Aiken Services

Select menu tabs below:

  • Auditing

    Auditing is the gathering of all the information that describes the characteristics and the exact condition of each IT asset. The client modules of the Aiken WorkBench automatically detect the specifications of PCs, Macs, Android/iOS smartphones/tablets, monitors, printers and other devices, and provides a systematic way to enter the information that cannot be obtained automatically, such as cosmetic defects. The Workbench suite also includes an Android app to take pictures of those defects and store them into the database for further use, along with the auditing information.

    Retrieving the information as it is returned by the hardware is useful, but it is not enough. Experienced ITAD technicians know that hardware manufacturers do not always store information in a consistent way. The Aiken Workbench code has been tweaked with the input of real working environments over various years, so as to deal with the idiosyncrasies of specific computer models, devices and components. It may, among others:

    • Move information from one field to another
    • Replace model numbers with commercial model names
    • Convert units of measurement
    • Remove non-relevant words and characters
    • Merge fields and change the order of field parts

    The ultimate purpose of this normalization effort is to get consistent information for all the assets, so it can be automatically used in reports and data processing (export to ERPs, etc) without further human intervention.

    All the auditing information is stored in MySQL, an industrial-strength database. The information can be accessed in real time, both locally and remotely, by using the Workbench Manager application, available for Windows, Mac and Linux. ITAD companies can also distribute this application to their customers or suppliers for free, so they can follow remotely the work in progress, print their own reports and erasure certificates and export the information to files in their own custom formats.

    In addition to using the reporting and exporting capabilities built into the Aiken WorkBench product, the auditing data can also be accessed by using the hundreds of commercial or open source tools available for MySQL and ODBC-compliant databases, or by writing custom programs. Integration with in-house ERP systems at the data level should be straightforward in most cases.

  • Testing

    Aiken Workbench includes testing tools to check the condition of the most important  components. All the tests can be performed by the technicians while an erasure or imaging operation is ongoing in the background.

    Disk drives

    The historic information stored on the drives by the SMART diagnosis firmware is retrieved and then analyzed to determine if the drive is in a healthy state.

    Optical drives

    Optical drives can be tested in a non-disruptive way, just by inserting a test CD that contains a specific pattern of files that the program will read automatically.


    A voice file can be played to check the left and right channels of the sound components.

    LAN and Wi-Fi connections

    The Workbench software on the clients establishes a connection with the server and sends/receives several control packets using both network interfaces.

    USB ports

    All USB ports can be tested by inserting any USB device. The Workbench detects and displays the model of the device and compares the total number of detected devices with the expected number.

    Notebook batteries

    The Workbench informs both of the actual percentage of useful capacity and of the current charge level of the batteries. It also includes a battery duration test that discharges the batteries until they are exhausted and then saves the total time elapsed into the database.


    The Workbench presents a keyboard layout on screen and provides a visual feedback of every key pressed and released.

    LCD panels

    The panels of laptops and monitors can be tested by showing the basic colors successively, so dead/lit pixels and other anomalies are easily spotted.

    Touch Screen

    The Workbench activates this test when it detects the presence of a Touchscreen, and allows the operator to test the touch input.


    The PC Auditor will open a window and show the video captured by the webcam, so the technician can verify the quality of the video stream.


    The Workbench detects when the user input is coming from the integrated touchpad on laptops, which allows to verify the cursor movement and the press of buttons.


    The clients can be started in a special mode to run a comprehensive memory test.
  • Data Erasing

    The secure erase feature of Aiken Workbench Version 2 was awarded the security certification of the ADISA organization, after passing rigorous tests at the Cyber Defence Center of the University of South Wales (UK).

    The PC Auditor and the Hardware Auditor modules of Aiken WorkBench allow the secure erasing of HDD and SSD drives connected to a computer. They can use both software and firmware-based secure erase methods:

    • The software methods overwrite with zeros or with a random pattern all the disk sectors that are accessible to the operating system. The user can also remove the HPA and DCO hidden areas of the drives before erasure, so they can also be overwritten.

    • The firmware methods trigger the execution of a program stored by the drive manufacturer in the disk firmware, in compliance with the ANSI ATA specifications. The firmware programs overwrite the full surface of the drive, including the HPA and DCO areas, and the remapped sectors. The PC Auditor allows the ad-hoc removal of the so-called "freeze lock", a security feature on the drives that prevents the disk from accepting firmware commands.

    The Mobile Auditor module of Aiken WorkBench allows the secure erasing of mobile devices operating with the two most prevalent platforms:

    • Android: the storage media is overwritten with zeros and the device is reset to factory defaults.
    • Apple iOS: The firmware on the device is fully replaced and upgraded to the latest version. The encryption key on the device is replaced, making all user data completely unrecoverable.

    Once every device has been successfully erased, Aiken WorkBench generates a certificate containing the serial number and model of the device, the erase method used, and the erasure timestamp, among other details. This signature is stored as an encryted object in the MySQL database, and since only the Aiken WorkBench programs can decrypt the information, it cannot be meaningfully altered by any means. The reporting facility of the Aiken WorkBench can later be used to print certificates of erasure that are based on true facts beyond doubt.

  • Disk Imaging

    Aiken WorkBench integrates the capability of both creating and restoring Windows, Mac OS X and Linux disk images through a Local Area Network. GPT partitions are fully supported in UEFI machines.

    The Image Maker component creates the images and keeps them in a centralized image library, where they can easily be retrieved by machine model, operating system installed and other descriptors. The images are completely disk independent. They can be restored to drives smaller or bigger than the original, and even to drives using different interfaces and technologies (SATA to SCSI, magnetic to solid-state, etc).

    The same or different images can be restored simultaneously to many machines in a completely unattended mode, using one or multiple Image Servers. The Aiken WorkBench architecture allows extremely flexible setup options in order to optimize the network bandwidth and avoid bottlenecks due to the massive data transfers. A Windows 7 image is typically transferred to one machine in less than 2 minutes; to 30 machines in 20-23 minutes.

    The image to be restored can be selected from the PC Auditor interface on every client, but it can also be selected on the server and pushed to all the connected PCs at once. The technicians can also decide if they want to both securely erase the drives first and restore the image immediately afterwards, so the full process is completed without further human intervention. While the drives are being erased or the images are being restored, the machines never get blocked and the technicians can still perform auditing or testing operations on the machines.


Phone + 0333 666 7771
Email + This email address is being protected from spambots. You need JavaScript enabled to view it.
Technology House, Technology Road, Poole BH17 7DA, UK

Opening Hours

Monday - Friday + 9 AM - 5 PM


Social Media

CFA Ltd is a Global Resale Company.

© Copyright 2018 CFA Trading Ltd.