Really… What Are ITAD Services?


CCNY Tech provides a wide range of ITAD services. We serve customers in a variety of ways, throughout the lifecycle of their equipment. For some companies, we perform “cradle to grave” type services. We begin with the delivery and installation of IT equipment, we maintain it throughout its use, and we decommission and remove it at the end. The process ends in remarketing or recycling retired assets, and once again supplying new equipment or upgrades.

The 6 Step Process of ITAD Services at CCNY Tech


fReceive, Tag, and Inventory Devices

ReceivingCCNY Tech will receive and record invoice information, model, configuration, MAC address (wired and Wi-Fi), and serial number into inventory spreadsheets.

Asset Tagging – CCNY Tech will remove each asset from its packaging and place an asset tag physically on the device. CCNY will also record asset numbers on the outside of device packaging.

Repack and Storage – CCNY Tech will re-pack and place device into inventory as “Ready for Deployment” and will store the asset in a designated client inventory locked cage on-site.

Transport – CCNY Tech will deliver the “Ready for Deployment” asset per the client’s request during the hours of 9AM to 5PM, Monday through Friday. Minimum of 10 devices per delivery.

Processing of Retired Assets
Refurbished Asset – CCNY will pick up retired assets per client request and fully refurbish for resale or process as E-waste if there is no resale value. All client information will be removed from each device and a DOD wipe of any hard drives will be performed.

Remarket Retired Asset – CCNY Tech will remarket assets to our customer user base to maximize returns. Each device will be processed for reuse or recycling, and all profits split with the client. As each asset is sold it will be added to a Purchase Order Report. Monies due to the client will be paid on a monthly basis with all accounts being settled up by the end of each calendar year.

If your company or organization are looking to upgrade or decommission servers, storage or networking equipment, CCNY Tech has the best solution to keep your data secure, help the environment, and perhaps make you some cash for your “no longer needed” IT gear. Give us a call at 1-800-566-4786 and speak to an IT specialist about IT Asset Disposition Services from CCNY Tech.

By Ron Pasquarelli

CCNY Tech has a variety of products from some of the top names in the industry! We supply servers, networking, and storage equipment, along with custom configurations. Check out our site or call our team to learn more about our products and services! Visit Website

Protecting Your Sensitive Data With ITAD (IT Asset Disposition)

While there are many important aspects of IT Asset Disposition, arguably the most important is the protection of sensitive data. Proprietary information, personal customer data, and other forms of data that need to remain confidential are under constant threat from cyber criminals. Time after time, there is yet another company making headlines for a breach in their network resulting in critical data being compromised and ending up in the wrong hands. The stories of sophisticated, coordinated attacks are all too familiar for any systems administrator, but there is a much simpler way for breaches to occur that may be overlooked; a hard drive containing this sensitive material is physically stolen.

When a device has outlived its usefulness, the next step is to send it off for recycling. But, what if this device still contains sensitive data? How do you assure that wherever this drive ends up, your data will not be going with it?

With this in mind, CCNY Tech is proud to unveil our new drive erasure program. Utilizing Extreme Protocol Solutions, flagship Enterprise Data Erasure Software (XErase) CCNY Tech provides high bandwidth, multi-protocol data sanitization compliant with over a dozen globally recognized erasure standards. A few of the key features of our new program include:

Tamper Proof Reporting (PDF, DATABASE)
Versatile Reporting Options (PDF, XML, CSV, TXT, DATABASE)
Over 35 Erasure and Validation Options
On the fly erasure method creation
Erase to any requirement
NIST Verification Support
SSD Erasure Support
Pre and Post Device Health Screening

XErase provided CCNY Tech the flexibility to meet the requirements of clients in a wide array of industries.  To learn more about ITAD and Removal of Sensitive Data, call us today at 1-800-566-4786 to speak with one of our reps to come up with a plan to protect your data!

Written By:  Mike Buffa, CCNY Tech


CCNY Tech has a variety of products from some of the top names in the industry! We supply servers, networking, and storage equipment, along with custom configurations. Check out our site or call our team to learn more about our products and services! Visit Website

Cost Friendly Server Options From Fujitsu

The Fujitsu SPARC M10 server is making a name for itself in datacenters everywhere. The M10 model’s popularity is no surprise considering its reputable Oracle Solaris operating system and reliable Fujitsu hardware. This server was designed for ease-of-use and cost friendly solutions for IT managers. The significance of this model is its consolidation of previous SPARC servers. It is a space-saving replacement for the SPARC Enterprise M3000 and the Sun Fire V880. It maintains the same power, speed, and capacity in a sleek, user-friendly design. Not only does the M10 simplify in terms of rack space, it is also an energy-conscious machine. The operating costs of this server are far less than its predecessors, but the performance is equally as impressive.

