SEDs Great for Business, Says Samsung

Date Published: March, 01, 2014

Since 2009, TCG has talked about the many benefits of SEDs, or self-encrypting drives. These little wonders encrypt data on the fly, constantly, with no impact on drive or system performance and without user intervention. More and more vendors, from HDD, SSD and other storage vendors to third party software applications, now offer SEDs or management applications for them via a number of PC and system OEMs and now, directly to consumers.

Among the many vendors supporting SEDs include Samsung with SSDs along with Seagate, HGST, Toshiba, Crucial, Intel, Kingston, Micron, SK Hynix, CMS Products and many more. Wave Systems, WinMagic and others provide management applications.

Samsung recently created a fabulous infographic it created on the many benefits of SEDs. Some takeaways:

– 267 million data breaches 2012
– Average cost per breach is $5.4 million
– SEDS have encryption right in the drive meaning no performance hit and users can’t turn it off, as often happened traditionally with SW encryption
– Drives can be sanitized almost instantaneously

Samsung notes that SEDs are less than .80 cents per gigabyte, so any argument about cost is negated.

Samsung’s blog post is available here.

Tags:

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More