SlideShare a Scribd company logo
As the nation’s largest independent broker-
dealer, we are constantly refreshing our
desktops, mobile devices and IT infrastructure
equipment...After careful consideration we
decided to work with Avritek, and we couldn’t be
more satisfied with their service
858-715-0950
IT Asset Disposition
Data Destruction
Technology Recycling
Logistics
Data Center Migrations
Facility Moves & Closures
IP Destruction
Equipment Remarketing
Direct Equipment Purchase
650 Gateway Center Way Suite I
San Diego CA, 92102 www.avritek.com
- Jeremy S. | Desktop Support Supervisor
S e r v i c e s
Comprehensive & Secure Data Destruction.
Onsite & offsite shredding, degaussing, & sanitization
IT Asset Removal & De-installation
Locked collection & transport bins, IT asset tag removal,
logistics coordination.
Chain of Custody IT Asset Auditing & Reporting
Asset serialization, inventory tracking, certificates of
destruction & recycling, waste diversion & LEED reporting
Responsible Electronics Recycling Services
Certified USA based downstream processors, no export
of hazardous materials
Compliance with Federal, State & Local Laws
HIPPA, HITECH, NIST 800-88r1, DoD, NSA, SOX, PCI
DSS & more
Secure Plant-based Facilities
Access control entry, 24/7 video & motion surveillance,
visitor escort
Experienced & Vetted Technicians
Prescreened employees, background checks, drug testing
S e r v i n g L i f e S c i e n c e , M e d i c a l , F i n a n c i a l , L e g a l , G o v e r n m e n t , E d u c a t i o n ,
M a n u f a c t u r i n g & C o r p o r a t e F a c i l i t i e s S i n c e 2 0 0 4
W h y A v r i t e k ?

More Related Content

Similar to Avritek Brochure

All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...
All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...
All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...
EC-Council
 
Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013
Federation for Identity and Cross-Credentialing Systems (FiXs)
 
The Incident Response Decision Tree
The Incident Response Decision TreeThe Incident Response Decision Tree
The Incident Response Decision Tree
Marc St-Pierre
 
Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)
Xerxes Oosthuizen
 
Few RFID security solutions concepts..
Few RFID security solutions concepts..Few RFID security solutions concepts..
Few RFID security solutions concepts..
Vineet M Srivastav
 
Acuent Security
Acuent Security Acuent Security
Acuent Security
Stephen Bates
 
Memory forensics and incident response
Memory forensics and incident responseMemory forensics and incident response
Memory forensics and incident response
London School of Cyber Security
 
Services Guide
Services GuideServices Guide
Services Guide
avanella
 
Blackwater Protection
Blackwater ProtectionBlackwater Protection
Blackwater Protection
Asdel Vazquez
 
Entire Presentation (W Tile Pages)
Entire Presentation (W Tile Pages)Entire Presentation (W Tile Pages)
Entire Presentation (W Tile Pages)
jeffm74
 
Intelligent Authentication
Intelligent AuthenticationIntelligent Authentication
Intelligent Authentication
CA Technologies
 
WOL White Paper: Better Safety & Security
WOL White Paper: Better Safety & SecurityWOL White Paper: Better Safety & Security
WOL White Paper: Better Safety & Security
Victoria Armstrong
 
Corporate Profile - V2.pptxsefsdfsdfdsfdsfrqwae21q4
Corporate Profile - V2.pptxsefsdfsdfdsfdsfrqwae21q4Corporate Profile - V2.pptxsefsdfsdfdsfdsfrqwae21q4
Corporate Profile - V2.pptxsefsdfsdfdsfdsfrqwae21q4
MuhammadFarjaam1
 
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Shawn Tuma
 
RFID Emergency Evacuation
RFID Emergency Evacuation RFID Emergency Evacuation
RFID Emergency Evacuation
wn393
 
IT Audit Career Path
IT Audit Career PathIT Audit Career Path
Open Nature Park Ops & Security Solutions
Open Nature Park Ops & Security SolutionsOpen Nature Park Ops & Security Solutions
Open Nature Park Ops & Security Solutions
koottummel
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
Leonardo Antichi
 
Horizon_Brochure
Horizon_BrochureHorizon_Brochure
Horizon_Brochure
Omar Tarish
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Amazon Web Services
 

Similar to Avritek Brochure (20)

All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...
All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...
All Your Base Still Belong To Us Physical Penetration Testing Tales From The ...
 
Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013Widepoint orc thales webinar 111313d - nov 2013
Widepoint orc thales webinar 111313d - nov 2013
 
The Incident Response Decision Tree
The Incident Response Decision TreeThe Incident Response Decision Tree
The Incident Response Decision Tree
 
Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)Lenro Company Profile 2016.1 (1)
Lenro Company Profile 2016.1 (1)
 
Few RFID security solutions concepts..
Few RFID security solutions concepts..Few RFID security solutions concepts..
Few RFID security solutions concepts..
 
Acuent Security
Acuent Security Acuent Security
Acuent Security
 
Memory forensics and incident response
Memory forensics and incident responseMemory forensics and incident response
Memory forensics and incident response
 
Services Guide
Services GuideServices Guide
Services Guide
 
Blackwater Protection
Blackwater ProtectionBlackwater Protection
Blackwater Protection
 
Entire Presentation (W Tile Pages)
Entire Presentation (W Tile Pages)Entire Presentation (W Tile Pages)
Entire Presentation (W Tile Pages)
 
Intelligent Authentication
Intelligent AuthenticationIntelligent Authentication
Intelligent Authentication
 
WOL White Paper: Better Safety & Security
WOL White Paper: Better Safety & SecurityWOL White Paper: Better Safety & Security
WOL White Paper: Better Safety & Security
 
Corporate Profile - V2.pptxsefsdfsdfdsfdsfrqwae21q4
Corporate Profile - V2.pptxsefsdfsdfdsfdsfrqwae21q4Corporate Profile - V2.pptxsefsdfsdfdsfdsfrqwae21q4
Corporate Profile - V2.pptxsefsdfsdfdsfdsfrqwae21q4
 
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...Why Your Organization Must Have a Cyber Risk Management Program and How to De...
Why Your Organization Must Have a Cyber Risk Management Program and How to De...
 
RFID Emergency Evacuation
RFID Emergency Evacuation RFID Emergency Evacuation
RFID Emergency Evacuation
 
IT Audit Career Path
IT Audit Career PathIT Audit Career Path
IT Audit Career Path
 
Open Nature Park Ops & Security Solutions
Open Nature Park Ops & Security SolutionsOpen Nature Park Ops & Security Solutions
Open Nature Park Ops & Security Solutions
 
Behavioral biometrics
Behavioral biometricsBehavioral biometrics
Behavioral biometrics
 
Horizon_Brochure
Horizon_BrochureHorizon_Brochure
Horizon_Brochure
 
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
Secure Your Edge-to-Cloud IoT Solution with Intel and AWS - IOT337 - re:Inven...
 

Avritek Brochure

  • 1. As the nation’s largest independent broker- dealer, we are constantly refreshing our desktops, mobile devices and IT infrastructure equipment...After careful consideration we decided to work with Avritek, and we couldn’t be more satisfied with their service 858-715-0950 IT Asset Disposition Data Destruction Technology Recycling Logistics Data Center Migrations Facility Moves & Closures IP Destruction Equipment Remarketing Direct Equipment Purchase 650 Gateway Center Way Suite I San Diego CA, 92102 www.avritek.com - Jeremy S. | Desktop Support Supervisor S e r v i c e s
  • 2. Comprehensive & Secure Data Destruction. Onsite & offsite shredding, degaussing, & sanitization IT Asset Removal & De-installation Locked collection & transport bins, IT asset tag removal, logistics coordination. Chain of Custody IT Asset Auditing & Reporting Asset serialization, inventory tracking, certificates of destruction & recycling, waste diversion & LEED reporting Responsible Electronics Recycling Services Certified USA based downstream processors, no export of hazardous materials Compliance with Federal, State & Local Laws HIPPA, HITECH, NIST 800-88r1, DoD, NSA, SOX, PCI DSS & more Secure Plant-based Facilities Access control entry, 24/7 video & motion surveillance, visitor escort Experienced & Vetted Technicians Prescreened employees, background checks, drug testing S e r v i n g L i f e S c i e n c e , M e d i c a l , F i n a n c i a l , L e g a l , G o v e r n m e n t , E d u c a t i o n , M a n u f a c t u r i n g & C o r p o r a t e F a c i l i t i e s S i n c e 2 0 0 4 W h y A v r i t e k ?