backtop


Print 13 comment(s) - last by ViroMan.. on Apr 18 at 12:55 AM

Drives using technology to ship in Q1 2010

Toshiba has announced its latest self-encrypting drive technology [PDF] at the RSA conference in San Francisco. The technology is slated to be introduced early in 2010 and supports the Trusted Computing Group Storage Architecture Core Specification along with the Storage Security Subsystem Class Opal Specification.

The technology is built around NIST-certified AES encryption technology that is fully integrated with the drive controller chip. That means that the encryption process takes place at full I/O speeds to deliver performance and maintain typical power consumption figures.

Toshiba's Scott Wright said in a statement, "We believe the key to delivering robust data security lies in the creation of technology standards that advance a secure client storage platform the entire PC ecosystem can support. The TCG Storage specifications provide a standards-based framework enabling storage device makers to work with leading ISVs such as Wave Systems to create very robust client security solutions that are more secure, easier to manage and easier to deploy. “

“To help customers realize these benefits, Toshiba is focused on delivering a full array of hardware-embedded security features to security management solutions providers as evidenced in this first demonstration at the RSA Conference," Wright continued.

Drives supporting the new self-encryption specification with TCG-Opal SSC support will be available in Q1 2010 and Toshiba says that the technology was developed in cooperation with Wave Systems.

Lark Allen from Wave Systems said, "Self-encrypting drives provide a great defense against the growing problem of data breaches today, offering performance and security advantages over aftermarket software encryption solutions. Toshiba is at the forefront of the movement to bring an integrated, hardware-based solution to today’s enterprise. Because Toshiba drives are based on the TCG’s Opal Storage Specification, they’re ideal for deploying across heterogeneous environments."



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

RE: Locking yourself out
By Etern205 on 4/17/2009 1:26:40 AM , Rating: 2

Aren't all back doors insecure?
And what does it have to with with a user being dead, win the lottery or so on? Yes the Corp can hire someone to break the code and get in, but that is not the point.

The point of having one is to allow the rightful owner get access in case of a major hardware failure (bad motherboard).

As for these FDE drives, I doubt they store the password right onto the drive itself. It's most likely stored on the motherboard bios or a TPM module.

Looks like you lack the knowledge about hardware based encryption.


"Intel is investing heavily (think gazillions of dollars and bazillions of engineering man hours) in resources to create an Intel host controllers spec in order to speed time to market of the USB 3.0 technology." -- Intel blogger Nick Knupffer

Related Articles













botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki