Five years ago, we embarked on a mission to support businesses in adopting a circular approach, making their technology management more efficient, secure, and sustainable. 

During this time, we’ve grown alongside the rapidly evolving digital landscape, learning, and growing with every challenge and opportunity. 

How it started  

Our company was launched in 2019 as part of a strategic alliance between 3stepIT, a Nordic circular technology service provider, and BNP Paribas Leasing Solutions, a global leader in equipment leasing, to support more organisations in transitioning to a circular economy for technology.   

Today, we are in 11 European markets, with operations in France, Germany, Italy, the United Kingdom, Belgium, the Netherlands, and Spain. 3stepIT provides Nordic coverage in Finland, Sweden, Denmark, and Norway. 

More than 3000 businesses have chosen to take advantage of our circular technology management services across Europe, revolutionising how they procure, manage, and dispose of technology and address the impact of their devices.  

And we are just getting started. 

What’s next 

Our refurbishment centres are the beating heart of our business, where our teams give used devices a second life and make them available for resale to secondary users. In 2023, BNP Paribas 3 Step IT’s UK refurbishment centre processed record volumes of devices in its largest year of production as part of the Joint Venture, demonstrating the increasing demand for sustainable and secure technology management services.

Are more refurbishing hubs on the horizon? Stay tuned! 

“These past five years have been incredible for our company. With the support of our fantastic people and partners, we’ve made significant strides in helping European businesses maximise the value of their technology while minimising waste. As we look ahead, we’re committed to delivering innovative circular solutions that drive business success,” said Carmen Ene, CEO of BNP Paribas 3 Step IT. “Our world-class team truly sets us apart, enabling our success, and our unique, strong company culture that unites us and propels our organisation forward.” 

This week marks the end of European Cybersecurity Month, a time to shine a spotlight on the risks of cyber insecurity, the impact it can have on organisations, and the solutions that can be put in place to protect and manage company data.  

These awareness-raising campaigns are important, but all tech leaders know that data security management is an around-the-clock job – there are no days off. The truth is an organisation’s cybersecurity is only as strong as its weakest links, with device users and partner organisations often responsible for vulnerabilities. 

According to Forrester Research, only 7% of security decision-makers are concerned that a lost or stolen asset could cause a breach, even though such incidents account for 17% of all breaches. Add to that Gartner’s analysis, which shows that over the last two years 45% of organisations have experienced cyber-related interruptions to their business due to a third party, and it’s clear that every organisation needs a comprehensive plan to secure its data beyond the walls of its own operations. 

A complex digital footprint 

Our dependence on technology continues to grow exponentially, and as the number of devices organisations rely on increases, so do the risks of managing the security of company and customer across a dispersed digital footprint.  

Data no longer remains on the office desk – it travels with employees to different work locations, home, and on public transport – and as this happens it becomes more difficult for organisations to control and protect.  

It’s not just the number and the mobility of devices that is challenging, but also their connectedness. Our digital systems are becoming increasingly complex and interdependent, which means it only takes one organisation in the value chain to expose others to data security breaches. 

The case for end-to-end control 

Adding to this complex cybersecurity landscape, is the growing realisation that data must be protected across the entire device lifecycle. Yet many businesses still have cybersecurity strategies in place that only get them halfway there.  

While most organisations have strategies to protect IT hardware during its active use, fewer address the crucial steps needed once devices are decommissioned. Many companies rely on multiple suppliers to cover various stages of the hardware lifecycle, resulting in gaps and potential risks. 

A better approach is for organisations to adopt a holistic procurement model that embeds end-to-end traceability of hardware. By knowing exactly what hardware enters the business, companies can track which devices hold data, enabling secure data erasure as part of the decommissioning process. This proactive strategy ensures data security not just during use but throughout the entire lifecycle of the technology. 

Mitigating risk across the device lifecycle 

Organisations can procure digital services on a financing contract through new models, like our Technology Lifecycle Management (TLM) service, rather than through traditional cash ownership. This helps to simplify tech procurement and reduce exposure to multiple suppliers by offering a whole lifecycle approach to IT management as part of one simple service.   

Comprehensive asset management is central to this approach and supports organisations to improve their oversight and control of devices by ensuring IT teams know where devices are, how they’re being used, and when they require updates. We include our powerful asset management platform as part of every TLM contract. We onboard all new and existing devices on to this system to allow organisations to track all devices through a single digital dashboard and create a complete and secure chain of custody. 

When it’s time to decommission corporate devices, our Technology Lifecycle Management service includes a range of automated end-of-life services for secure IT Asset Disposition (ITAD), such as return logistics, refurbishment, and data erasure. This creates a transparent audit trail for organisations to monitor, track, and trace devices while preparing to redeploy devices to new users.   

Achieving true resilience 

Building a resilient cybersecurity strategy today involves navigating a complex landscape and addressing the fast-evolving vulnerabilities introduced by users, partners, and risks throughout the device lifecycle.  

However, the solution doesn’t have to be complicated. 

Organisations can confidently mitigate significant cybersecurity risks associated with device decommission by partnering with a single supplier to deliver a comprehensive, end-to-end IT hardware management service. This approach complements existing in-live cybersecurity measures, establishing proactive safeguards that support the best outcomes for both the business and its customers. 

Want to find out more about our end-to-end approach to data security? Contact us today.