Skip to content
Contact Us

IT asset disposition (ITAD) services

Whether it’s for a single location or multiple sites around the world, TES offers Information Technology Asset Disposition (ITAD) services to manage the entire lifecycle of your enterprise and corporate IT assets.

 

MORE ABOUT SUSTAINABLE ITAD SERVICES
ITAD_Hero (1)

Well-managed ITAD provides added value and mitigates risks inherent to retiring technology.

TES offers a single-source solution to retire and decommission your IT and data center equipment that has reached the end of its life. We manage all aspects of the technology lifecycle; including transportation, identification, testing, repair, data sanitization and value recovery. With our expertise, you can be assured that your IT assets will be handled efficiently and responsibly, from start to finish.

We are where you are!

We provide our customers with a seamless and consistent experience, regardless of where their assets are located worldwide. With over 40 owned and operated TES processing facilities worldwide, our truly global coverage gives our customers local support wherever they need us. 

What does this mean?

It means lower logistics costs and lower associated greenhouse gas (GHG) emissions. It means we have local compliance experts in-region and in-country, and a deep understanding of transboundary movement globally.  It means we can offer support in local time zones and languages (critical in global programs); consistency in service, reporting, pricing and values, billing in local currency – and more.

SPEAK WITH OUR EXPERTS

How ITAD works with TES

TES Process Flow Diagrams-white-ITAD2
Download

Globally consistent IT asset disposition from TES

Vehicle
LOGISTICS

TES handles return logistics to our global processing facilities. We provide packaging, palletizing and secure transportation. 

Reverse logistics is an important part of the ITAD process as we move products to recover value, but this is also where damage can occur and where sensitive data is the least secure.

Assets are documented at your facility and then remain secure throughout the logistics movement. Secure reverse logistics services from TES use owned vehicles and vetted third parties. Vehicles are hard-sided, GPS enabled, alarmed and bolt locked to ensure your equipment and data is secure. 

Once they’ve arrived, our staff will unload the assets, take an inventory and pictures; comparing the items received to the record generated by the driver at the time of collection. This secure and unbroken chain of custody provides the peace of mind and audit trail required by the most security-conscious corporations.

We leverage our large global footprint to deliver transportation solutions that reduce negative impact on the environment, while also improving the efficiency and security while your assets are being moved. 



SpareParts_Repair (1)
IDENTIFICATION, TESTING AND REPAIR

From recovery through final disposition, TES has one of the industry's most detailed audit and tracking packages

We track and record any hardware detail you request through our proprietary database and offer you a range of reporting options. This typically includes the serial number, asset tag number, asset type, make/model and detailed unit configuration. All identifying labels, marks, asset tags and references to our customer are removed.

TES then uses scripted processes to test each asset. Functional tests check for basic functionality and examines the unit for visual damage and missing components. Diagnostic tests discover the detailed hardware configuration and system functionality. For devices that need repair, TES has a regimented repair process designed to maximize values and support our environmental corporate objectives. The level of repair can vary by unit type, technology level and condition. This decision tree is based on our deep experience in the secondary market and the market drivers that surround it.



ITAD_DataDestruction (1)
DATA DESTRUCTION

The potential of a sensitive data escape represents a substantial risk to your organization

We’ve designed our service to protect the confidential nature of this data and to mitigate any risks in the asset recovery process.

We offer options to erase data either at our facility when equipment is received or onsite at our customer’s premises. 

  • The data overwrite is performed to exceed the NIST 800-88 standard which is widely recognized by governments, OEMs and global 2000 companies as the standard of measure
  • Most data is destroyed to NIST Purge standard, whenever technically possible. If unsuccessful or technically impossible NIST Clear standard is used. 
  • When NIST Purge and Clear are not possible, of if a client has specifically requested for security reasons NIST Destroy is implemented. 
  • This overwrite ensures 100% of sectors are overwritten. Drives with damaged sectors that cannot be overwritten are removed and shredded
  • Proof of successful completion of the data erasure is provided through a certificate of data destruction

Process audits and third-party audits are performed to ensure complete compliance. 