The Fujitsu M10 offers a range of features, including virtualization capabilities. The high performance server is equipped to handle large workloads and is flexible in configurations.The 1u server is designed for low cost of ownership and efficient use of resources.

Scales up to 16 cores
Integration and Virtualization capabilities
Space-saving design
Power-Saving features
Firmware updates during system operation
Flexible capacity of 32GB to 1TB
Flexible configuration of 2.8 or 3.2GH processors

Overall, the Fujitsu SPARC is an ideal choice for any IT manager. Its convenience and efficiency make it an operational asset, and its high performance can increase overall productivity. It can provides exceptional power and capacity on its own, but also leaves room for expansion in its 1U build. This server may be the perfect fit for your network.

To learn more about the M10 or other SPARC series servers, call one of our CCNY Tech IT professionals.

Written By:  Scott Fluty, CCNY Tech


CCNY Tech has a variety of products from some of the top names in the industry! We supply servers, networking, and storage equipment, along with custom configurations. Check out our site or call our team to learn more about our products and services! Visit Website

Top 10 Reasons that Companies Lease Equipment

IT equipment leasing is growing in popularity and there are several reasons why your company might choose to lease IT. One of the primary benefits to leasing equipment is the flexibility. You can easily adjust your equipment setup to match your projects and your current company needs. It also allows you to maximize and customize your budget for those same projects.

IT Equipment leasingLeasing helps to prevent technological obsolescence. Because technology is constantly changing, it is easy for equipment to become outdated.

Leasing gives you the opportunity to keep your business current, and on the cutting-edge of technology. IT equipment leasing allows a company to better match cash outflow with revenue production over the use of equipment.

Overall, it can be a beneficial system and might be the perfect choice for your business.

Top 10 Reasons to Lease

1. Balance Sheet Management
Leasing can help you better manage the balance sheet and improve the overall financial picture. It does this by conserving operating capital and freeing up working capital. It also allows bank credit lines to be more available for inventory, expansion and emergencies.
2. Financing Options
With equipment leasing, there is no down payment. The term of the lease can be matched with the useful life of the equipment.
3. Purchasing Power
Equipment lease financing allows you to acquire more and/or higher-end equipment.
4. Asset Management
A lease provides the use of equipment for specific periods of time at fixed payments and it assumes and manages the risks of equipment ownership. At the end of the lease, the lessor disposes of the equipment, making it a simple and convenient process for you.
5. Included Maintenance
Many Leasing companies include installation, maintenance and other services to their leasing process. It helps to take the burden off of you and ensures that your equipment is always up and running.
6. Tax Benefits
Leasing also allows you to deduct 100% of the lease payment as a business expense.
7. Latest Technology
Leasing provides companies with the ability to keep pace with technology. You can upgrade or add equipment to meet ever-changing needs.
8. Specialized Assistance
Leasing companies are specialists in the equipment leasing process and in financing. They will help each step of the way and ensure that you receive quality equipment with payments that work for you.
9. Flexibility
There are a variety of leasing products available, allowing you to customize a program to address your needs and requirements – cash flow, budget, transaction structure, cyclical fluctuations, etc.
10. Proven Equipment-Financing Option
Over 30 percent of all capital equipment in the United States is acquired through leasing. In fact, eight out of 10 companies lease their equipment.

Equipment leasing can be very beneficial, particularly when done with a knowledgeable IT company. If you have any further questions, check out our website or give us a call to learn more. Our technicians will work with you personally to ensure that you receive the equipment that best suits your needs and improves your capabilities.

Call us at CCNY Tech the next time you need IT hardware or Professional IT Services. We think you’ll find us an experienced, creative, and trustworthy partner. Call 1.800.566.4786 today!

Written By:  Scott Fluty, CCNY Tech


CCNY Tech has a variety of products from some of the top names in the industry! We supply servers, networking, and storage equipment, along with custom configurations. Check out our site or call our team to learn more about our products and services! Visit Website

Top 3 Reasons Why the Cloud Might Not Be the Right Fit

Have you ever wondered what it meant when someone would say “in the cloud”?

