If SSD Encryption Is So Great, Why Doesn’t Everyone Use It?

Date Published: October, 28, 2015

TCG is delighted to support the Drive Trust Alliance (https://www.brightplaza.com/products/#tdta), which recently has been formed to promote the adoption of self-encrypting drives.

This week, October, 28, 3:00 p.m. East, the DTA and members will host a webinar on why and how to use self-encrypting drives. TCG and its members developed the underlying standards for SEDs, which encrypt data at rest constantly and on the fly to ensure its security. More on SEDs can be found in the TCG architect’s guide, http://www.trustedcomputinggroup.org/resources/tcg_data_security_architects_guide.

In the webinar, attendees will learn what factors are driving the adoption of self-encrypting drives – and why some choose to leave data unprotected.

Today, more and more data storage applications are adopting or requiring encrypted hardware solutions to reduce the risk of sensitive data falling into the wrong hands. The sheer volume of data breaches has led to major shifts in corporate policies and legal governance requirements, putting data protection responsibility on both the end-user and corporate officer. Hardware-based full disk encryption, in the form of Self-Encrypting SSDs, alleviates much of this financial, reputational, compliance and security risk without compromising performance. Despite these benefits, SED’s have not been universally adopted. In this webinar, Micron Sr. SSD Technical Marketing Engineer Jon Tanguy and self-encryption industry leader Dr. Robert Thibadeau of Carnegie-Mellon School of Computer Science, Bright Plaza and the Drive Trust Alliance, will look at the benefits of SEDs and some of the misperceptions that may be delaying widespread adoption of hardware encryption in personal laptop and enterprise storage applications.

Register for the webinar here,


Learn more about SEDs on the DTA site and at TCG’s site,




Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more


Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read More