TCG members have been shipping self-encrypting drives (SEDs) and associated management software for some time – in fact, some reports indicate that most, if not all, drives, will eventually include TCG’s SED standards. That includes not only hard disk drives, but solid state drives an enterprise storage offerings (report courtesy of Coughlin Associates).
As data breaches continue to make the news (and happen behind the scenes), attention has been shifting to how to best protect data. And the SEDs are a safe, effective and proven way to protect data at rest, with no impact on performance. Encryption is always on, can be managed remotely by administrators, and cannot be turned off by users. And, TCG’s standards enable instant erase, allowing for very efficient drive disposal or preparation for re-use.
A recent blog post by TCG member Micron provides some interesting notes around management of SEDs. “… The corporate IT manager will also need software at the client level and at the company IT level which will initiate the encryption protection, manage the organization’s fleet of mobile computers, and ultimately protect any sensitive data…”
Learn more about SEDs in TCG’s Architect’s guide. Also join TCG at its RSA Conference 2015 association session on Monday, April 20, 9 a.m. – 1 p.m., to hear from users about using trusted computing today.
Membership in the Trusted Computing Group is your key to participating with fellow industry stakeholders in the quest to develop and promote trusted computing technologies.
Standards-based Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.
Trusted Computing Group announced that its TPM 2.0 (Trusted Platform Module) Library Specification was approved as a formal international standard under ISO/IEC (the International Organization for Standardization and the International Electrotechnical Commission). TCG has 90+ specifications and guidance documents to help build a trusted computing environment.