It is essentially access to someone else’s (or your own) network for storage or backup. Companies are now given the option to put their data in the cloud, allowing them to reduce the initial investment and physical space that a server requires. Although this sounds tempting, there are some drawbacks to consider.

3 Things to Consider Before You Move to the Cloud

1. Internet Requirements – In order to get access to the data that is kept in the cloud, a user is required to have internet access. Internet access can go down at any time. There is always a risk of costly downtime when using an ISP. In extreme conditions such as storms, if Internet gets knocked out, so does the access to the data kept in the cloud. Depending on the situation, this data could have critical information that is needed regardless of the conditions outside. Time doesn’t pause when the internet does, and neither should your access to crucial data.

2. High Costs – If overall cost is a priority in a company, cloud alternatives should be considered. Initially, the price of cloud may be tempting before the breakdown is analyzed. Cloud services are charged on a periodic basis, making costs seem less than the initial investment into in house servers. Consider the cost breakdown of three years with the cloud vs. in house servers. It may be tempting to choose cloud services that are $50/month until you add up $50/month for 12 months times 3 years and it adds to be $1800 with no trade in value for the user. Some quality servers cost under $1200 and have trade in value in the event that the decision to upgrade is made.

3. Security Threats – With the initial switch to cloud, there is no protection of data. In order for the protection to be in place, one must set it up themselves, requiring additional costs. This makes it so data is not as secure in the cloud versus the security of an in house server. Because cloud uses the internet, there is no guarantee that data will not be accessed by third parties. Some company information, as well as the customer information, should not be seen by anyone but the companies using it for business.

What are the benefits of an in house server?

An in house server allows speed to be based upon the processing power of the server, and custom configurations may be added to servers to make them as fast as one would need them to be. An in house server works with what is already set up in place, allowing for the network to already be protected prior to the addition of the hardware. Since the server is physically present, there is more accessibility and more control. The cost of the equipment is generally less in the long run, as well. Since there is no need for internet connection, data is not leaked to other parties and may be accessed without internet connection.

Where do I go from here?

Network solutions are not one size fits all, nor would we recommend the same solution for every customer. If you need help evaluating your storage or networking needs, give our team a call. Our IT professionals are happy to work with you to create a plan for your business.

Call us at CCNY Tech the next time you need IT hardware or Professional IT Services. We think you’ll find us an experienced, creative, and trustworthy partner. Call 1.800.566.4786 today!

Written By:  Jerrica Paulsen, CCNY Tech


CCNY Tech has a variety of products from some of the top names in the industry! We supply servers, networking, and storage equipment, along with custom configurations. Check out our site or call our team to learn more about our products and services! Visit Website

America’s Greatest Heart Run and Walk

Recently, members of the CCNY Tech team participated in America’s Greatest Heart Run and Walk. CCNY Tech supports local events and community involvement. We would like to use this opportunity to increase awareness and support for the fight against heart disease, as well as to encourage participation in events such as this.

On Saturday March 4th, members of CCNY Tech’s sales team – Matt Skinner, Chris Baris and Joe Coffay participated in the 43rd annual America’s Greatest Heart Run and Walk. The guys braved frigid race time conditions and completed the 5 mile run in what they claim was a “respectable”, but still yet to be revealed time.
They ran as members of Team Jayden – Jayden Pollard, a now happy and excitable 5 year old was born with four holes in his heart. He had his first open heart surgery at 6 months old and will forever be a heart patient, or perhaps more appropriately put – heart warrior!
Heart Walks across the country support children and adults alike in the fight against heart disease, which ranks as the United States number one killer. In 2016 there were 279 walks across the country. Utica finished with the 26th most money raised!

 

Made in Utica website has more information and photos.

 

Licensing Windows Server 2012 vs 2016

Licensing can be a confusing topic in the IT world. Things get particularly difficult as the practices change over time. This article will help to explain the differences between 2012 R2 licensing and the newer Windows Server licensing.

When licensing a physical server of 16 or fewer cores, you purchase a 16 core pack version of Windows Server 2016, regardless of the number of physical CPUs. With 2012 R2 however, the amount purchased was based upon the number of physical CPUs to be licensed, regardless of core count.

