Discover the highest-rated ITAD companies based on Gartner Peer Reviews. Explore top providers known for secure data disposal, compliance, and value recovery.

Navigate the complexities of IT asset retirement with guidance from our industry-certified specialists.
As an ITAD company highly rated by Gartner, we offer actionable insights on IT asset disposition, secure data destruction (including hard drive shredding), meeting R2v3, NAID AAA, and NIST compliance standards, sustainable electronics recycling, and maximizing IT equipment buyback value.
Protect your data, ensure regulatory adherence, and optimize your IT lifecycle with our expert support.
ITAD Strategy & Best Practices
Secure Data Destruction, Sanitization, & Hard Drive Shredding
ITAD Compliance & Certifications (e.g., R2, e-Stewards, NAID)
Sustainable E-waste & Electronics Recycling
Maximizing Value: IT Equipment Buyback & Remarketing
Discover the highest-rated ITAD companies based on Gartner Peer Reviews. Explore top providers known for secure data disposal, compliance, and value recovery.
ITAMG is the #1-rated IT asset disposition (ITAD) provider on Gartner. Learn why enterprises choose us for secure, compliant, and hassle-free ITAD services.
Table Of Contents The Imperative of Data Destruction for Hospital Data Security Navigating Data Destruction Regulations and Standards Data Destruction Techniques and Methods Implementing a Data Destruction Strategy in Hospitals Best Practices for Ongoing Data...
Table Of Contents What is data destruction? Why is data destruction important? What are the most common data destruction methods? Choosing the Right Method Benefits of using professional data destruction services Data destruction solutions by ITAMG Conclusion...
Table Of Contents What is a Data Destruction Certificate? Why is a Data Destruction Certificate Important? How do you Get a Data Destruction Certificate? How to ensure the integrity of the destruction process Frequently Asked Questions A data destruction certificate...
Table Of Contents Actions to take before donating your device Where can I donate my devices? Finding a reputable donation program The Added Value of Certified ITAD Providers Frequently Asked Questions Donating your old devices can make a significant impact on the...
Table Of Contents What Are the NIST 800-88 Guidelines? What Is Media Sanitization? Who Needs NIST 800-88? How Does the NIST 800-88 R1 Categorize Data? How Do You Decide on a Data Destruction Process? The Consequences of Inadequate Data Sanitization Partnering with...
Table Of Contents The Primary Data Destruction Methods The Pros and Cons of Each Data Destruction Method Tips on Choosing the Right Data Destruction Method Need help choosing the right data destruction method? Ask us! When planning an IT asset disposal project,...
We recently conducted a survey of 3,000 travelers to determine if they felt safe drinking the tap water in specific cities across the U.S. The results are illustrated below. Key Insights from the Survey: Distinct Taste Influencing Perception: Cities like New Orleans...
Back up data, wipe hard drives securely, remove sensitive components, sort materials, and choose a certified recycling partner to ensure legal compliance and data security. Key Takeaways: Recycling computers helps businesses reduce their environmental impact, conserve...
Safeguard data and the environment with smart IT asset disposal practices for businesses.
Create a decommissioning team, define objectives, audit assets, backup and sanitize data, ensure regulatory compliance, dismantle facilities, select ITAD vendors, and conduct a final audit. Key Takeaways: Data center decommissioning involves dismantling the facility...
E-waste contains harmful materials like lead and mercury, contributing to pollution and climate change. Global recycling rates are low, and proper disposal is crucial for environmental health. Key Takeaways: E-waste encompasses discarded electronic devices containing...
To maximize asset recovery value in data center decommissioning, strategically plan ITAD with market analysis, ensure data security, and leverage resale and recycling. Key Takeaways: Understanding the secondary market value of IT assets is crucial for maximizing...
The disposal of old IT equipment in a business is a collective responsibility involving the IT department, legal team, compliance officers, external vendors, and employees. However, it is important that the ultimate responsibility is assigned to a specific party and...
Table Of Contents The Foundations of Data Destruction The Need for Data Destruction Policies Understanding HIPAA and Data Destruction Requirements Navigating State and Federal Requirements Developing and Implementing a Data Destruction Policy Conclusion FAQ A data...
Master Service Agreements (MSAs) are not just contractual formalities; they are strategic tools tailored to meet the specific needs of clients. While standard components of an IT Asset Disposition (ITAD) MSA typically encompass asset pick-up, data destruction,...
Table Of Contents Key Factors to Consider When Choosing a Data Destruction Service Provider Certifications and Compliance: Ensuring Legal and Regulatory Adherence Data Destruction Methods and Processes Ensuring Security and Transparency Throughout the Destruction...
Computer liquidation is the process of selling off surplus or outdated IT assets for cash, focusing on financial return and environmental responsibility. Key Takeaways: Computer liquidation is a strategic process for businesses to convert surplus or outdated IT assets...
