorganiseren
Jos Breas - Nooit meer reorganiseren Jos Breas - Nooit meer reorganiseren
Jos Breas - Nooit meer reorganiseren
 
René Jansen - "Samenwerken: verstoppen of versterken?"
René Jansen - "Samenwerken: verstoppen of versterken?"René Jansen - "Samenwerken: verstoppen of versterken?"
René Jansen - "Samenwerken: verstoppen of versterken?"
 
robertcantrall
robertcantrallrobertcantrall
robertcantrall
 
Ton van der Greef - Exponentieel Groeien
Ton van der Greef - Exponentieel GroeienTon van der Greef - Exponentieel Groeien
Ton van der Greef - Exponentieel Groeien
 
Web services Overview in depth
Web services Overview in depthWeb services Overview in depth
Web services Overview in depth
 
Malik Safdar saharan marketing plan
Malik Safdar saharan marketing planMalik Safdar saharan marketing plan
Malik Safdar saharan marketing plan
 
Patrick Davidson & Hans van der Loo - Maak van je team een powerhouse
Patrick Davidson & Hans van der Loo - Maak van je team een powerhousePatrick Davidson & Hans van der Loo - Maak van je team een powerhouse
Patrick Davidson & Hans van der Loo - Maak van je team een powerhouse
 
Burj al arab by oubaid majeed
Burj al arab by oubaid majeed Burj al arab by oubaid majeed
Burj al arab by oubaid majeed
 
2016 Update on sustainability in project management by Gilbert Silvius
2016 Update on sustainability in project management by Gilbert Silvius2016 Update on sustainability in project management by Gilbert Silvius
2016 Update on sustainability in project management by Gilbert Silvius
 

Similar a Securis Sales Presentation-Policy Items for Al

Mohan Krishnan - Presentation.pdf
Mohan Krishnan - Presentation.pdfMohan Krishnan - Presentation.pdf
Mohan Krishnan - Presentation.pdfadeel bajwa
 
Trust in a Digital World
Trust in a Digital WorldTrust in a Digital World
Trust in a Digital Worlditnewsafrica
 
Smith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition OverviewSmith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition Overviewdfeldbaum
 
MatterPoint Overview
MatterPoint OverviewMatterPoint Overview
MatterPoint OverviewBob Rivas
 
It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009Diontealley
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementDiontealley
 
N2 s presentation building
N2 s presentation buildingN2 s presentation building
N2 s presentation buildingnetwork2supplies
 
Tag productos y servicios
Tag  productos y serviciosTag  productos y servicios
Tag productos y servicioswebanexo
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 
On site services flyer
On site services flyerOn site services flyer
On site services flyerkadarnell77
 
Smith cycle it asset disposition
Smith cycle it asset dispositionSmith cycle it asset disposition
Smith cycle it asset dispositionjaray014
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, RubrikVMUG IT
 
Secure Mde Brochure Doc
Secure Mde Brochure DocSecure Mde Brochure Doc
Secure Mde Brochure Docsuzette1
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsReal-Time Innovations (RTI)
 
Telaid: Technology Lifecycle Solutions
Telaid: Technology Lifecycle SolutionsTelaid: Technology Lifecycle Solutions
Telaid: Technology Lifecycle Solutionsajackson88
 

Similar a Securis Sales Presentation-Policy Items for Al (20)

Mohan Krishnan - Presentation.pdf
Mohan Krishnan - Presentation.pdfMohan Krishnan - Presentation.pdf
Mohan Krishnan - Presentation.pdf
 
Trust in a Digital World
Trust in a Digital WorldTrust in a Digital World
Trust in a Digital World
 
Smith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition OverviewSmith Cycle It Assest Disposition Overview
Smith Cycle It Assest Disposition Overview
 
MatterPoint Overview
MatterPoint OverviewMatterPoint Overview
MatterPoint Overview
 
It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. Statement
 
ARCOAsvc
ARCOAsvcARCOAsvc
ARCOAsvc
 
N2 s presentation building
N2 s presentation buildingN2 s presentation building
N2 s presentation building
 
Tag productos y servicios
Tag  productos y serviciosTag  productos y servicios
Tag productos y servicios
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
On site services flyer
On site services flyerOn site services flyer
On site services flyer
 
BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Smith cycle it asset disposition
Smith cycle it asset dispositionSmith cycle it asset disposition
Smith cycle it asset disposition
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Mercom Capabilities 2015.ppt
Mercom Capabilities 2015.pptMercom Capabilities 2015.ppt
Mercom Capabilities 2015.ppt
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
TES-AMM IT Asset Disposition Services
TES-AMM IT Asset Disposition ServicesTES-AMM IT Asset Disposition Services
TES-AMM IT Asset Disposition Services
 
