Stop Data Breaches Now: A Webinar on Self-encrypting Drives for the Enterprise

Date Published: July, 01, 2014

What: The Trusted Computing Group will host a free webinar July 16 on data protection. Data breaches continue to cost businesses big money – and not just legal costs, fines and lost business. The huge, recent Target incident has proven that a large breach can impact the stock price and ongoing trade over time and endanger the careers of the C-level executives at the helm.

So, despite available technologies, data continues to be lost. Sometimes it’s a matter of the lost laptop with Social Security numbers or other personally identifiable information. In other cases, racks of drives are lost to carefully planned theft, or critical info is left on drives that were disposed of improperly.

For many instances of data breach, the solution is the self-encrypting drive, or SED. These drives, based on industries standards developed by TCG and implemented by almost all storage vendors, provide instant, on-the-fly, transparent encryption. Users cannot turn it off, and it does not impact system performance.

Join experts from Samsung and WinMagic as we look at the key concepts of SEDs, performance and implementation and the role of SEDs in enterprise data protection. See how companies are using them and tips for a successful deployment that can protect data all the time and allow for the instant erasure or re-purposing of drives easily and effectively.

When:
Wed., July 16, 1:00 p.m. East/10:00 a.m. Pacific.

Where: To get more info or to register for the webinar, go to https://www.brighttalk.com/webcast/7423/117065

Tweet this: Learn how to stop data breaches. Join @TrustedComputin for July 16 webinar on self-encrypting drives & protecting enterprise data http://bit.ly/1sr7fSp #SEDs #cybersecurity

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More