Data Destruction Experts
Our unrivaled data destruction capabilities come from our investment in the latest generation high capacity shredding and wiping equipment with a dedicated onsite technical staff. We dont just destroy data, have onsite machining capablitties to ensure minimal downtime.
- All data securely transported to our facility
- Serial numbers logged for reporting
- All data immediately destroyed
- Certificate of destruction issued upon completion of shredding
Hard Drive Shredding
Our hard drive shredding capabilities are second to none. With 2 massive shredders and the ability to shred over 10,000 drives per hour, you can rest assured that every drive will be shredded the same day it enters our facility. In addition to our considerable shredding capacity, our shredders also cut your drives into small pieces that are less than half the size required by NAID / iSigma, the organazitions that oversee the certification of data destruction equipment.
Hard Drive Wiping
Some customers use our hard driving wiping service as an alternative to having their hard drives physically destroyed. Hard drive wiping ensures that all data on the drive is permanetly destroyed to Departent of Defense standards while maintaining the integrity of the drive. This means the drive can then be reused which offers value recovery for our customers while keeping their data secure.
Hard Drive Wiping Capabilities
- Wiping of both hard drives (HDD's) and solid state drives (SSD's)
- All interfaces are acceptable (SAS, SCSI, (P)ATA, SATA, mSATA, SAS, etc.)
- The ability to securely wipe over 200 drives at once
- Wiping to department of defense standards
- Drive integrity checks as well as remaining life checks are also done
Hard Drive Degaussing
Degaussing involves destroying a hard drives magnetic domain. The information is destroyed by passing any magnetic media through a powerful magnetic field to rearrange the polarity of the particles on the media, thereby completely removing any information that resembles any previously recorded data. For other forms of data storage like hard drives and some server backup tapes, degaussing renders the media completely unusable because of permanent damage to the file storage system. The field created by the degausser is so strong it permanently damages to the special servo control data that is written onto the media at the factory by the manufacturer.
Hard Drive Degaussing Capabilities
- Wiping of hard drives (HDD's) only, not SSD's
- All interfaces are acceptable (SAS, SCSI, (P)ATA, SATA, mSATA, SAS, etc.)
- The ability to securely degauss 10 drives/min
- Wiping to department of defense standards
Hard Drive Wiping
Some customers use our hard driving wiping service as an alternative to having their hard drives physically destroyed. Hard drive wiping ensures that all data on the drive is permanetly destroyed to Departent of Defense standards while maintaining the integrity of the drive. This means the drive can then be reused which offers value recovery for our customers while keeping their data secure.
Hard Drive Degaussing
Degaussing involves destroying a hard drives magnetic domain. The information is destroyed by passing any magnetic media through a powerful magnetic field to rearrange the polarity of the particles on the media, thereby completely removing any information that resembles any previously recorded data.
Welcome to Lexington's Computer & Electronics Recycling Center
Our recycling center is conveniently located in Lexington 5 minutes away from Rupp Arena and the University of Kentucky. Our central location makes dropping off any of your old and broken electronics hassle free. We also provide secure pickup and can handle full logistics to our customers all over the country.
Read MoreFull Service Recycling
From start to finish, we can handle all of your I.T. asset disposal, data destruction and recycling needs. We offer free secure hard drive shredding, recycling and refurbishing for all electronics to maximize your return on investment. We also have the ability to shred all your equipment to protect against theft of sensitive proprietary information.