Data Protection and Security Issues Drive Adoption of Widely Available Self-Encrypting Drives Based on Industry Standards

White Paper

Data encryption has received strong endorsement from the enactment of state, federal and international data protection legislation. At the same time, the shortcomings of software-only based encryption are well known to many users. Unfortunately, some users remain unaware of the potential to solve these problems with hardware-based encryption.

The experts in the Trusted Computing Group (TCG) recognized the shortcomings of software-based encryption some years ago. As a result, all of the leading drive manufacturers were involved in developing an industry-wide, open specification for hardware-based self-encrypting drives (SEDs).

Today, drives that meet the TCG SED specifications for both notebook PC drives and enterprise drives have been available for more than two years, an increasing number of different drive makers are offering these products, and a number of companies have integrated SEDs into their enterprise security programs. Still, misinformation and lack of understanding have prevented potential users from taking advantage of the benefits that these drives provide. This white paper will address these issues, provide the results of recent industry reports on encryption and identify several user case studies that are ideally suited to self-encrypting drives.

To read the entire whitepaper, download now!

Data encryption has received strong endorsement from the enactment of state, federal and international data protection legislation. At the same time, the shortcomings of software-only based encryption are well known to many users. Unfortunately, some users remain unaware of the potential to solve these problems with hardware-based encryption.

The experts in the Trusted Computing Group (TCG) recognized the shortcomings of software-based encryption some years ago. As a result, all of the leading drive manufacturers were involved in developing an industry-wide, open specification for hardware-based self-encrypting drives (SEDs).

Today, drives that meet the TCG SED specifications for both notebook PC drives and enterprise drives have been available for more than two years, an increasing number of different drive makers are offering these products, and a number of companies have integrated SEDs into their enterprise security programs. Still, misinformation and lack of understanding have prevented potential users from taking advantage of the benefits that these drives provide. This white paper will address these issues, provide the results of recent industry reports on encryption and identify several user case studies that are ideally suited to self-encrypting drives.

To read the entire whitepaper, download now!

Data encryption has received strong endorsement from the enactment of state, federal and international data protection legislation. At the same time, the shortcomings of software-only based encryption are well known to many users. Unfortunately, some users remain unaware of the potential to solve these problems with hardware-based encryption.

The experts in the Trusted Computing Group (TCG) recognized the shortcomings of software-based encryption some years ago. As a result, all of the leading drive manufacturers were involved in developing an industry-wide, open specification for hardware-based self-encrypting drives (SEDs).

Today, drives that meet the TCG SED specifications for both notebook PC drives and enterprise drives have been available for more than two years, an increasing number of different drive makers are offering these products, and a number of companies have integrated SEDs into their enterprise security programs. Still, misinformation and lack of understanding have prevented potential users from taking advantage of the benefits that these drives provide. This white paper will address these issues, provide the results of recent industry reports on encryption and identify several user case studies that are ideally suited to self-encrypting drives.

To read the entire whitepaper, download now!