How do disreputable IT equipment resellers impact my enterprise? Is there really a threat from gray or black m...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Gray and black markets can indeed impact your enterprise in a variety of ways because there are some potential pitfalls to consider. Reputable gray market equipment resellers and dealers can deliver authentic, fully-tested and functional equipment at a discount, and this may be entirely appropriate for businesses that chose to use slightly older equipment for certain data center tasks. For example, the gray market might provide servers for a business that continues to use legacy applications -- or needs parts to maintain those older servers -- and cannot justify the expense of updating the application to run on the latest hardware platforms.
However, used IT equipment provided through the gray market may have little or no warranty life left. A reputable reseller will typically warranty the used gear for a short period -- even up to a year -- but the original manufacturer will not provide support without a costly service contract, which is often more expensive than the hardware. Still, businesses that choose used IT gear are usually well-aware of the potential service risks involved and are willing to accept those risks.
Black market gear is far more problematic; it is usually advertised or represented as "new," but the original manufacturer will immediately recognize duplicated serial numbers and refuse to provide support. They may even try to recover gear with stolen serial numbers. Reputable gray market dealers take the time to investigate gear to guard against stolen or counterfeit products. It's in their interests to ensure legitimate gear, and they will make good if a black market item slips into their inventory. Of course, underhanded black market dealers will be long gone by the time you realize the used gear is stolen or fake.
Regardless of what type of IT equipment reseller you use, it's important to find out where that used server came from before you buy it.
Dig Deeper on Data center budget and culture
Related Q&A from Stephen J. Bigelow
VMware vSphere 6.5 takes an extra security step, building on UEFI secure boot with added cryptographic validation to all ESXi components.continue reading
Virtualization offers many advantages by abstracting workloads from hardware, but you may still need to find the VM host computer. You can do so ...continue reading
Live migration of VMs isn't a new technology, but vMotion encryption adds a unique layer of security because the user isn't encrypting the network.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.