As a leading European manufacturer and distributor of IT storage, data security and encryption products, matched memory and accessories, our focus is exclusively on developing strong relationships within our IT reseller channel partners. We deliver market-leading expertise, depth of knowledge and technical support to our partners within our core product ranges and are committed further strengthening our already close relationship with all major IT vendors.
Please explore our product ranges by following the links below or go straight to the Product Selector to find what you are looking for quickly.
Current or legacy, replacement or upgrade, any technology, any manufacturer, any size, any speed for desktops, notebooks, servers and even data centres. Matched HDD, SSD, NAS, SAN all with up to 5 years advanced replacement warranty and both pre and post-sales technical support.
DataLocker encrypted hard drives, secure encrypted flash drives and removable media, encrypted internal drives and management software; all your customers require to secure their data
High quality matched and certified memory solutions for current, legacy and obsolete laptops, desktops and servers. Expert advice and technical support, lifetime warranties all accessed through our easy product selector.
Batteries and adapters for all leading brands from the global leader in laptop battery design, obsolete and legacy spares for Dell and many other OEMs, portable device cases and protection, plus docking solutions and keyboards.
BTI are the USA's largest battery supplier and offer guaranteed quality and compatibility across almost every make and model of laptop computer. Quickly and easily locate the battery or adapter you are looking for here.
We are a Dell Approved Partner and have very close relationships with the network of Dell partners throughout Europe. We are specialists in obtaining obsolete and legacy spares for Dell and many other manufacturer's systems.
A Privacy Filter from Origin Storage helps provide protection against shoulder surfers and visual hackers viewing your confidential and
sensitive information on your computer screen.