R2v3 is the latest standard for responsible electronics recycling, emphasizing data security, environmental health, and safety, developed by Sustainable Electronics Recycling International. Key Takeaways: R2v3 is the latest standard in IT asset disposition, focusing...
To ensure data integrity and access during data center decommissioning, implement meticulous planning, secure data backups, and adhere to strict data destruction protocols. Key Takeaways: Data center decommissioning requires meticulous planning to ensure data...
Shredded hard drives are reduced to tiny fragments, making data recovery an unreasonable endeavor. The waste remains are then recycled for precious metals and commodity recovery. Key Takeaways: Shredded hard drives are reduced to tiny particles, making data recovery...
IT Asset Disposition (ITAD) is the process of safely and efficiently retiring IT equipment, including data destruction, recycling, and remarketing, ensuring compliance and sustainability. Key Takeaways: IT Asset Disposition (ITAD) is a critical process for businesses...
Post-migration optimization in the cloud involves monitoring KPIs, fine-tuning performance, leveraging cloud-native tools, and balancing resources for cost-effective, efficient operations. Key Takeaways: Post-migration cloud optimization involves continuous monitoring...
Data center decommissioning case studies reveal that meticulous planning, compliance with data security laws, and project coordination are key to successful, secure, and eco-friendly project execution. Key Takeaways: Conducting a thorough site survey and comprehensive...
To overcome technical debt during cloud migration, assess and prioritize debt, adopt incremental modernization strategies, and leverage automation, re-platforming, and IT asset disposal. Key Takeaways: Assess and prioritize technical debt before cloud migration to...
Migrating to the cloud requires adapting Governance, Risk, and Compliance (GRC) strategies to address new risks, ensure compliance, and manage governance in a dynamic environment. Key Takeaways: Governance, Risk, and Compliance (GRC) must be integrated into the cloud...
As businesses look towards spring, the concept of cleaning out and refreshing becomes not just a personal endeavor but a critical business operation—especially when it comes to Information Technology Asset Disposition (ITAD). Regular IT asset refreshes and disposals...
Wondering how to navigate the complexities of IT asset disposal in your organization? This article simplifies the development of an IT asset disposal policy, directly addressing the protection of data, legal compliance, and financial integrity. Discover the steps to...
To record IT asset disposal, identify assets, choose disposal timing, document transactions, and adjust accounting records, ensuring legal compliance and data destruction. Key Takeaways: Properly identifying and timing the disposal of IT assets is crucial for...
Common business devices that become e-waste include printers, copiers, desktops, laptops, servers, smartphones, tablets, routers, switches, modems, and external hard drives. Key Takeaways: Office electronics such as printers, copiers, and fax machines often become...
The IT asset decommissioning process involves securely retiring IT equipment, ensuring data security, regulatory compliance, cost savings, and environmental responsibility. Key Takeaways: IT asset decommissioning is a critical phase in the lifecycle management of...
IT asset lifecycle management is crucial, not only for operational efficiency but also for environmental sustainability and data security. As we spring into a fresh season, it's an opportune time to reassess IT Asset Disposition (ITAD) strategies. The foundation...
IT Asset Disposition(ITAD) is the process of responsibly disposing of obsolete IT equipment, ensuring data security, legal compliance, and e-waste reduction. Key Takeaways: IT Asset Disposition (ITAD) is a comprehensive service for safely and responsibly disposing of...
Businesses should responsibly recycle computers to conserve resources, reduce emissions, and manage hazardous waste, enhancing brand image and meeting CSR goals. Key Takeaways: Recycling computers helps businesses conserve resources, reduce greenhouse gas emissions,...
Businesses generate e-waste, such as outdated computers, mobile devices, printers, and servers, which pose environmental, data security, and legal challenges. Effective e-waste management can offer economic benefits and enhance brand reputation. Key Takeaways:...
E-waste solutions include designing sustainable products, implementing take-back programs, choosing certified recyclers, and fostering a circular economy to minimize waste. Key Takeaways: E-waste, comprising discarded electronics with batteries or plugs, poses...
E-waste contains toxic chemicals and heavy metals that can cause organ damage, cancer, and immediate injuries like cuts and respiratory issues. Key Takeaways: E-waste contains harmful substances like lead, mercury, and cadmium, which can cause serious health issues...
E-waste poses serious environmental risks, releasing toxic chemicals and greenhouse gases, contaminating soil and water, and impacting human health and ecosystems. Key Takeaways: E-waste, consisting of discarded electronics like computers and smartphones, releases...
Quick Answer: E-waste recycling involves collecting, sorting, and processing discarded electronics to recover commodities and safely dispose of hazardous substances, essential for sustainable business operations. Key Takeaways: E-waste recycling is essential for...
