Self-Encrypting Drives (SEDs) Reach 100 Percent Penetration for Flash and Enterprise Storage Devices
Some years ago, a group of visionary storage experts convened in the Trusted Computing Group to find a better way to protect data at rest and a more efficient way to properly dispose of or re-provision drives.
As a result of that effort, TCG created the first standards for self-encrypting drives, or SEDs. As can be expected in a complex supply chain and enterprise computing environment, new approaches often take time to become widely available and used. SEDs were no exception; despite early and enthusiastic support including shipping products from market leaders such as Seagate, Fujitsu, Hitachi and others, SEDs have inevitably taken a few years to reach critical mass.
But critical mass is here. Right now, in 2015, 100 percent of new enterprise solid state, or flash, drives support TCG’s SED standards. Why? Because these drives not only provide constant always-on encryption transparent to users with no impact on performance, they also give those responsible for managing such drives a very efficient and effective way to sanitize these drives – instantly. Using these drives enables companies to meet a number of legal requirements for data breach protection, and enterprises are saving big money with the ability to re-use drives without fear of data leakage – or the ugly headlines, legal costs and loss of credibility that comes with breaches.
What about the enterprise, where companies are storing increasing amounts of highly sensitive data on employees, customers, business processes and products? All new enterprise storage devices available today also support TCG standards for self encryption. Again, a driving factor for use of these drives is the effective instant data erasure capabilities as well as ongoing and transparent encryption in hardware.
Where are these SEDs being used? All new office copiers and printers use SEDs to protect against data leakage. Apple iOS devices include encrypting flash drives of user data to protect passwords and keys used in authentication and transactions. Data centers, such as ones run by Facebook and others, use SEDs to protect data.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.