Secure, Simplified
Decommissioning
for Every Project
With OceanTech, each decommissioning project is crafted to exceed expectations, from the initial plan to the final asset disposition.
UnparalleledData Security
When data storage media is sold, transferred, or recycled, it is important to ensure that all data contained on these devices is eliminated. We offer a secure chain of custody for the transportation of equipment back to our facility where certified data destruction is performed. All proprietary labeling and asset tags are removed from all equipment to protect the privacy of our clients.
All media destruction is performed by our trained and qualified staff in our state-of-the-art data destruction lab. Our lab is a secure enclosure that is under video surveillance and can only be accessed by select staff members of OceanTech, ensuring the highest measure of safety for your data until it is entirely destroyed.
UnparalleledData Security
When data storage media is sold, transferred, or recycled, it is important to ensure that all data contained on these devices is eliminated. We offer a secure chain of custody for the transportation of equipment back to our facility where certified data destruction is performed. All proprietary labeling and asset tags are removed from all equipment to protect the privacy of our clients.
All media destruction is performed by our trained and qualified staff in our state-of-the-art data destruction lab. Our lab is a secure enclosure that is under video surveillance and can only be accessed by select staff members of OceanTech, ensuring the highest measure of safety for your data until it is entirely destroyed.
Data Erasure Standards
NIST 800-88r1 Clear
U.S. Air Force System Security Instruction 5020
Gutmann AII
Russian GOST-R 50739-95
Pfitzner Algorithm
Gutmann MFM
British HMG Infosec Standard 5, Enhanced Standard
Canada RCMP TSSIT OPS-II
U.S. Department of Defense 5220.22-M
Gutmann RLL 1,7
U.S. Navy Staff Office Publication NAVSO P-5239-26
Schneier's Algorithm
U.S. Department of Defense 5220.28-STD
Gutmann RLL 2,7
Pfitzner Algorithm
Germany VSITR
AmplifyingReturns
Our IT asset recovery experts will assist in determining the maximum value of all retired assets and return value as credit to you.
Committed Responsibility
Dependable Excellence
How it Works
Planning
Define scope, timelines, and budget. Identify stakeholders and establish a project management team.
Planning
Define scope, timelines, and budget. Identify stakeholders and establish a project management team.
Contact Us