Stop Data Breaches Now – A TCG Webinar

Date Published: June, 01, 2014

Data breaches continue to cost businesses big money – and not just legal costs, fines and lost business. The huge, recent Target incident has proven that a large breach can impact the stock price and ongoing trade over time and endanger the careers of the C-level executives at the helm.

So, despite available technologies, data continues to be lost. Sometimes it’s a matter of the lost laptop with Social Security numbers or other personally identifiable information. In other cases, racks of drives are lost to carefully planned theft, or critical info is left on drives that were disposed of improperly.

For many instances of data breach, the solution is the self-encrypting drive, or SED. These drives, based on industries standards developed by TCG and implemented by almost all storage vendors, provide instant, on-the-fly, transparent encryption. Users cannot turn it off, and it does not impact system performance.

Learn how to deploy this proven technology in a Trusted Computing Group webinar July 16th.

Experts from Samsung, Seagate and WinMagic will look at the key concepts of SEDs, performance and implementation and the role of SEDs in enterprise data protection. Attendees will learn how companies are using them and tips for a successful deployment that can protect data all the time and allow for the instant erasure or re-purposing of drives easily and effectively.

To get more info or to register for the webinar on  Tues., July 16, 1:00 p.m. East/10:00 a.m. Pacific, go tohttps://www.brighttalk.com/webcast/7423/117065

Tags:

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More