If you are licensing a physical server of 16 plus cores, you purchase a 16 core license, and then as many 2 core license packs that it takes to match the total core count. An example of this would be – a 2 CPU- 20 Core server, would need one full 16 core license, and 2 x 2 Core packs added to license it all. Each core pack is equal to 1/8th the cost of the full 16 core version of the license.

The reason for this change is the cloud. If I spun up a server in Azure and installed Server 2012 R2 on it, I would have had to purchase a full license regardless of the total number of cores for that server, 2 or 50. If I do this now with Server 2016, and I have a 2 core VM in Azure, I pay the 1/8th price of the full license for that server. If it has 16 cores, I would buy the full 16 core license.

There have been some questions recently about backups and what it means for CALs from Microsoft. Exchange, SQL and Server CALs are all covered by these scenarios.

CALs and Backups:

VM to VM via Live Migration
If you have a server that is virtualized on physical unit 1, and it gets live migrated to physical unit 2, there is no need for additional CALs from Microsoft.

VM to VM via Backup Software
If you have a virtual server on physical unit 1 and make daily backups to physical unit 2, and unit 1 dies and you spin up physical unit 2, you do not need additional CALs from Microsoft.

VM to VM via replication
If you make a replication of a running VM to another physical host, it will not require additional CALs if it is only brought online after the original system goes down.

VM and VM in HA
If you have two virtual machines running the same software at the same time, you need CALs for both equal to the total amount required. E.g. 2 SQL servers in HA for 50 users would need 50 CALs applied to each of the instances, not just one 50 CAL block.

Physical to Physical via Backup Software
If you have two physical servers, and you backup your system to the other system, but are not actively running that physical system (bullet 2), you do not need additional CALs.

Physical and Physical in HA
If you have two physical machines running the same software at the same time, you need CALs for both equal to the total amount required. E.g. 2 SQL servers in HA for 50 users would need 50 CALs applied to each of the instances, not just one 50 CAL block.

Preventing Unauthorized Software from Entering Your Network

Unauthorized software can be a big problem for some companies. Attackers are constantly looking for vulnerable targets to hack by tricking users into downloading malicious files. Unauthorized software increases the risk of outsiders gaining access to sensitive data. Any software that is not authorized is likely managed without proper patching, updates, configurations, and security protocols. Without the knowledge of agency software, IT managers cannot fully protect their data and information.

The Department of Homeland Security included Software Asset Management (SWAM) is in phase one of its Continuous Diagnostic and Mitigation (CDM) program to put more focus on the problem of unauthorized software. The objective of SWAM is to give IT administrators visibility into the software installed and used on their network. By gaining visibility they can remove and manage any potentially harmful software.

Application whitelisting is a key component of CDM SWAM and allows only what has been approved to execute, while blocking all other software by default. It must be implemented effectively or it can carry significant maintenance and usability implications.

Seven key guidelines to prevent unauthorized software:

1. Catch it at the beginning.
The first step is to prevent unauthorized software from even entering your network. Agencies should have specific groups who are responsible for obtaining, testing, approving, deploying, and maintaining software so that end users cannot obtain it from external sources. Unauthorized software is often found in email, on the web, and in removable media. Security teams can block files with extensions of known harmful files (.exe, .msi, .bin) along with mime types via existing email and web gateway technologies. Practices like application whitelisting can block known extensions and file types entirely if not authorized. This may stop some attackers but determined individuals will use alternative methods to get past these roadblocks.

2. Don’t forget active content and browser extensions.
A whitelisted application can still be attacked via ActiveX controls, java, and browser extensions. Active content can also be installed without knowledge of the user by just browsing the internet. Unauthorized software installation can be prevented by enforcing local browser/client settings or blocking known harmful network requests at perimeter security gateways.

3. Keep administrative privileges at a minimum.
Access to administrative privileges could lead to running installation packages and installing malicious, unknown software. Administrative access allows users to change system configurations to hide their activity and hide the use of dangerous files. Keeping administrative privileges to a minimum allows easier maintenance and knowledge of who is downloading files and where they are coming from.

4.Use the Audit/Monitor Mode.
For large agencies it could take months or years to get a complete list of authorized software. However, most whitelisting applications offer an “audit” or “monitor” mode to provide visibility of what software is being used throughout the organization. The audit/monitor function can help determine which applications should and should not be permitted.

5. Create a baseline.
Achieving effective whitelisting across a large agency can take a lot of time. Create a “temporary whitelist” with the current authorized software. This baseline can be used to ensure no additional software is permitted into the network while current software is being assessed.

6. Keep Stakeholders in the loop.
It is important for stakeholders to be aware of unauthorized applications because of the potential blocking of certain business processes. Problems can arise as applications that were previously permitted are now being blocked. Having a clear communication plan can prevent anger and frustration among stakeholders and make it clear which applications are approved, and which are not.

7. Prepare for emergency requests.
Whitelisting can take a long time and some applications that have yet to be approved may be required for a critical and time-sensitive case. Emergency “firecall” accounts and processes can be established to ensure the temporary authorization of these processes. Being prepared for a situation like this can save time and could be crucial for an emergency case.

Following these recommendations can help an agency monitor their network and prevent harmful software from entering. Each agency is different and not one practice fit all. It is important to create a plan tailored to your company so unauthorized processes cannot wreak havoc on your software.

CCNY Tech is a leader in IT Asset Disposition & E-Waste Disposal and offers a huge inventory of new, used and refurbished IT equipment.

CCNY Tech has been in business since 1988 and has built many long term relationships with companies, universities and other organizations by providing great value and outstanding customer service. Call CCNY Tech at 1-800-566-4786 or fill out the Contact Us form to learn how we can improve your IT requirements.

E-Waste: How You Should Dispose of Old IT Equipment

E-waste, or electronic waste, can be defined as obsolete, unrepairable, or even unwanted electronic devices or equipment. According to the EPA, it is the fastest growing municipal waste stream in America. E-waste can include desktops/laptops, servers, switches, routers, and most other common networking gear used for businesses. These kinds of equipment can be difficult to remove at the end of their working lives, or at the time of an upgrade. Refurbishing/recycling companies have processes designed specifically to help businesses like yours.

A process known as IT Asset Disposition (ITAD), provides the full spectrum of end-of-life options for IT equipment. When old or unwanted equipment is discarded, an ITAD company will decide if it is still useable for resale or refurbishment. If not, it will be broken down for functioning parts, and the rest will be recycled. ITAD is a great option for businesses for a number of reasons:

1. It saves time. De-installation and removal of networking gear can be a difficult and time-consuming process for businesses. Most ITAD companies can decommission, de-install, remove sensitive data, and ensure that product is used to its fullest or is properly recycled.

2. It saves money. What is often overlooked is the cost of old IT equipment. Storage and maintenance of old hardware is an expense for any business. Furthermore, as IT gear ages, it becomes less efficient in its performance which can lead to very expensive downtime. ITAD is an effective way to replace old equipment with upgrades before it become too costly with upkeep.

3. It is great for the environment. Extending the life of a product or recycling parts helps to keep E-waste out of landfills. E-waste represents 2% of America’s trash in landfills, but it equals 70% of overall toxic waste. Electronics contain harmful contaminants such as, lead, mercury, cadmium, manganese, arsenic, beryllium, barium, chromium, and other toxic chemicals and compounds. Exposure to these metals can cause damage to the cardiovascular, respiratory, nervous and excretory systems. Properly disposing e-waste keeps these toxins out of groundwater and is critical for the health and safety of citizens and wildlife.

A large percentage of what is labeled as “e-waste” is actually not waste at all. Often times, it is whole electronic equipment or parts that are readily marketable for reuse or can be recycled for materials recovery. ITAD companies are one of the most effective ways to ensure that you are properly disposing of your old gear. They will strive to resell as much equipment as possible and recycle what is unusable.

Not only does IT Asset Disposition save time and money, it can also be profitable. Most ITAD companies will audit your equipment and give you a credit for its estimated value. This is a great way to cut the cost of upgrades or even just add benefit to your decision of proper disposal.

If you have old or unwanted IT equipment, contact your local electronic-waste recycler. For more information, check out our ITAD Service page.

Reference:
11 facts About E-Waste. (n.d.). Retrieved January, 2017, from https://www.dosomething.org/us/facts/11-facts-about-e-waste

CCNY Tech is a leader in IT Asset Disposition & E-Waste Disposal and offers a huge inventory of new, used and refurbished IT equipment.

CCNY Tech has been in business since 1988 and has built many long term relationships with companies, universities and other organizations by providing great value and outstanding customer service. Call CCNY Tech at 1-800-566-4786 or fill out the Contact Us form to learn how we can improve your IT requirements.

ultricies et, felis Donec eleifend elementum quis, libero Curabitur Donec