Tech-Recycle

Tech-Recycle

Tech-Recycle was formed to help companies and individuals securely, ethically and easily recycle their IT and office equipment.

We destroy all data passed to us safely and securely. Any erasable functioning media is wiped using a multipass binary overwipe. Any non-functioning or non-erasable media is physically destroyed. Whichever method is used, the data is completely and irretrievably eradicated.

Our destruction process meets or exceeds many internationally recognised standards including the Communications Electronics Security Group (CESG) Commercial Product Assurance (CPA), NATO CONFIDENTIAL, NATO RESTRICTED, NATO SECRET and COSMIC TOP SECRET, Defence INFOSEC Product Co-Operation Group UK (DIPCOG) and exceeding standards provided by the USA Department of Defense. A data destruction certificate is provided at the end of the process.

Contact Information

Directory of Suppliers

Tenable Network Security

Tenable Network Security

Tenable Network Security - Don't rely only on CVSS to prioritize. Use machine learning to predict what is most likely to be exploited.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

Thursday, August 20, 2020 - Join SANS and AWS Marketplace to learn the exercise of applying MITRE’s ATT&CK Matrix to the AWS Cloud and how to enhance threat detection and hunting in an AWS environment

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

WEBINAR: How to achieve security visibility at scale in the AWS Cloud

WEBINAR: How to achieve security visibility at scale in the AWS Cloud

Thursday August 27, 2020: Join SANS and AWS Marketplace to learn how you can leverage solutions to create visibility at scale and allow you to do more with your data and improve your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Truth Technologies Inc (TTI)

Truth Technologies Inc (TTI)

TTI is a premier provider of worldwide anti-money laundering, anti-fraud, customer identification, and compliance products and services.

Stott & May

Stott & May

Stott & May is a specialist cyber security recruitment agency.

CIRT.GY

CIRT.GY

CIRT-GY is the national Computer Incident Response Team for Guyana.

UgCERT

UgCERT

UgCERT is a national Computer Emergency Response Team for Uganda, operating under the Uganda Communications Commission.

Westermo Teleindustri

Westermo Teleindustri

Westermo designs and manufactures robust, resilient and secure data communications products for mission-critical industrial systems.

Sepio Systems

Sepio Systems

Sepio is a leader in the Rogue Device Mitigation (RDM) market, and the developer of Sepio Prime - a SaaS solution for protecting organizations from hardware based attacks and threats.

certSIGN

certSIGN

certSIGN develop innovative software for information security and information systems protection.

Technology Law Alliance (TLA)

Technology Law Alliance (TLA)

Technology Law Alliance is a specialist IT law firm focussed on the fields of technology, outsourcing and e-commerce.