SlideShare a Scribd company logo
1 of 8
SECURISSM
Secure IT Asset End of Life Solutions
Tuesday March 10th, 2015
Securis Enterprise Customers
 US Airways
 Cerner Corporation
 Amtrak
 Boeing
 Airbus
 C.B. Richard Ellis
 Jones Lang LaSalle
 General Dynamics
 Navy Federal Credit Union
 Federal Department of Transportation
2
Core Strengths
Data Shredding
Mobile industrial shredder destroys computer hard drives, cell phones, back-up
tapes, DLT, LTO, and other data storage devices onsite with staff witness or off-
3site at our secure processing facility
Data Degaussing
Mobile State-of-the-art LM-4 degausser is specially designed to destroy large
quantities of magnetically-stored electronic media onsite at your facility with a
staff witness or off-site at our secure processing facility
Responsible E-waste Recycling & End of Life Disposition
Onsite removal service for recycling and resale of retired IT assets in compliance
with our Zero-Export, Zero-Landfill Policy
Chain of Custody Auditing & Reporting
Final documentation includes auditable inventory list of all IT assets that were
recycled or destroyed as well as a notarized Certificate of E-waste Recycling and
Destruction for your records
Development of Written Policies and Procedures
Ability to develop a professional corporate policy and procedure to protect from
liability and serve as a guideline when handling and destroying media
3
Chain of Custody Components
Ensure a Comprehensive, End-to-End Process to Ensure Zero Data Loss or Exposure
Components:
1. On-site inventory by serial number and corporate
identifying information stripped from equipment (i.e.
logos and company stickers)
2. Degaussing of magnetic data storage devices*
3. Shredding of data for security redundancy*
4. Resale of appropriate equipment
5. Domestic recycling of e-waste and shredded particles*
6. Delivery of nationally-recognized documentation of the
entire process
*As necessary per customer engagement
The Securis Mission
Improve the Environment & the Security of Our Clients’ Data by
Promoting Appropriate, Responsible and Secure IT Asset
Recycling & Destruction
Our IT Asset Auditing, Recycling & Destruction Services are:
 Leak-Proof. Data devices and IT assets are destroyed and recycled using a closed-loop
process.
 Certified. Certified by Defense Logistics Information Service to store and transport military
critical technical data, R2 Certified
 Reliable. Services meet or exceed industry standards set by NSA, NAID and DLA Logistics
Information Service
 Responsible. Compliant with NIST, NISP, HIPAA, FACTA, Gramm-Leach-Bliley and various
other state and federal compliance measures
 Flexible. Onsite or off-site e-waste recycling and data destruction services available
 Environmentally-friendly. 100% Zero-Export, Zero-Landfill policy
Securis
Data Destruction
Process
Secure Transport
Data DegaussingData Shredding
Domestic
Processing
Inventory
Scanning
Securis Compliance Profile
All of Securis’ processes and methods are in compliance with:
 Department of Defense (DOD)
 National Security Agency (NSA)
 National Institute of Standards and Technology (NIST) Special Publication Series 800-88
 National Industrial Security Program (NISP) Operating Manual (DOD 5220.22-M)
 Health Insurance Portability and Accountability Act (HIPAA)
 Health Information Technology for Economic and Clinical Health (HITECH)
 Sarbanes-Oxley Act of 2002
 Fair and Accurate Credit Transactions Act (FACTA)
 Gramm-Leach-Bliley Act
 Bank Secrecy Act
 Patriot Act of 2002
 Identity Theft and Assumption Deterrence Act
 US Safe Harbor Provisions
 FDA Security Regulations (21 C.F.R. part 11)
 PCI Data Security Standard
 Various state laws
7
Inventory and Reporting
Securis provides each client a detailed inventory list and Certificate of E-waste
Recycling and Data Destruction following the completion of the project.
8

More Related Content

What's hot

Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Blancco
 
2016 RecordsTrust ® Brochure
2016 RecordsTrust ® Brochure2016 RecordsTrust ® Brochure
2016 RecordsTrust ® BrochurePeter Frix
 
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001ControlCase
 
EXTENT Conference: Lease of Dedicated Servers
EXTENT Conference: Lease of Dedicated ServersEXTENT Conference: Lease of Dedicated Servers
EXTENT Conference: Lease of Dedicated ServersIosif Itkin
 
ControlCase Data Discovery and PCI DSS
ControlCase Data Discovery and PCI DSSControlCase Data Discovery and PCI DSS
ControlCase Data Discovery and PCI DSSControlCase
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
SYNCOTEK Fixed-assets management RFID solution
SYNCOTEK Fixed-assets management RFID solutionSYNCOTEK Fixed-assets management RFID solution
SYNCOTEK Fixed-assets management RFID solutionLuna Leng
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationRichard Blech
 
