May 09, 2016Many data breaches begin when hard drives are not properly destroyed, and the data is stolen. TechR2, a provider of onsite data-destruction and IT asset-retirement services, is placing metal tags on the data-bearing devices in the data center, capturing the device's serial number and location. When the hard drive is replaced, the RFID-tagged unit is placed within the locked TechR2 TAB Appliance for safe containment within the data center. The TAB App...
To continue reading this article, please log in or choose a purchase option.
Option 1: Become a Premium Member.
One-year subscription, unlimited access to Premium Content: $189
Gain access to all of our premium content and receive 10% off RFID Reports and RFID Events!
UPGRADE NOW, AND YOU'LL GET IMMEDIATE ACCESS TO:
- Case Studies
Our in-dept case-study articles show you, step by step, how early adopters assessed the business case for an application, piloted it and rolled out the technology.
Free Sample: How Cognizant Cut Costs by Deploying RFID to Track IT Assets
- Best Practices
The best way to avoid pitfalls is to know what best practices early adopters have already established. Our best practices have helped hundreds of companies do just that.
- How-To Articles
Don’t waste time trying to figure out how to RFID-enable a forklift, or deciding whether to use fixed or mobile readers. Our how-to articles provide practical advice and reliable answers to many implementation questions.
These informative articles focus on adoption issues, standards and other important trends in the RFID industry.
Free Sample: Europe Is Rolling Out RFID
- Magazine Articles
All RFID Journal Premium Subscribers receive our bimonthly RFID Journal print magazine at no extra cost, and also have access to the complete online archive of magazine articles from past years.
Become a member today!