How to Deploy Self-Encrypting Drives (SEDs)

Date Published: January, 01, 2015

Self-encrypting drives, or SEDs, quickly are becoming increasingly available as a standard drive for many enterprise systems.  As more IT departments replace aging systems with ones that have SEDs, more questions about how to deploy these drives will come up.

As a quick refresher, SEDs include encryption right in the drive controller.  The encryption is transparent, always on and has no impact on performance.  Unlike software encryption tools, SEDs cannot be turned off by users.  Standards-based encryption, enabled by TCG’s Opal and Enterprise Class Standards for encryption, mean that drives based on these standards are interoperable and are supported by a number of third-party software vendors with enterprise management tools.

One June 11th, healthcare IT expert Hussein Syed of Barnabas Health and Tom Coughlin, industry analyst of Coughlin Associates, will host a free webinar on how enterprise users can access, specify and deploy SEDs.

SEDs meet U.S. and international standards for compliance and provide a safe harbor while protecting against data breaches typical to today’s enterprise environment.  The webinar will address seven steps for IT, legal and security staff to follow to deploy encryption.  A quick review of self-encrypting drive capabilities will be provided iwth discussion of crypto-erase, as recommended by the National Institute of Standards and Technology.  The Storage Netweorking Industry Association (SNIA) checklist for encryption and SED’s role will be reviewed along with case sutdies on SEDs in real enterprises with discussion of deployment challenges and resolving them.

Join TCG on Tuesday, June 11th.  Regiser now at: https://www.brighttalk.com/webcast/7423/75031

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More