Document digitization infographic
Document digitization infographicDocument digitization infographic
Document digitization infographicHeena Tandon
 
Disposition tracking overview
Disposition tracking overviewDisposition tracking overview
Disposition tracking overviewJustin Tinkle
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...ControlCase
 
Continual Compliance Monitoring
Continual Compliance MonitoringContinual Compliance Monitoring
Continual Compliance MonitoringKimberly Simon MBA
 

What's hot (18)

Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Data Sanitization: When, Why & How
Data Sanitization: When, Why & How
 
2016 RecordsTrust ® Brochure
2016 RecordsTrust ® Brochure2016 RecordsTrust ® Brochure
2016 RecordsTrust ® Brochure
 
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
 
EXTENT Conference: Lease of Dedicated Servers
EXTENT Conference: Lease of Dedicated ServersEXTENT Conference: Lease of Dedicated Servers
EXTENT Conference: Lease of Dedicated Servers
 
ControlCase Data Discovery and PCI DSS
ControlCase Data Discovery and PCI DSSControlCase Data Discovery and PCI DSS
ControlCase Data Discovery and PCI DSS
 
RW_RMS (english)
RW_RMS (english)RW_RMS (english)
RW_RMS (english)
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Data Security
Data SecurityData Security
Data Security
 
SYNCOTEK Fixed-assets management RFID solution
SYNCOTEK Fixed-assets management RFID solutionSYNCOTEK Fixed-assets management RFID solution
SYNCOTEK Fixed-assets management RFID solution
 
Secure Channels Financal Institution Presentation
Secure Channels Financal Institution PresentationSecure Channels Financal Institution Presentation
Secure Channels Financal Institution Presentation
 
Document digitization infographic
Document digitization infographicDocument digitization infographic
Document digitization infographic
 
Disposition tracking overview
Disposition tracking overviewDisposition tracking overview
Disposition tracking overview
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
 
Continual Compliance Monitoring
Continual Compliance MonitoringContinual Compliance Monitoring
Continual Compliance Monitoring
 
Data Backup and Storage
Data Backup and StorageData Backup and Storage
Data Backup and Storage
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
 

Viewers also liked

ICTFKIPUNSRI_SUWANTO
ICTFKIPUNSRI_SUWANTOICTFKIPUNSRI_SUWANTO
ICTFKIPUNSRI_SUWANTOsuwanto23
 
tư vấn bán đồng hồ casio đúng giá gốc
tư vấn bán đồng hồ casio đúng giá gốctư vấn bán đồng hồ casio đúng giá gốc
tư vấn bán đồng hồ casio đúng giá gốccletus172
 
Student Care Presentation
Student Care PresentationStudent Care Presentation
Student Care PresentationJaime Butler
 
Balcom Agency's Association of Fundraising Professionals Presentation
Balcom Agency's Association of Fundraising Professionals PresentationBalcom Agency's Association of Fundraising Professionals Presentation
Balcom Agency's Association of Fundraising Professionals PresentationBalcom Agency
 
Kira Mandon Portfolio 2015
Kira Mandon Portfolio 2015Kira Mandon Portfolio 2015
Kira Mandon Portfolio 2015Kira Mandon
 
{Forestory 森林小故事} 北科大互動設計系(大二)360 vr 說故事課程
{Forestory 森林小故事}   北科大互動設計系(大二)360 vr 說故事課程{Forestory 森林小故事}   北科大互動設計系(大二)360 vr 說故事課程
{Forestory 森林小故事} 北科大互動設計系(大二)360 vr 說故事課程羽筑 陳
 
Mexico drug gangs using more children as "mules"
Mexico drug gangs using more children as "mules"Mexico drug gangs using more children as "mules"
Mexico drug gangs using more children as "mules"voraciousaxle6709
 
Feresin Catina and Agostini Tiziano (2007)
Feresin Catina and Agostini Tiziano (2007)Feresin Catina and Agostini Tiziano (2007)
Feresin Catina and Agostini Tiziano (2007)Catina Feresin
 
Gebruikersvergoeding
GebruikersvergoedingGebruikersvergoeding
GebruikersvergoedingGagan Singh
 
Presentazione plitvice 2008
Presentazione plitvice 2008Presentazione plitvice 2008
Presentazione plitvice 2008Catina Feresin
 
Mangopear creative portfolio
Mangopear creative portfolioMangopear creative portfolio
Mangopear creative portfolioAndi North
 

Viewers also liked (14)

