New Research Says by 2017, 100 Percent of HDDs will be SED Capable; Almost all SSDs Already SEDs

Date Published: May, 01, 2015

A new report from Coughlin Associates indicates that a significant number of hard disk drives and solid state drives support self-encrypting drive, or SED, capabilities, which are based on standards created by TCG.

The report looks at the growth of SED-capable devices, in which self-encryption is built into the device. In addition, the report examines the growth of security-enabled SED devices, and then takes a look at the adoption of devices for security.  Market drivers are examined and the potential impact on the growth of SEDs is evaluated.

The report includes projections and historical data, growth factors and a number of charts and graphs related to the content.

For more information and to purchase the report, go to,%20041215.pdf.

TCG standards-based SEDs currently ship from most if not all drive makers and include HDD, SSD, hybrid and enterprise storage systems. A number of software vendors support SEDs with management tools that allow remote set-up and management of drives, which encrypt data at rest with an encryption key stored in hardware and enable micro-erase for instant erasure and re-use or disposal.

More info on SEDs is available at



Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More