Self-encrypting Drives (SED) Overview

Date Published: September, 01, 2010

Self-Encrypting Drive Use Cases: Lost, Stolen, Re-purposed, End-of-Life, Warranty Repair: Whenever the Stored Data Leaves the Owner’s Control.

Self-encryption is superior to Software-based Solutions.

  • Transparency: No system or application modications required; encryption key generated in the factory by on-drive random number process; drive is always encrypting
  • Ease of management: No encryption key to manage; software vendors exploit standardized interface to manage SEDs, including remote management, pre-boot authentication, and password recovery
  • Disposal or re-purposing cost: With an SED, erase on-board encryption key
  • Re-encryption: With SED, there is no need to ever re-encrypt the data
  • Performance: No degradation in SED performance; hardware-based
  • Standardization: Whole drive industry is building to the TCG/SED Specications
  • Simplied: No interference with upstream processes
Self-Encrypting Drive Product Availability Listing
Click here to download the complete handout.
Tags:

Join

Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.

Join Now

Trusted Computing

Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.

Read more

Specifications

Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.

Read more
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.