Data Protection

Data Protection

Self-encrypting Drive (SED) solutions based on TCG specifications enable integrated encryption and access control within the protected hardware of the drive. Self-encrypting drives provide the industry's preferred solution for full disk encryption, protecting data when the machines or drives are lost or stolen, as well as re-purposed, warranty repair, and end-of-life. TCG's open standards provide multivendor interoperability, allowing application vendors to provide management for multiple SED providers.

Self Encrypting Drive Benefits:

  • Proven standards for data confidentiality
  • Hardware-based and optimized within the drive electronics

Loss Prevention

  • Compliance to state, federal, and international breach notification legislation; enables an encryption-based 'safe-harbor'
  • Minimize risk of data theft when compared to traditional drive disposal technique
Better Performance
  • Encryption hardware, integrated into the drive controller, allows the drive to operate at full data rate with no performance degradation
  • Scalable solution - every drive contains an encryption engine
Stronger Security
  • Encryption always on and transparent to the user - major compliance requirement
  • Keys for encryption are generated in the drive and never leave the drive
  • User authentication is performed by the drive before it will unlock, independent of the operating system
Easier to Use
  • Encryption is transparent to both users and application software
  • No impact on end-to-end processes, like compression, de-duplication, or data loss prevention
Lower Cost of Ownership
  • No need for complex infrastructure to manage encryption keys
  • Main processor cycles not used for encryption
  • No modifications to the operating system, applications or tools
  • Crypto-erase provides instant repurposing/decommissioning; drive is not destroyed
Self-Encrypting Drives in the Marketplace
Almost all HDD and SSD makers offer self-encrypting drives based on TCG specifications for laptop form factors and for enterprise drives, and a number of software vendors provide management software for enterprise deployment. Drives are offered in systems from Dell and many other PC makers. 
A 2011 market analysis for SEDs from Coughlin Associates:
  • By 2017, all hard drives will be SED capable (encryption integration into the controller); over 25 percent are SED enabled today
  • By 2013, 80 percent of solid state drives, or SSDs, are SED capable; by 2014, penetration will near 100 percent

Wave Systems Case Sudy - Boston Medical Center

Wave Systems’ EMBASSY® software enforces centrally managed and unrivaled data security for the hospital’s 400 laptops.

January 2012 | Case Studies | Add to Briefcase


Mazda North American Operations

Wave Systems’ EMBASSY® software and Seagate self-encrypting hard drives help Mazda North American Operations achieve Japan’s Sarbanes Oxley (J-SOX) compliance.

June 2010 | Case Studies | Add to Briefcase


VEGA Deutschland

Wave Systems’ EMBASSY® software for managing self-encrypting hard drives provides unrivaled data security for VEGA’s laptops and minimizes administrative tasks.

June 2010 | Case Studies | Add to Briefcase


Data Protection for Regulatory Compliance

Wave EMBASSY(r) Remote Administration Server and Seagate full disk encryption (FDE) hard drives help CBI Health protect confidential patient and healthcare information

March 2009 | Case Studies | Add to Briefcase


St. Mary’s County Public Schools Keep Students on the Forefront of Science and Technology with Digital Learning Secured by Unified Access Control

With UAC, St. Mary’s was able to roll out a wireless one-to-one computing program to support its cutting-edge science, technology, engineering and math curriculum with confidence that data privacy and network security would be maintained.

February 2009 | Case Studies | Add to Briefcase


Wave Trusted Drive Manager and Seagate Full Disk Encryption (FDE) Hard Drives Help AdaptaSoft Protect Confidential Payroll Information

With ERAS, AdaptaSoft has a single, powerful tool to manage both FDE hard drives and Trusted Platform Modules (TPMs), ensuring future flexibility as these trusted devices replace software-based point solutions.

March 2008 | Case Studies | Add to Briefcase

  • 1-6