PowerBI Dashboard
ACCESS TO GLOBAL SALES CHANNELS

A physical presence in a local market means we understand the local market landscape well

We’re connected to the local e-commerce and retail outlets and we’re a few steps closer to the end-user sale – which ultimately generates higher returns for our clients and drives down the total cost of ownership. TES knows what different technology levels and types are priced at in 20+ countries which requires navigating local languages, cultures, regulations, time zones and more. This knowledge translates to knowing the right place to move products at the right time based on where pricing is the best. 

TES monitors asset values and pricing to optimize value recovery. Our proprietary software tracks differences in pricing across regions and buyers, monitors buyer activity and average retails prices. This enables us to set pricing standards, ensure we are selling to the right strata of buyers by category and prepare for market changes and pricing shifts. 

By not using an extensive partner network and not having to compensate them for doing the actual work, TES's IT Asset Management services can be more competitive in the fees we charge and the re-marketing proceeds we give back to our clients.



TES_Processes-4139
REDEPLOYMENT AND END-OF-LEASE MANAGEMENT

TES offers an IT redeployment program that helps you take control of idle assets, extend refresh cycles and ensure assets are fully utilized throughout their lifecycle

Instead of disposing of equipment, TES will identify opportunities to reuse corporate and enterprise technology assets within your company. The redeployment process involves a thorough assessment of the equipment to determine its functionality and compatibility with your organization's needs.

We offer refurbishment, reconfiguration and upgrade services to ensure that the equipment is in top working condition before it is redeployed, helping you to save money and extend the useful life of your IT equipment. 

For organizations leasing their equipment charges and overruns can be minimized with our comprehensive end-of-lease management service.



LOGISTICS
Vehicle

TES handles return logistics to our global processing facilities. We provide packaging, palletizing and secure transportation. 

Reverse logistics is an important part of the ITAD process as we move products to recover value, but this is also where damage can occur and where sensitive data is the least secure.

Assets are documented at your facility and then remain secure throughout the logistics movement. Secure reverse logistics services from TES use owned vehicles and vetted third parties. Vehicles are hard-sided, GPS enabled, alarmed and bolt locked to ensure your equipment and data is secure. 

Once they’ve arrived, our staff will unload the assets, take an inventory and pictures; comparing the items received to the record generated by the driver at the time of collection. This secure and unbroken chain of custody provides the peace of mind and audit trail required by the most security-conscious corporations.

We leverage our large global footprint to deliver transportation solutions that reduce negative impact on the environment, while also improving the efficiency and security while your assets are being moved. 

IDENTIFICATION, TESTING AND REPAIR
SpareParts_Repair (1)

From recovery through final disposition, TES has one of the industry's most detailed audit and tracking packages

We track and record any hardware detail you request through our proprietary database and offer you a range of reporting options. This typically includes the serial number, asset tag number, asset type, make/model and detailed unit configuration. All identifying labels, marks, asset tags and references to our customer are removed.

TES then uses scripted processes to test each asset. Functional tests check for basic functionality and examines the unit for visual damage and missing components. Diagnostic tests discover the detailed hardware configuration and system functionality. For devices that need repair, TES has a regimented repair process designed to maximize values and support our environmental corporate objectives. The level of repair can vary by unit type, technology level and condition. This decision tree is based on our deep experience in the secondary market and the market drivers that surround it.

DATA DESTRUCTION
ITAD_DataDestruction (1)

The potential of a sensitive data escape represents a substantial risk to your organization

We’ve designed our service to protect the confidential nature of this data and to mitigate any risks in the asset recovery process.

We offer options to erase data either at our facility when equipment is received or onsite at our customer’s premises. 

  • The data overwrite is performed to exceed the NIST 800-88 standard which is widely recognized by governments, OEMs and global 2000 companies as the standard of measure
  • Most data is destroyed to NIST Purge standard, whenever technically possible. If unsuccessful or technically impossible NIST Clear standard is used. 
  • When NIST Purge and Clear are not possible, of if a client has specifically requested for security reasons NIST Destroy is implemented. 
  • This overwrite ensures 100% of sectors are overwritten. Drives with damaged sectors that cannot be overwritten are removed and shredded
  • Proof of successful completion of the data erasure is provided through a certificate of data destruction

Process audits and third-party audits are performed to ensure complete compliance. 