ICTFKIPUNSRI_SUWANTO
ICTFKIPUNSRI_SUWANTOICTFKIPUNSRI_SUWANTO
ICTFKIPUNSRI_SUWANTO
 
tư vấn bán đồng hồ casio đúng giá gốc
tư vấn bán đồng hồ casio đúng giá gốctư vấn bán đồng hồ casio đúng giá gốc
tư vấn bán đồng hồ casio đúng giá gốc
 
Student Care Presentation
Student Care PresentationStudent Care Presentation
Student Care Presentation
 
Balcom Agency's Association of Fundraising Professionals Presentation
Balcom Agency's Association of Fundraising Professionals PresentationBalcom Agency's Association of Fundraising Professionals Presentation
Balcom Agency's Association of Fundraising Professionals Presentation
 
Kira Mandon Portfolio 2015
Kira Mandon Portfolio 2015Kira Mandon Portfolio 2015
Kira Mandon Portfolio 2015
 
{Forestory 森林小故事} 北科大互動設計系(大二)360 vr 說故事課程
{Forestory 森林小故事}   北科大互動設計系(大二)360 vr 說故事課程{Forestory 森林小故事}   北科大互動設計系(大二)360 vr 說故事課程
{Forestory 森林小故事} 北科大互動設計系(大二)360 vr 說故事課程
 
Physical layer
Physical layerPhysical layer
Physical layer
 
Mexico drug gangs using more children as "mules"
Mexico drug gangs using more children as "mules"Mexico drug gangs using more children as "mules"
Mexico drug gangs using more children as "mules"
 
Feresin Catina and Agostini Tiziano (2007)
Feresin Catina and Agostini Tiziano (2007)Feresin Catina and Agostini Tiziano (2007)
Feresin Catina and Agostini Tiziano (2007)
 
Gebruikersvergoeding
GebruikersvergoedingGebruikersvergoeding
Gebruikersvergoeding
 
Presentazione plitvice 2008
Presentazione plitvice 2008Presentazione plitvice 2008
Presentazione plitvice 2008
 
FLIGHTS 1
FLIGHTS 1  FLIGHTS 1
FLIGHTS 1
 
Pdf obezzarazhivanie
Pdf obezzarazhivaniePdf obezzarazhivanie
Pdf obezzarazhivanie
 
Mangopear creative portfolio
Mangopear creative portfolioMangopear creative portfolio
Mangopear creative portfolio
 

Similar to Securis Sales Presentation-Policy Items for Al

Dunkle resume Info tech spec2
Dunkle resume Info tech spec2Dunkle resume Info tech spec2
Dunkle resume Info tech spec2david dunkle
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Securitydocomusa
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
 
Mohan Krishnan - Presentation.pdf
Mohan Krishnan - Presentation.pdfMohan Krishnan - Presentation.pdf
Mohan Krishnan - Presentation.pdfadeel bajwa
 
Trust in a Digital World
Trust in a Digital WorldTrust in a Digital World
Trust in a Digital Worlditnewsafrica
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) Karina Matos
 
It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009Diontealley
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementDiontealley
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptxTranVu383073
 
Otis osborne resume
Otis osborne resumeOtis osborne resume
Otis osborne resumeOtis Osborne
 
MatterPoint Overview
MatterPoint OverviewMatterPoint Overview
MatterPoint OverviewBob Rivas
 
UDT - Government and Healthcare
UDT - Government and HealthcareUDT - Government and Healthcare
UDT - Government and HealthcareTina Dominguez
 
Cml ii presentation
Cml ii presentationCml ii presentation
Cml ii presentationmwilding
 
Company Presentation
Company PresentationCompany Presentation
Company Presentationmwilding
 
The ITAD Works Capabilities WIR 059 Vr 3
The ITAD Works Capabilities WIR 059 Vr 3The ITAD Works Capabilities WIR 059 Vr 3
The ITAD Works Capabilities WIR 059 Vr 3Alexander Trocjuks
 
Cyber security event
Cyber security eventCyber security event
Cyber security eventTryzens
 
Secure Mde Brochure Doc
Secure Mde Brochure DocSecure Mde Brochure Doc
Secure Mde Brochure Docsuzette1
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsReal-Time Innovations (RTI)
 
Cml Presentation
Cml PresentationCml Presentation
Cml Presentationmwilding
 

Similar to Securis Sales Presentation-Policy Items for Al (20)

Dunkle resume Info tech spec2
Dunkle resume Info tech spec2Dunkle resume Info tech spec2
Dunkle resume Info tech spec2
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
Mohan Krishnan - Presentation.pdf
Mohan Krishnan - Presentation.pdfMohan Krishnan - Presentation.pdf
Mohan Krishnan - Presentation.pdf
 
Trust in a Digital World
Trust in a Digital WorldTrust in a Digital World
Trust in a Digital World
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. Statement
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Otis osborne resume
Otis osborne resumeOtis osborne resume
Otis osborne resume
 