Secure Mde Brochure Doc
Secure Mde Brochure DocSecure Mde Brochure Doc
Secure Mde Brochure Doc
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
 
Telaid: Technology Lifecycle Solutions
Telaid: Technology Lifecycle SolutionsTelaid: Technology Lifecycle Solutions
Telaid: Technology Lifecycle Solutions
 

Securis Sales Presentation-Policy Items for Al

  • 1. SECURISSM Secure IT Asset End of Life Solutions Fall 2015
  • 2. Securis Enterprise Customers ▪ US Airways ▪ Cerner Corporation ▪ Amtrak ▪ Boeing ▪ Airbus ▪ C.B. Richard Ellis ▪ Jones Lang LaSalle ▪ General Dynamics ▪ Navy Federal Credit Union ▪ Federal Department of Transportation 2
  • 3. Core Strengths Data Shredding Mobile industrial shredder destroys computer hard drives, cell phones, back-up tapes, DLT, LTO, and other data storage devices onsite with staff witness or off- 3site at our secure processing facility Data Degaussing Mobile State-of-the-art LM-4 degausser is specially designed to destroy large quantities of magnetically-stored electronic media onsite at your facility with a staff witness or off-site at our secure processing facility Responsible E-waste Recycling & End of Life Disposition Onsite removal service for recycling and resale of retired IT assets in compliance with our Zero-Export, Zero-Landfill Policy Chain of Custody Auditing & Reporting Final documentation includes auditable inventory list of all IT assets that were recycled or destroyed as well as a notarized Certificate of E-waste Recycling and Destruction for your records Development of Written Policies and Procedures Ability to develop a professional corporate policy and procedure to protect from liability and serve as a guideline when handling and destroying media 3
  • 4. Chain of Custody Components Ensure a Comprehensive, End-to-End Process to Ensure Zero Data Loss or Exposure Components: 1. On-site inventory by serial number and corporate identifying information stripped from equipment (i.e. logos and company stickers) 2. Degaussing of magnetic data storage devices* 3. Shredding of data for security redundancy* 4. Resale of appropriate equipment 5. Domestic recycling of e-waste and shredded particles* 6. Delivery of nationally-recognized documentation of the entire process *As necessary per customer engagement
  • 5. The Securis Mission Improve the Environment & the Security of Our Clients’ Data by Promoting Appropriate, Responsible and Secure IT Asset Recycling & Destruction Our IT Asset Auditing, Recycling & Destruction Services are: ✓ Leak-Proof. Data devices and IT assets are destroyed and recycled using a closed-loop process. ✓ Certified. Certified by Defense Logistics Information Service to store and transport military critical technical data, R2 Certified ✓ Reliable. Services meet or exceed industry standards set by NSA, NAID and DLA Logistics Information Service ✓ Responsible. Compliant with NIST, NISP, HIPAA, FACTA, Gramm-Leach-Bliley and various other state and federal compliance measures ✓ Flexible. Onsite or off-site e-waste recycling and data destruction services available ✓ Environmentally-friendly. 100% Zero-Export, Zero-Landfill policy
  • 6. Securis Data Destruction Process Secure Transport Data DegaussingData Shredding Domestic Processing Inventory Scanning
  • 7. Securis Compliance Profile All of Securis’ processes and methods are in compliance with: ✓ Department of Defense (DOD) ✓ National Security Agency (NSA) ✓ National Institute of Standards and Technology (NIST) Special Publication Series 800-88 ✓ National Industrial Security Program (NISP) Operating Manual (DOD 5220.22-M) ✓ Health Insurance Portability and Accountability Act (HIPAA) ✓ Health Information Technology for Economic and Clinical Health (HITECH) ✓ Sarbanes-Oxley Act of 2002 ✓ Fair and Accurate Credit Transactions Act (FACTA) ✓ Gramm-Leach-Bliley Act ✓ Bank Secrecy Act ✓ Patriot Act of 2002 ✓ Identity Theft and Assumption Deterrence Act ✓ US Safe Harbor Provisions ✓ FDA Security Regulations (21 C.F.R. part 11) ✓ PCI Data Security Standard ✓ Various state laws 7
  • 8. Inventory and Reporting Securis provides each client a detailed inventory list and Certificate of E-waste Recycling and Data Destruction following the completion of the project. 8