Asset Recovery


TES provides a one-stop solution for decommissioning and retiring end-of-life IT equipment. Our solution manages all aspects of the process including transportation, identification, testing, repair, data sanitization, and value recovery. For customers that are also looking for a partner to handle the de-installations, we have a solution that efficiently removes, packages, and transports all manner of desktop IT and enterprise assets. We maintain complete control over the entire process to ensure absolute data security and maximum environmental sustainability.


img-asset-recovery-01TES will manage return logistics to its processing facilities by providing packaging, palletising, and secure transport for pick-ups. Transportation is an incredibly important part of the process as this is where most damage occurs and where sensitive data is the least secure.


Assets are documented at your facility and then remain secure throughout the transportation. Once they have arrived, our staff will unload the assets, take an inventory and pictures; comparing the items received to the record generated by the driver at the time of pickup. This secure / unbroken chain of custody is a critical part of the process and provides the peace of mind and audit trail required by the most security-conscious corporations.


img-asset-recovery-02From recovery through final disposition, TES has one of the most detailed audit and tracking packages in the industry. We track and record any hardware detail you request through our proprietary database and offer you a range of reporting options. This typically includes the serial number, asset tag number, asset type, make/model, and detailed unit configuration. All identifying labels, marks, asset tags and references to our customer are removed.


TES then uses scripted processes to test each asset. Functional tests checks for basic functionality and examines the unit for visual damage and missing components. Diagnostic tests discover the detailed hardware configuration and system functionality. For devices that need repair, TES has a regimented repair process designed to maximize values and support our environmental corporate objectives. The level of repair can vary by unit type, technology level, and condition. This decision tree is based around our deep experience in the secondary market and the market drivers that surround it.


img-asset-recovery-03The potential of a sensitive data escape represents a substantial risk to your organization. We have designed our service to protect the confidential nature of this data and to mitigate any risks in the asset recovery process. We offer options to erase data either at our facility when equipment is received or onsite at our customer’s premises.


  • The data overwrite is performed to exceed the NIST 800-88 standard (supersedes Department of Defense 5220-22-M standard) which is widely recognized by governments, OEMs, and global 2000 companies as the standard of measure; 5-pass and 7-pass overwrite options are also available.


  • This overwrite ensures that 100% of sectors are overwritten. Drives with damaged sectors that cannot be overwritten are removed and shredded.


  • Proof of successful completion of the data erasure is provided through a certificate of data destruction.


  • Process audits and third party audits are performed to ensure complete compliance.


img-asset-recovery-04To maximize your value recovery on retired assets, TES offers two key benefits. First, because of who our clients are and the quantities of assets we handle, we have greater access to global channels, expanding the sales options to generate return for our clients. Secondly, we take an integrated team approach, matching product and channel expertise to drive maximum value recovery. Our volume and scale provides a unique advantage; over the last decade TES has used this approach to develop a global marketplace of diverse buyers including resellers, retailers, brokers and overseas dealers.


TES’s extensive knowledge in remarketing IT equipment extends to desktop IT, enterprise servers, storage, and networking products. We are committed to ensuring we export quality working equipment and are selective with our remarketing channels, using reputable long term buyers who share our values with regards to the environment.


Constant organisational and staff changes often results in IT equipment lying around underutilised and being susceptible to theft or loss. TES’s IT redeployment program assists customers gain control of vagrant assets, extend refresh cycles, and ensures assets are fully utilised throughout their lifecycle. Our electronic inventory management system enables automatic identification of machines nominated as suitable for redeployment by make, model, condition and remaining lease term. We provide you with access to a pool of redeployment stock that is ready for order on demand, taking care of all the logistical challenges such as storage, testing, cleaning, repairs, reimaging, packaging for transport, and delivery to site.


Lease termination procedures can be complex and are often more costly than anticipated. TES provides a comprehensive end-of-lease lease management service that helps customers reduce lease costs:


  • Minimise lease cost overruns on equipment that is not being returned on time.


  • Reduce the cost of equipment buyouts on leased equipment that cannot be located.


  • Reduce faults and damage charges.


TES manages the entire end-of-lease service; we arrange collection from the site and then reconcile received equipment against our customer’s leased equipment register (separating owned and leased assets).