Data Protection

Data Protection

Self-encrypting Drive (SED) solutions based on TCG specifications enable integrated encryption and access control within the protected hardware of the drive. Self-encrypting drives provide the industry's preferred solution for full disk encryption, protecting data when the machines or drives are lost or stolen, as well as re-purposed, warranty repair, and end-of-life. TCG's open standards provide multivendor interoperability, allowing application vendors to provide management for multiple SED providers.

Self Encrypting Drive Benefits:

Encryption
  • Proven standards for data confidentiality
  • Hardware-based and optimized within the drive electronics

Loss Prevention

  • Compliance to state, federal, and international breach notification legislation; enables an encryption-based 'safe-harbor'
  • Minimize risk of data theft when compared to traditional drive disposal technique
Better Performance
  • Encryption hardware, integrated into the drive controller, allows the drive to operate at full data rate with no performance degradation
  • Scalable solution - every drive contains an encryption engine
Stronger Security
  • Encryption always on and transparent to the user - major compliance requirement
  • Keys for encryption are generated in the drive and never leave the drive
  • User authentication is performed by the drive before it will unlock, independent of the operating system
Easier to Use
  • Encryption is transparent to both users and application software
  • No impact on end-to-end processes, like compression, de-duplication, or data loss prevention
Lower Cost of Ownership
  • No need for complex infrastructure to manage encryption keys
  • Main processor cycles not used for encryption
  • No modifications to the operating system, applications or tools
  • Crypto-erase provides instant repurposing/decommissioning; drive is not destroyed
Self-Encrypting Drives in the Marketplace
Almost all HDD and SSD makers offer self-encrypting drives based on TCG specifications for laptop form factors and for enterprise drives, and a number of software vendors provide management software for enterprise deployment. Drives are offered in systems from Dell and many other PC makers. 
 
A 2011 market analysis for SEDs from Coughlin Associates:
  • By 2017, all hard drives will be SED capable (encryption integration into the controller); over 25 percent are SED enabled today
  • By 2013, 80 percent of solid state drives, or SSDs, are SED capable; by 2014, penetration will near 100 percent
icon

TCG Educational Webcasts

View the TCG hosted BrightTalk webcast channel.

May 2014 | Podcasts/Webcasts | Add to Briefcase

icon

Videos: Introduction to Trusted Computing

The Open Security Training Team has developed coursework as an introduction to Trusted Computing.

January 2013 | Podcasts/Webcasts | Add to Briefcase

icon

Hardening Private Keys with Less Hassle, Less Cost and More Security: A Case Study in Authentication

An InformationWeek and Trusted Computing Group Webcast, "Hardening Private Keys with Less Hassle, Less Cost and More Security: A Case Study in Authentication".

September 2011 | Podcasts/Webcasts | Add to Briefcase

icon

Commonly Asked Questions and Answers on Self-encrypting Drives

Answers to the Questions posed during TCG's Webcast on November 18, 2011, "Where is Your Data Tonight? A Lesson in Avoiding Headlines, Fines, or Worse"

January 2011 | Podcasts/Webcasts | Add to Briefcase

icon

Protecting Your Data, the Network and What’s Next for Trusted Computing

Recently, experts who have been involved in developing some of the key Trusted Computing technologies spoke about the future of these technologies, why users should implement them, and general security issues. TCG has captured these short interviews.

November 2010 | Podcasts/Webcasts | Add to Briefcase

icon

"Evil Maid" Attacks on Encrypted Hard Drives

"The real defense here is trusted boot, something Trusted Computing is supposed to enable...BitLocker...can prevent these sorts of attacks if the computer has a TPM module, version 1.2 or later, on the motherboard."

November 2009 | Podcasts/Webcasts | Add to Briefcase

icon

Five Great Reasons to Adopt Trusted Computing

Trusted Computing is perhaps one of the most misunderstood (willfully misunderstood, to be frank about it) emergent technologies for computer security.

November 2009 | Podcasts/Webcasts | Add to Briefcase

icon

New WPA Wi-Fi security attacks, and counter-measures; TPM chips are in millions of PCs, and can be used for two factor authentication

Steve Sprague, Wave Systems Corp. participates in a data security podcast

October 2008 | Podcasts/Webcasts | Add to Briefcase

  • 1-10