How to destroy RSA SID800 / SID700 tokens

Posted on 2011-09-27
Last Modified: 2012-05-12
We currently are replacing all of our RSA SID800 / SID700 tokens.  Wondering a effective / efficient way to destroy the old tokens.
Question by:ManieyaK_
  • 2

Expert Comment

ID: 36713875
I would just keep then in a safe place untill they expire.  Once they expire they will turn off and you can safely toss them into a garbage can or electronics recycling location.  If this is not possible you can probably physically destoy them in an electronics shreader.  I am not aware of any way to deactivate them.

Author Comment

ID: 36716117
We are replacing around 5,000 tokens it is not feasible to store all of these until they expire some don't expire for 4 years.  There is no way to render the tokens unusable?
LVL 69

Accepted Solution

Qlemo earned 500 total points
ID: 36719091
I would contact RSA for that. They offer a "safe token disposal process" for recycling expired tokens, but I could not see anything for still valid ones. At the amount of 5000 I would not consider anything else but professional service, including a large volume electronics shredder company.

Author Closing Comment

ID: 36899296
Thanks for the help contacted RSA we are going with their disposial system.

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

OpenVPN is a great open source VPN server that is capable of providing quick and easy VPN access to your network on the cheap.  By default the software is configured to allow open access to your network.  But what if you want to restrict users to on…
This is an article about my experiences with remote access to my clients (so that I may serve them) and eventually to my home office system via Radmin Remote Control. I have been using remote access for over 10 years and have been improving my metho…
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question