RFID Journal LIVE! 2016SessionsPreventing Data Breaches With RFID

Preventing Data Breaches With RFID

Breakout Session
Many data breaches begin when hard drives are not properly destroyed, and the data is stolen. TechR2, a provider of onsite data-destruction and IT asset-retirement services, is placing metal tags on the data-bearing devices in the data center, capturing the device's serial number and location. When the hard drive is replaced, the RFID-tagged unit is placed within the locked TechR2 TAB Appliance for safe containment within the data center. The TAB Appliance has an RFID reader that captures the deposit and e-mails alerts regarding the movement of a data-bearing device, enabling customers to immediately become aware of any discrepancies.