How Self-Encrypting SSDs Enhance Data Security

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next How Self-Encrypting SSDs Enhance Data Security-5 Next

Purchasing an SSD

When purchasing an SSD, make sure the drive you choose has passed all three of the major industry encryption standards, including Microsoft® eDrive®, IEEE-1667, and TCG Opal 2.0.

Any data stored on businesses' systems is an asset but it's also a liability. Stored on nearly every computer and/or server across a variety of industries, data is not just vulnerable in the event of accidental loss, it's also a high-value target for hackers and data thieves, who want everything from personal identification numbers and customer payment information, to contact lists and intellectual property. While improving data security requires extra precautions, the good news is that it doesn't have to be hard, expensive, or interrupt the user experience.

The best, yet often overlooked, step in protecting data stored on laptops, desktops and/or servers is encryption at the hardware level on the device's storage drive. Why? New systems often come with low-grade pre-installed hard drives which often lack encryption technology. If the hard drive does offer encryption, it's typically software-based, which is one of the weakest forms of encryption. Software-based encryption can also slow down system performance, while still leaving data at risk of being compromised.

The bottom line: If you needed someone to protect you, you'd rather have a strong, muscular person than a skinny bodyguard. When it comes to data security, the choice is similar – hardware-based encryption is a much stronger and more reliable option for protecting data than software-based encryption or, worst case scenario, no encryption at all. In this slideshow, Jonathan Weech, senior worldwide product manager, Crucial, takes a closer look at how self-encrypting SSDs enhance data security strategies.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.