How Self-Encrypting SSDs Enhance Data Security

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7

Any data stored on businesses' systems is an asset but it's also a liability. Stored on nearly every computer and/or server across a variety of industries, data is not just vulnerable in the event of accidental loss, it's also a high-value target for hackers and data thieves, who want everything from personal identification numbers and customer payment information, to contact lists and intellectual property. While improving data security requires extra precautions, the good news is that it doesn't have to be hard, expensive, or interrupt the user experience.

The best, yet often overlooked, step in protecting data stored on laptops, desktops and/or servers is encryption at the hardware level on the device's storage drive. Why? New systems often come with low-grade pre-installed hard drives which often lack encryption technology. If the hard drive does offer encryption, it's typically software-based, which is one of the weakest forms of encryption. Software-based encryption can also slow down system performance, while still leaving data at risk of being compromised.

The bottom line: If you needed someone to protect you, you'd rather have a strong, muscular person than a skinny bodyguard. When it comes to data security, the choice is similar – hardware-based encryption is a much stronger and more reliable option for protecting data than software-based encryption or, worst case scenario, no encryption at all. In this slideshow, Jonathan Weech, senior worldwide product manager, Crucial, takes a closer look at how self-encrypting SSDs enhance data security strategies.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.