backtop


Print 13 comment(s) - last by ViroMan.. on Apr 18 at 12:55 AM

Drives using technology to ship in Q1 2010

Toshiba has announced its latest self-encrypting drive technology [PDF] at the RSA conference in San Francisco. The technology is slated to be introduced early in 2010 and supports the Trusted Computing Group Storage Architecture Core Specification along with the Storage Security Subsystem Class Opal Specification.

The technology is built around NIST-certified AES encryption technology that is fully integrated with the drive controller chip. That means that the encryption process takes place at full I/O speeds to deliver performance and maintain typical power consumption figures.

Toshiba's Scott Wright said in a statement, "We believe the key to delivering robust data security lies in the creation of technology standards that advance a secure client storage platform the entire PC ecosystem can support. The TCG Storage specifications provide a standards-based framework enabling storage device makers to work with leading ISVs such as Wave Systems to create very robust client security solutions that are more secure, easier to manage and easier to deploy. “

“To help customers realize these benefits, Toshiba is focused on delivering a full array of hardware-embedded security features to security management solutions providers as evidenced in this first demonstration at the RSA Conference," Wright continued.

Drives supporting the new self-encryption specification with TCG-Opal SSC support will be available in Q1 2010 and Toshiba says that the technology was developed in cooperation with Wave Systems.

Lark Allen from Wave Systems said, "Self-encrypting drives provide a great defense against the growing problem of data breaches today, offering performance and security advantages over aftermarket software encryption solutions. Toshiba is at the forefront of the movement to bring an integrated, hardware-based solution to today’s enterprise. Because Toshiba drives are based on the TCG’s Opal Storage Specification, they’re ideal for deploying across heterogeneous environments."



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

I wonder...
By Moishe on 4/16/2009 11:22:05 AM , Rating: 2
How long it will be before these are cracked on a general basis? What about a virus can can live on the bios?

There are several questions I have about how this works too.
How do you enter the key/reset the password, etc. Are we talking about bios level?

I would think the logical answer would be that you have to enter a password when the hard drive is first accessed. All of the encryption software (password set, change, etc) would need to be on the drive's bios.




RE: I wonder...
By SlyNine on 4/16/2009 9:16:14 PM , Rating: 2
I've never heard of someone cracking AES and its been around along time. Sure brutforce atacks work given quantum computers and a few thousand years perhaps.

But then agian if it was cracked I'm not sure anyone would be telling.

I'll still with truecrypt that way I can get the data if the something happens to the rest of the computer.


“And I don't know why [Apple is] acting like it’s superior. I don't even get it. What are they trying to say?” -- Bill Gates on the Mac ads

Related Articles













botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki