Mobile shredding plant simplifies secure data destruction

1 November 2019 IT infrastructure

Companies no longer need to take unnecessary risks when disposing of their IT assets, they can now destroy digital data before it leaves their premises. With increasing data breaches across the globe, on-site data destruction is fast becoming the preferred method for IT asset disposal (ITAD).

Data destruction specialists like Xperien are helping companies proactively manage their digital data in their live environment as well as on retired assets. It offers a fully equipped, PoPI compliant on-site facility that provides companies with degaussing and data destruction services.

Xperien's on-site data destruction plant is the answer to portability and efficiency in data destruction; it allows for all the hard drive shredding to be performed at the client’s premises.

The mobile shredding plant can easily manage the physical shredding of 300 hard drives, 500 data tapes, USB sticks and up to 400 mobile phones per hour. It destroys and disposes of hard drives and all other electronic media devices, rendering them useless for data recovery.

Xperien ITAD expert Bridgette Vermaak says it does not only destroy data on site, it also provides services such as refurbishment, redeployment, resale and recycling. “Customers can rest assured that their IT assets will be securely and responsibly managed.”

“Data destruction requirements are constantly evolving and service providers need to adapt by investing in versatile equipment. The key advantage of our mobile facility is that it eliminates the need to provide a chain of custody for the client’s data because the truck comes to the client’s premises,” she explains.

"With our mobile shredding service, clients still receive the same quality assurances and unbeatable level of convenience and security they would normally receive from Xperien. More importantly, to ensure maximum security, Xperien provides video footage of shredding events and issues certificates for an audit trail,” she concludes.

For more information go to

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

AI and self-healing
Issue 7 2020 , IT infrastructure
Storage infrastructure that has in-built capacity as well as the ability to self-heal and self-tune is critical.

Understanding the need to secure your SD-WAN platform
Issue 7 2020 , IT infrastructure
SD-WAN functions need to be virtualised to keep up with evolving security threats and to control the cost of updating and upgrading security elements.

Software-defined everything
Issue 7 2020 , IT infrastructure
BCX prepares businesses for the future with the launch of its Multi Domain Software Defined Network, applying intent-based networking throughout the enterprise.

Beating the recessionary blues
Issue 6 2020 , IT infrastructure
Most companies are looking to eke out savings by sweating technology assets a bit longer and by trimming operating costs.

Designing a modern security network
Issue 6 2020, Regal Distributors SA , IT infrastructure
Traditionally security networks have served us well, but with the rapid advancements in technology it may be time to review the requirements for your security network.

Home-grown, cloud-based safety and security solutions
Residential Estate Security Handbook 2020 , IT infrastructure, Integrated Solutions
BeSecure has taken security and communications technologies and turned them into what is best described as care and safety solutions for the estate community in South Africa.

Bringing the wonders of fibre to your estate
Residential Estate Security Handbook 2020, Vox Telecom , IT infrastructure
The Hi-Tech Security Solutions’ Residential Security Conference in Durban was a magnificent event where Vox showcased its visitor management solution.

Protecting your electrical equipment
Residential Estate Security Handbook 2020, BFR Digital, PSS Distributors , IT infrastructure
Load shedding is a constant danger as the surges that occur when the lights come on cause damage to electronic equipment, including security equipment, unless it is protected.

Hunting for backdoors in counterfeit Cisco devices
Issue 5 2020 , IT infrastructure
F-Secure’s investigation highlights challenges facing organisations that discover counterfeit devices in their IT infrastructure.

5G brings immediate opportunities for SA
Issue 6 2020 , IT infrastructure
The recent launch of 5G technology in South Africa presents several highly attractive opportunities for consumers, carriers and industry at large.