How to destroy RSA SID800 / SID700 tokens

Posted on 2011-09-27
Last Modified: 2012-05-12
We currently are replacing all of our RSA SID800 / SID700 tokens.  Wondering a effective / efficient way to destroy the old tokens.
Question by:ManieyaK_
  • 2

Expert Comment

ID: 36713875
I would just keep then in a safe place untill they expire.  Once they expire they will turn off and you can safely toss them into a garbage can or electronics recycling location.  If this is not possible you can probably physically destoy them in an electronics shreader.  I am not aware of any way to deactivate them.

Author Comment

ID: 36716117
We are replacing around 5,000 tokens it is not feasible to store all of these until they expire some don't expire for 4 years.  There is no way to render the tokens unusable?
LVL 68

Accepted Solution

Qlemo earned 500 total points
ID: 36719091
I would contact RSA for that. They offer a "safe token disposal process" for recycling expired tokens, but I could not see anything for still valid ones. At the amount of 5000 I would not consider anything else but professional service, including a large volume electronics shredder company.

Author Closing Comment

ID: 36899296
Thanks for the help contacted RSA we are going with their disposial system.

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
unable to connect to clientless webvpn portal on asa 13 79
Mac OS 10.12 + VPN 17 544
Cisco ASA5508-X vs Barracuda X200 2 55
Random Terminal Server disconnections. 2 96
Article by: btan
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now