TCG members WinMagic with LSI Corporation, Micron, PLEXTOR, Seagate, Samsung and Toshiba recently commissioned a study to determine what, if any, cost savings resulted from using self-encrypting drives, or SEDs, for data protection instead of software encryption.
The results were, frankly, astonishing. The Ponemon Institute research found that SEDs indeed represented a cost savings when used in lieu of more traditional software encryption – not just a little bit. Not some. But 75 percent.
As reported last week by WinMagic, the study noted:
SEDs are offered now by all major drive makers for clients. Enterprise storage solutions are offered by a number of vendors. Storage industry analyst Tom Coughlin has noted recently in Forbes magazine online that “…self-encrypting drive technology is an important tool in providing customer privacy and preventing unauthorized access to data. Whether in client or enterprise applications this technology provides solid benefits and helps companies meet compliance and privacy protection requirements. Self-encrypting storage technology avoids the additional overhead of software encryption approaches, providing real-time data protect without the wait.”
Coughlin, who has followed SEDs since their inception, also says, “…Hard disk drive and solid state drives utilizing the self-encrypting technology standardized by the Trusted Computing Group should become a common-place element in both client and storage array storage systems as suppliers and designers embrace these approaches to preserve the secrets of enterprise storage.”
Read more in the release from WinMagic and corresponding paper and watch this blog for more details and updates on SEDs.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.