The SSIF Solutions Guide to Data-At-Rest, newly revised, provides an educational overview on solutions to mitigate the threat of loss of physical control of storage media.
The Guide describes the various threats to networked storage systems, and describes how to evaluate current processes and security controls in place. It reviews a number of methods for mitigating these threats, including both the scope of available solutions and implementation choices. A capabilities comparison matrix compares and contrasts the available solutions. Finally, SSIF member Brocade, HP, IBM, NetApp, Seagate, Thales, and Wave solutions are each summarized to assist in product decisions.
Document Available for Download: Solutions Guide for Data-at-Rest
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.