How major OEMs are reshaping the ITAD market. With David Daoud from Compliance Standards

THE CIRCULAR MOMENTUM SHOW

HOST INTRO

Welcome to The Circular Momentum Show. I’m your host, Pete Paisley. Today, we’re diving deep into the evolving landscape of IT asset disposition with David Daoud from Compliance Standards LLC, a leading industry analyst. We’ll explore how major OEMs like Lenovo, HP, and Dell are reshaping the ITAD market, what it means for enterprise relationships, and how independent ITAD providers can compete and thrive in this changing environment. Let’s get started.

PART I

Pete Paisley
David Daoud, very happy to have you today on The Circular Momentum Show, joining us from Compliance Standards LLC, a leading analytics and consulting firm. David, thanks for joining us.

David Daoud
Thanks for having me, Pete.

Pete Paisley
You recently published an interesting article about Lenovo entering the circular IT and ITAD space. Can you summarize the key points?

David Daoud
Lenovo’s move into circular IT is not isolated. It is part of a broader pattern across major OEMs. HP has Renew. Dell has Asset Disposition Services. Lenovo is now making a more aggressive push with refurbishment and redeployment services.

What is significant is that Lenovo is moving beyond simple take back and recycle into lifecycle extension, keeping devices in service longer and under its control. That shift creates new competitive dynamics for ITAD providers.

Importantly, Lenovo’s program focuses on 14 European countries. That is not accidental. The EU regulatory environment has effectively mandated this direction through regulations such as Eco Design requirements, CSRD, right to repair, and extended producer responsibility. These carry legal and financial consequences. So while Lenovo is turning compliance into competitive advantage, the foundation is regulatory obligation.

OEM MARKET SHARE AND ENTERPRISE CONTROL

David explains that estimating OEM share depends on what is measured. Revenue, units processed, or enterprise relationships each tell a different story.

Based on survey data of large enterprises, Dell appears in roughly 29 to 30 percent of large enterprise ITAD relationships. IBM follows closely. When you layer in lease returns, OEM affiliated channels, and ecosystem volume, OEM influence in the enterprise segment may exceed 40 percent.

Large enterprises prefer working with one vendor across procurement, utilization, and disposition. OEMs own those relationships. However, OEMs typically do not execute ITAD services themselves. They rely on third party operators for logistics, processing, and remarketing.

OPPORTUNITIES FOR INDEPENDENT ITAD PROVIDERS

ITAD providers can still win enterprise business by focusing on:

Specialization in verticals such as healthcare, government, or financial services
Relationship intimacy and responsiveness
Stronger economics and recovery value

Certifications such as SOC 2 and ISO 27001 under Information Security Management Systems are increasingly mandatory to participate in enterprise RFPs. Clean reporting, telemetry, and measurable data security controls are no longer optional.

ITAD providers should also expand into decommissioning services, authorized repair programs, and earlier lifecycle involvement to strengthen their enterprise position.

PART II

HOST INTRO

Welcome back to The Circular Momentum Show. We are continuing our conversation with David Daoud and turning to recent industry growth data and what it means for valuations and enterprise strategy.

ITAD AS A SUPPLY CHAIN RESOURCE

Pete references David’s article analyzing growth reported by Sims and Iron Mountain. Both reported approximately 70 percent year over year growth in ITAD operations. Iron Mountain expects asset lifecycle management to reach 850 million in revenue by 2026.

David explains that this is not simply a cyclical bump driven by memory pricing. It represents a structural shift. Decommissioning is now part of supply chain strategy. Memory modules such as DDR4 are being recovered and reused strategically. ITAD is no longer just scrap recovery. It is supply chain resource management.

While pricing cycles will normalize, the strategic repositioning of ITAD at the executive level is likely permanent.

COMPETING WITH LARGE NATIONAL PROVIDERS

Switching an established Iron Mountain relationship is difficult but not impossible.

ITAD providers can differentiate through:

Vertical specialization
Deep customer relationships
More competitive recovery economics

Targeting vulnerable accounts with surgical precision is more effective than broad competition.

BUILDING ENTERPRISE VALUE

David outlines five steps ITAD operators should take to maximize valuation:

  1. Maintain clean audited financial reporting with clear revenue segmentation
  2. Increase recurring and contracted revenue
  3. Invest in reporting and telemetry infrastructure
  4. Formalize customer contracts
  5. Clearly define market positioning

Technology enabled operators command higher multiples than purely manual processors.

TECHNICAL DEBT AND FINANCIAL LANGUAGE

Technical debt now represents 20 to 40 percent of enterprise technology estate value. CIOs and CFOs are treating it as a balance sheet issue.

ITAD providers should:

Develop fluency in IT financial management language
Produce asset valuation reports
Quantify residual value
Support structured refresh programs

Strong reporting and valuation capabilities allow ITAD providers to participate in higher level financial conversations.

ITADs do not need to own leasing programs to benefit. Referral partnerships with financial institutions can position them as execution partners in structured deals.

BATTERY RISK MANAGEMENT

Lithium ion battery degradation creates fire and compliance risks in storage and transport. Insurers and regulators are paying attention.

ITAD providers must implement documented processes for identifying, segregating, and handling compromised batteries. Downstream documentation is increasingly required, particularly in Europe.

AUDIT READY TELEMETRY AND GPU DATA

Modern GPU based servers generate extensive telemetry including utilization, thermal history, memory logs, and power patterns.

Capturing and structuring this data:

Supports remarketing value
Enhances data sanitization verification
Provides provenance history
Meets enterprise audit expectations

Telemetry is becoming more valuable than static certificates of destruction.

DOWNSTREAM TRANSPARENCY

Downstream accountability remains a persistent risk area. With rising asset values, the temptation to divert high value components increases.

Enterprise clients now require more than certificates. They expect auditable downstream transparency and ESG aligned reporting.

CLOSING REMARKS

Pete thanks David for his insights and emphasizes the importance of understanding OEM dynamics, enterprise ITAD strategy, financial positioning, and evolving compliance requirements.

HOST OUTRO

Thanks for joining us on The Circular Momentum Show. I’m Pete Paisley. If you found value in these insights on OEM market dynamics, enterprise ITAD strategies, and the competitive forces shaping our industry, subscribe to stay updated on trends driving circular IT forward. For more resources and insights, visit www.circmo.com. Until next time, keep the momentum going.

Subscribe to our newsletter

Get notified when new episodes drop, plus exclusive insights and industry news delivered straight to your inbox.

No spam, ever. Unsubscribe anytime.

Leave a Reply