ACCESS TO GLOBAL SALES CHANNELS
PowerBI Dashboard

A physical presence in a local market means we understand the local market landscape well

We’re connected to the local e-commerce and retail outlets and we’re a few steps closer to the end-user sale – which ultimately generates higher returns for our clients and drives down the total cost of ownership. TES knows what different technology levels and types are priced at in 20+ countries which requires navigating local languages, cultures, regulations, time zones and more. This knowledge translates to knowing the right place to move products at the right time based on where pricing is the best. 

TES monitors asset values and pricing to optimize value recovery. Our proprietary software tracks differences in pricing across regions and buyers, monitors buyer activity and average retails prices. This enables us to set pricing standards, ensure we are selling to the right strata of buyers by category and prepare for market changes and pricing shifts. 

By not using an extensive partner network and not having to compensate them for doing the actual work, TES's IT Asset Management services can be more competitive in the fees we charge and the re-marketing proceeds we give back to our clients.

REDEPLOYMENT AND END-OF-LEASE MANAGEMENT
TES_Processes-4139

TES offers an IT redeployment program that helps you take control of idle assets, extend refresh cycles and ensure assets are fully utilized throughout their lifecycle

Instead of disposing of equipment, TES will identify opportunities to reuse corporate and enterprise technology assets within your company. The redeployment process involves a thorough assessment of the equipment to determine its functionality and compatibility with your organization's needs.

We offer refurbishment, reconfiguration and upgrade services to ensure that the equipment is in top working condition before it is redeployed, helping you to save money and extend the useful life of your IT equipment. 

For organizations leasing their equipment charges and overruns can be minimized with our comprehensive end-of-lease management service.

CASE STUDY

By leveraging the circular economy, we deliver bottom line and environmental benefits

TES was able to manage all of the reverse logistics for a multinational client, including the collection, testing, data sanitization, disposition and value recovery of 90,000 assets; all within a 12-month period.



TECHNOLOGICAL TRANSFORMATION, A TES CASE STUDY

TES Sweden facility in the dark with TES logo lit up and snow on the ground.

Global Service, Local Experience

TES has the largest global reach of any ITAD provider in the industry, with over 40 sites, servicing our client needs in over 100 countries worldwide.

TES provides a international lifecycle management services with local experts situated in-region and in-country. We offer support in multiple languages and time zones, delivering consistency for global projects. 

EXPLORE OUR GLOBAL FACILITIES

SUSTAINABILITY

Closing the loop on technology use.

 

TES collaborates with our clients to create global ITAD programs that transform and repurpose IT equipment responsibly and sustainably. 

By extending the life of your assets and recovering valuable commodity materials you are contributing towards a sustainable and circular economy for technology.

 

FIND OUT MORE ABOUT SUSTAINABILITY

We take pride in being recognized as a leader in IT asset management and we are honoured to hold numerous industry awards. 

reuters-logo
edison-awards-logo
data-centre-world-logo
award
microsoft-auth-logo
channel-asia-logo
sinagapore-apex-logo
CRN UK Logo
GRI Community (1)

These recognitions demonstrate our commitment to sustainability, transparency, and ethical conduct and provide our clients with the assurance that they are partnering with a trusted and responsible company.



VIEW OUR AWARDS

Get the latest insights with TES resources 

Stay up to date with lifecycle recycling policies, procedures and best practices, latest initiatives, technologies and solutions.

resource placeholder ITAD data security compliance: How ITAD companies protect your data
ITAD data security compliance: How ITAD companies protect your data

With the digital age comes the necessity to store, manage and protect sensitive information. From...

resource placeholder NIST SP 800-88
NIST SP 800-88

In its 800-88 guidelines, NIST uses the terms “Clear,” “Purge,” and “Destroy” to refer to various...

resource placeholder Choosing the right ITAD company for your business
Choosing the right ITAD company for your business

When the time comes to replace or retire outdated technology, choosing the right ITAD (IT Asset...

resource placeholder What is my data center & enterprise IT equipment worth?
What is my data center & enterprise IT equipment worth?

Discover what your data center and enterprise IT equipment is worth.

ARE YOU READY TO MAKE A DIFFERENCE

 

Let's work together to create a more sustainable future!

 

CONTACT US