Data Protection

Date Published: March, 01, 2015

Data ProtectionA7D27C29-1D09-3519-AD2B2495D0A71CF7 - Copy

Self-encrypting Drive (SED) solutions based on TCG specifications enable integrated encryption and access control within the protected hardware of the drive. Self-encrypting drives provide the industry’s preferred solution for full disk encryption, protecting data when the machines or drives are lost or stolen, as well as re-purposed, warranty repair, and end-of-life. TCG’s open standards provide multivendor interoperability, allowing application vendors to provide management for multiple SED providers.

Self Encrypting Drive Benefits:

  • Proven standards for data confidentiality
  • Hardware-based and optimized within the drive electronics

Loss Prevention

  • Compliance to state, federal, and international breach notification legislation; enables an encryption-based ‘safe-harbor’
  • Minimize risk of data theft when compared to traditional drive disposal technique
Better Performance
  • Encryption hardware, integrated into the drive controller, allows the drive to operate at full data rate with no performance degradation
  • Scalable solution – every drive contains an encryption engine
Stronger Security
  • Encryption always on and transparent to the user major compliance requirement
  • Keys for encryption are generated in the drive and never leave the drive
  • User authentication is performed by the drive before it will unlock, independent of the operating system
Easier to Use
  • Encryption is transparent to both users and application software
  • No impact on end-to-end processes, like compression, de-duplication, or data loss prevention
Lower Cost of Ownership
  • No need for complex infrastructure to manage encryption keys
  • Main processor cycles not used for encryption
  • No modifications to the operating system, applications or tools
  • Crypto-erase provides instant repurposing/decommissioning; drive is not destroyed
Self-Encrypting Drives in the Marketplace
Almost all HDD and SSD makers offer self-encrypting drives based on TCG specifications for laptop form factors and for enterprise drives, and a number of software vendors provide management software for enterprise deployment. Drives are offered in systems from Dell and many other PC makers.
A 2011 market analysis for SEDs from Coughlin Associates:
  • By 2017, all hard drives will be SED capable (encryption integration into the controller); over 25 percent are SED enabled today
  • By 2013, 80 percent of solid state drives, or SSDs, are SED capable; by 2014, penetration will near 100 percent


Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More