Embracing sustainable IT Asset Disposition (ITAD) practices is more than a corporate responsibility—it's a crucial step towards safeguarding our planet. Best practices like a well-documented IT asset disposal program, ensuring electronic waste (e-Waste) is being...
The stability and security offered by long-term vendor relationships cannot be overstated. Master Service Agreements (MSAs) serve as key instruments in not just forging, but also future proofing these partnerships. MSAs go beyond mere contractual...
Master Service Agreements (MSAs) play a pivotal role in mitigating risks and ensuring compliance, acting as robust shields that protect customers and their ITAD providers. These agreements are meticulously designed to encompass a wide range of legal, operational, and...
Introduction to Master Service Agreements in ITAD In the realm of IT Asset Disposition (ITAD), the establishment of a clear and structured relationship between service providers and their clients is paramount. This is where Master Service Agreements (MSAs) come into...
Striking a balance between secure media destruction and promoting the circular economy is crucial. Achieving this equilibrium is not only about protecting sensitive data but also about contributing responsibly to environmental sustainability. How can organizations...
In an era where sustainability is no longer a choice but a necessity, the way we view and manage electronic waste (e-waste) is undergoing a fundamental shift. The rapid growth of e-waste calls for innovative approaches to e-waste management, steering us towards a more...
The digital revolution, while driving global progress, has inadvertently given rise to a burgeoning environmental challenge: electronic waste (e-waste). The rapid turnover of electronic devices, driven by constant technological advancements and consumer demand for the...
Talking about giving often sounds cliché or disingenuous. We've all heard about the importance of giving back countless times. However, the reason this message persists is rooted in the profound impact that giving can have on the lives of those in need. The good...
Environmental, Social, and Governance (ESG) goals are fundamental to shaping a sustainable and equitable future. The path to achieving these goals is multifaceted and requires innovative approaches. One of the most impactful steps a company can take is through the...
Access to technology is not just about staying connected; it's a lifeline to education, economic opportunities, and a brighter future. Yet, for many low-income families, this lifeline remains out of reach. The digital divide is a chasm that separates those with access...
Table Of Contents What is Data Destruction? Why is Data Destruction Important? How is Data Destroyed? Best Practices: Which Data Destruction Method is Right for You? How to Create a Data Destruction Policy? The Final Byte on Data Destruction Data Destruction FAQs...
When it comes to IT asset disposition (ITAD), trust is paramount. But where do you draw the line? There are two pivotal questions to ponder: Where is your line of demarcation? What influences the placement of that line? For many, this line is driven by either...
David Spark (@dspark), producer of CISO Series, guest co-host Shawn Bowen, CISO, Restaurant Brands International (RBI), and sponsored guest, Frank Milia, partner, IT Asset Management Group recently did a deep dive into data destruction on the Defense in Depth podcast:...
Last week the Department of the Treasury OCC levied a $60 million dollar fine to Morgan Stanley for data breaches that occurred from poorly managed IT asset disposition projects associated to data center decommissioning activities in 2016 and additional disposal...
We here at IT Asset Management Group (ITAMG) regularly come across regional organizations such as universities, hospitals, media companies and local banks that are engaged with disposal providers that ship their retired IT equipment several hundred or even a thousand...
As a NAID Certified Secure Destruction Specialist my goal is to offer information security and compliance professionals objective advice backed by experience, industry best practices and a keen knowledge of the applicable regulatory requirements. When working with...
Last week Arrow Electronics Inc. announced that it would be shutting the doors on its IT asset disposition service business leaving the industry dumbfounded and thousands of customers concerned with how to proceed with their day to day disposal requirements. Although...
When we fail in life, especially at our security, we tend to overreact and make quick and sweeping changes. If you leave your door open and your home is burglarized, moving out of your neighborhood or installing a state of the art security system may be an irrational...
It’s time your IT asset disposal program manager ditches a murky understanding of DoD data destruction(Department of Defense 5220.22-M) by adding a clearer understanding of the NIST 800-88 (National Institute of Standards and Technology 800-88 Guidelines for Media...
If your IT department generates valuable surplus computer equipment whether through a regular refresh project, office relocation, staff reduction or merger it will be helpful to understand how to bid out an IT asset disposal project to computer liquidators.We suggest...
Evaluating an IT liquidation provider to purchase your corporate IT equipment can be a difficult task to accomplish. There are a good deal of variables that can lead an IT manager down a path where he or she will be unable to accurately evaluate competitive...
Proper handling of end of life computer equipment and electronic media is critical to avoiding costly data breaches and debilitating exposures to your business and client data. Your options for hard drive disposal should not be limited by archaic security...
Many companies in the electronics recycling and IT asset disposal industry utilize scare tactics and try to focus a buyer’s attention on false narratives to win new clients and increase profitability of contracts. We believe in transparency and educating our clients....
