Introduction: The Overlooked Risk in Second-User Networking Equipment
The second-user IT market is booming, driven by sustainability ambitions, ESG reporting requirements and the rapid global expansion of ITAD and brokerage models. Yet while the industry has become highly sophisticated at managing laptops, servers and traditional storage media, one critical area remains dangerously behind the curve: data erasure for networking devices. Switches, routers, firewalls, access points and IoT equipment now make up a significant portion of the refurbished market, but the security processes designed to protect the data stored on them have not kept pace. As a result, the sector is carrying a growing and largely unacknowledged security risk.
Why Networking Devices Are a Hidden Data Risk
Many organisations still assume that performing a factory reset is enough to securely wipe a networking device. Unfortunately, this is far from true. Networking hardware stores sensitive data within persistent memory such as flash or NVRAM, meaning that after a simple reset, critical information is often still present. These devices routinely retain administrator credentials, SSH keys, VPN configurations, VLAN tables, SNMP traps, network maps and complete configuration backups. In short, they can hold everything a malicious actor would need to step directly into a company’s internal network.
Real-World Evidence: The ESET Router Study
The scale of the problem was highlighted starkly in 2023 when ESET researchers purchased 18 used enterprise routers from online marketplaces. The findings were alarming: 56% of the devices still contained sensitive enterprise data, and only five had been wiped correctly. The routers disclosed live VPN credentials, admin passwords and internal network configurations, creating a severe security exposure. This wasn’t the result of sophisticated hacking but simple operational oversight, and the story quickly gained attention in Wired, NetworkWorld and The National CIO Review.
Why Traditional Erasure Tools Don’t Fit Networking Devices
While the market has spent decades perfecting data erasure processes for laptops, servers, hard drives and mobile phones, networking equipment is far more fragmented. Vendor architectures differ widely, persistent memory behaves inconsistently and there is no universal standard for sanitising or verifying erasure. Manual command-line sanitisation can require 50 or more steps for devices such as Cisco Nexus switches. A single mistyped command can leave behind sensitive data—or permanently brick the device. These processes are slow, reliant on senior engineers and extremely difficult to audit.
Compliance and Standards: The Landscape Is Changing
Regulators and standards bodies are now catching up with the reality that networking devices are data-bearing assets. NIST SP 800-88 Rev.2 (2025) expands its guidance to cover networking equipment under the Information Storage Media category. IEEE 2883:2022 provides clear definitions for Clear, Purge and Destruct sanitisation. GDPR and UK Data Protection laws continue to demand strict control over personal data, and ADISA provides independent validation for sanitisation processes. Together, these frameworks signal a fundamental shift: networking devices must now be treated with the same rigour as any other data-bearing asset.
Why Automation Is Now Essential
Manual sanitisation is no longer viable for modern ITAD and brokerage operations. Automation reduces inconsistency, prevents human error, accelerates throughput and provides verifiable proof-of-erasure. It enables technicians with varying skill levels to process complex devices safely, freeing senior engineers to focus on higher-value work. Beyond compliance, automated data erasure for networking devices increases asset value, strengthens customer confidence and creates a meaningful competitive advantage for organisations willing to adopt best-practice processes.
How Novafox Hydra Solves the Challenge
This industry shift is precisely why Novafox developed Hydra. Designed specifically for secure data erasure for networking devices, Hydra automates the entire sanitisation process. It identifies the device, bypasses passwords, backs up operating systems and licences, performs a full media overwrite, restores or updates the OS and completes functional tests such as loopback validation. Every action is logged, and every erasure produces complete audit-ready reporting. Hydra supports cloud-connected and 30-day offline operation for secure facilities, with all devices, certificates and logs managed centrally via the Hydra Portal. Whether you are processing a single device or scaling to hundreds, Hydra ensures consistency, compliance and total traceability.
The Road Ahead: Raising Industry Standards
The industry must now recognise that every piece of networking hardware is a data-bearing device. Factory resets are not enough, and manual processes belong firmly in the past. NIST SP 800-88 Rev.2 and IEEE 2883 should form the baseline, with verification as standard and automation replacing manual intervention. The principle is simple: if data exists, it must be erased—no matter where it hides.
Conclusion
Secure data erasure for networking devices is no longer optional. It is essential for compliance, customer trust and commercial success in the rapidly expanding second-user market. As demand for refurbished networking equipment grows, only organisations that can provide proven, auditable sanitisation will stay ahead of the curve. Novafox Hydra provides the automation, assurance and scalability required to meet this new reality, helping ITAD providers and brokers deliver secure, standards-aligned data erasure at global scale.
Ready to modernise your data erasure workflow?
Contact Novafox to learn more about Hydra or to book a demonstration: Click Here

