How Self-Encrypting SSDs Enhance Data Security

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next How Self-Encrypting SSDs Enhance Data Security-3 Next

Hardware vs. Software Encryption

Software- and hardware-based encryptions both add an additional layer of security to systems, but that is where the similarities end. Hardware-based encryption is a much stronger option over software-based encryption because it contains a host of additional security features like automatically encrypting every drive file and requiring stronger security protocols that rely on the operating system, all without slowing down system performance.

Any data stored on businesses' systems is an asset but it's also a liability. Stored on nearly every computer and/or server across a variety of industries, data is not just vulnerable in the event of accidental loss, it's also a high-value target for hackers and data thieves, who want everything from personal identification numbers and customer payment information, to contact lists and intellectual property. While improving data security requires extra precautions, the good news is that it doesn't have to be hard, expensive, or interrupt the user experience.

The best, yet often overlooked, step in protecting data stored on laptops, desktops and/or servers is encryption at the hardware level on the device's storage drive. Why? New systems often come with low-grade pre-installed hard drives which often lack encryption technology. If the hard drive does offer encryption, it's typically software-based, which is one of the weakest forms of encryption. Software-based encryption can also slow down system performance, while still leaving data at risk of being compromised.

The bottom line: If you needed someone to protect you, you'd rather have a strong, muscular person than a skinny bodyguard. When it comes to data security, the choice is similar – hardware-based encryption is a much stronger and more reliable option for protecting data than software-based encryption or, worst case scenario, no encryption at all. In this slideshow, Jonathan Weech, senior worldwide product manager, Crucial, takes a closer look at how self-encrypting SSDs enhance data security strategies.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.