At ITAMG we have been advising our clients on the big picture best practices for IT asset management, computer recycling, and secure data erasure. The following are five specific tips to help you make the most of your IT asset disposal program. 1) Communicate...
Part 2: Documenting a Site Visit to an IT Asset Disposal Service Provider In this second installment of best practices for vetting a disposal vendor and documenting a process for electronic waste disposition IT Asset Management Group (ITAMG) is advising organizations...
Part 1: Instituting a Master Service Agreement IT Asset Management Group (ITAMG) will be publishing multiple blog posts to prepare organizations for audits around computer equipment disposal, environmental compliance, and data security for end of life media and...
If your company’s end users rely on Windows XP you are probably aware that on April 8th, 2014 Microsoft support for XP will end. The reason for this decision is discussed in this post by Elephant Outlook “Microsoft to Windows XP User – Your Operating System is a Major...
Perhaps the most common question people ask IT Asset Management Group is how do we figure out what surplus IT equipment is worth? In order for ITAMG to provide our clients with bids, proposals, and projections for surplus and end of life computer equipment, we...
Here at IT Asset Management Group (a New York based IT asset disposal and data destruction provider) we are thrilled to be celebrating our fifteenth year in business. Since September of 1999 ITAMG has grown from our modest beginnings...
Government agencies, corporations, and various institutions are taking measures to improve IT asset management and disposition practices in order to mitigate risk of a data breach, achieve environmental initiatives, and ensure optimal financial performance. The...
Avid Star Trek fans and casual viewers alike probably agree that the show’s success is thanks to the moral and philosophical narratives that overshadow the fun science fiction, campy action, and special effects of the series. The above image is from NASA.GOV. ITAMG is...
The best place to start is the beginning of course, regardless if this is your first IT Asset Disposal (ITAD) project or your hundredth. An investment in knowledge pays the best interest and knowing the “Four Knows” can help return that interest for your surplus IT...
IT Asset Management Group (ITAMG), a leading provider of IT asset disposal, data destruction and electronics recycling services, has joined the EPEAT Champion program. EPEAT is the definitive global rating system for greener electronics. Becoming an EPEAT...
When it comes to recycling there is always room for improvement. From coast to coast exciting initiatives are taking root. On the east coast, in New York City, the Apartment Building Recycling Initiative is underway. Individuals living in NYC...
E-waste is on the rise and the impending result will impact us all. According to a USA Today article referencing a UN Study, “The mountain of refrigerators, cellphones, TV sets and other electrical waste disposed of annually worldwide is forecast to grow by a third by...
Project management is a critical component in any IT project yet end of life disposal process is often lacking the proper amount of attention. Proper IT disposal planning will minimize data security risks and cleanly close out the life cycle of computer equipment with...
What happens when end use computing, mobile devices and data center infrastructure reach the end of its useful life in the enterprise environment? It turns into a major business liability. Each week, vast amounts of hardware is discarded by corporations large and...
Growing up watching someone talk into their watch always looked pretty cool. Now with the Samsung Galaxy Gear that high-tech, talk into your watch age is here. Samsung has been winning praise for their ads which speak to that TV viewing audience. An article on...
Back in April, the ITAMG blog touched on what does a gigabit network really mean. 'Without these (data infrastructure) investments, the US will struggle to lead in the development of next generation internet applications." April 26th, 2013, ITAMG Our good friends...
“Don’t panic, it’s only a data breach.” Are those words that you would ever hear? Certainly not, because when there is a data breach while panic may not be the optimal reaction it more often than not is the reaction. A data breach can cause...
An IT Manager takes on a diverse role that encompasses technical challenges, analyzing information, staffing, conflict resolution, strategic planning, developing budgets, and even data center management. Both the technical and management components require your...
Ever hear of this thing called “big data”? It is hard to visualize reams of information and how to make them useful, especially when it comes to understanding all the different kinds of data breaches and industries most effected. Creative engineers and information...
ITAM stands for IT Asset Management, but there is often a lot of confusion when talking to vendors that name solutions after industry terms, let alone a a certain company that just so happens to be named IT Asset Management Group. All too often acronyms confuse...
The government, corporations, and citizens in the United States have a higher awareness than ever before for the necessity to properly recycle electronic waste. Although there have been positive results from educating and regulating the electronic waste producers,...
Would you believe that a large number of desktop virtualization projects get to roughly about 30% completion and then never reach production? An even greater number fall apart prior to even reaching a small scale pilot stage. What makes ITAMG an expert to even share a...
Written By Peter Fleming of Soundview IT Solutions In the middle of 2011 a Connecticut based hedge fund announced their founder was retiring and the fund would subsequently be closing its doors. Among the myriad of issues the hedge fund faced, one was...
For many businesses, information and hardware asset security has become a daily concern. IT Asset Management Group would like to highlight a chart from PricewaterhouseCoopers 15th annual Global State of Information Security® Survey that illustrates the statistical...