How to destroy RSA SID800 / SID700 tokens

Posted on 2011-09-27
Last Modified: 2012-05-12
We currently are replacing all of our RSA SID800 / SID700 tokens.  Wondering a effective / efficient way to destroy the old tokens.
Question by:ManieyaK_
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2

Expert Comment

ID: 36713875
I would just keep then in a safe place untill they expire.  Once they expire they will turn off and you can safely toss them into a garbage can or electronics recycling location.  If this is not possible you can probably physically destoy them in an electronics shreader.  I am not aware of any way to deactivate them.

Author Comment

ID: 36716117
We are replacing around 5,000 tokens it is not feasible to store all of these until they expire some don't expire for 4 years.  There is no way to render the tokens unusable?
LVL 70

Accepted Solution

Qlemo earned 500 total points
ID: 36719091
I would contact RSA for that. They offer a "safe token disposal process" for recycling expired tokens, but I could not see anything for still valid ones. At the amount of 5000 I would not consider anything else but professional service, including a large volume electronics shredder company.

Author Closing Comment

ID: 36899296
Thanks for the help contacted RSA we are going with their disposial system.

Featured Post

On Demand Webinar - Networking for the Cloud Era

This webinar discusses:
-Common barriers companies experience when moving to the cloud
-How SD-WAN changes the way we look at networks
-Best practices customers should employ moving forward with cloud migration
-What happens behind the scenes of SteelConnect’s one-click button

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question