MatterPoint Overview
MatterPoint OverviewMatterPoint Overview
MatterPoint Overview
 
UDT - Government and Healthcare
UDT - Government and HealthcareUDT - Government and Healthcare
UDT - Government and Healthcare
 
Cml ii presentation
Cml ii presentationCml ii presentation
Cml ii presentation
 
Company Presentation
Company PresentationCompany Presentation
Company Presentation
 
The ITAD Works Capabilities WIR 059 Vr 3
The ITAD Works Capabilities WIR 059 Vr 3The ITAD Works Capabilities WIR 059 Vr 3
The ITAD Works Capabilities WIR 059 Vr 3
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Secure Mde Brochure Doc
Secure Mde Brochure DocSecure Mde Brochure Doc
Secure Mde Brochure Doc
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
 
Cml Presentation
Cml PresentationCml Presentation
Cml Presentation
 

Securis Sales Presentation-Policy Items for Al

  • 1. SECURISSM Secure IT Asset End of Life Solutions Tuesday March 10th, 2015
  • 2. Securis Enterprise Customers  US Airways  Cerner Corporation  Amtrak  Boeing  Airbus  C.B. Richard Ellis  Jones Lang LaSalle  General Dynamics  Navy Federal Credit Union  Federal Department of Transportation 2
  • 3. Core Strengths Data Shredding Mobile industrial shredder destroys computer hard drives, cell phones, back-up tapes, DLT, LTO, and other data storage devices onsite with staff witness or off- 3site at our secure processing facility Data Degaussing Mobile State-of-the-art LM-4 degausser is specially designed to destroy large quantities of magnetically-stored electronic media onsite at your facility with a staff witness or off-site at our secure processing facility Responsible E-waste Recycling & End of Life Disposition Onsite removal service for recycling and resale of retired IT assets in compliance with our Zero-Export, Zero-Landfill Policy Chain of Custody Auditing & Reporting Final documentation includes auditable inventory list of all IT assets that were recycled or destroyed as well as a notarized Certificate of E-waste Recycling and Destruction for your records Development of Written Policies and Procedures Ability to develop a professional corporate policy and procedure to protect from liability and serve as a guideline when handling and destroying media 3
  • 4. Chain of Custody Components Ensure a Comprehensive, End-to-End Process to Ensure Zero Data Loss or Exposure Components: 1. On-site inventory by serial number and corporate identifying information stripped from equipment (i.e. logos and company stickers) 2. Degaussing of magnetic data storage devices* 3. Shredding of data for security redundancy* 4. Resale of appropriate equipment 5. Domestic recycling of e-waste and shredded particles* 6. Delivery of nationally-recognized documentation of the entire process *As necessary per customer engagement
  • 5. The Securis Mission Improve the Environment & the Security of Our Clients’ Data by Promoting Appropriate, Responsible and Secure IT Asset Recycling & Destruction Our IT Asset Auditing, Recycling & Destruction Services are:  Leak-Proof. Data devices and IT assets are destroyed and recycled using a closed-loop process.  Certified. Certified by Defense Logistics Information Service to store and transport military critical technical data, R2 Certified  Reliable. Services meet or exceed industry standards set by NSA, NAID and DLA Logistics Information Service  Responsible. Compliant with NIST, NISP, HIPAA, FACTA, Gramm-Leach-Bliley and various other state and federal compliance measures  Flexible. Onsite or off-site e-waste recycling and data destruction services available  Environmentally-friendly. 100% Zero-Export, Zero-Landfill policy
  • 6. Securis Data Destruction Process Secure Transport Data DegaussingData Shredding Domestic Processing Inventory Scanning
  • 7. Securis Compliance Profile All of Securis’ processes and methods are in compliance with:  Department of Defense (DOD)  National Security Agency (NSA)  National Institute of Standards and Technology (NIST) Special Publication Series 800-88  National Industrial Security Program (NISP) Operating Manual (DOD 5220.22-M)  Health Insurance Portability and Accountability Act (HIPAA)  Health Information Technology for Economic and Clinical Health (HITECH)  Sarbanes-Oxley Act of 2002  Fair and Accurate Credit Transactions Act (FACTA)  Gramm-Leach-Bliley Act  Bank Secrecy Act  Patriot Act of 2002  Identity Theft and Assumption Deterrence Act  US Safe Harbor Provisions  FDA Security Regulations (21 C.F.R. part 11)  PCI Data Security Standard  Various state laws 7
  • 8. Inventory and Reporting Securis provides each client a detailed inventory list and Certificate of E-waste Recycling and Data Destruction following the completion of the project. 8