Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

New Self Encrypting Drive Wipes Protected Data When Connected to an Unknown Host System

April 2011 by Marc Jacob

Toshiba has announced the first family of self-encrypting hard disk drives (HDDs) engineered to automatically invalidate protected data when connected to an unknown host. Applying industry first technology capabilities, the new Toshiba Self-Encrypting Drive (SED) models enable OEMs to configure different data invalidation options that align with various end-user scenarios. Designed to address the increasing need for IT departments to comply with privacy laws and regulations governing data security, the drives are ideally suited for PC, copier or multi-function printer and POS system products used in government, financial, medical or similar environments with an acute need to protect sensitive information.

Building on the industry-standard Trusted Computing Group “Opal” Specification, the new Toshiba MKxx61GSYG models leverage advanced access security and on-board encryption alongside second generation data wipe technology. Whether to protect against data loss resulting from lost or stolen notebooks or to maintain the security of document image data stored within copier and printer systems, Toshiba SEDs can securely invalidate protected data. Data invalidation attributes can be set for multiple data ranges, enabling targeted data in the drive to be rendered indecipherable by command, on power cycle, or on host authentication error. This flexibility provides systems designers with a powerful set of data security options that can be easily incorporated into existing system architecture.

With the latest enhancement to Toshiba’s SED technology, the risk of data theft is reduced in cases where the drive is removed from its defined host environment and connected to an unknown system. At power on, the SED and host perform an authentication process. If the authentication fails, the drive can be configured to simply deny access or crypto-erase sensitive user data.

Customer sampling and volume production of the MKxx61GSYG models will occur in Q2, and Toshiba will focus on working closely with targeted OEMs and security ISVs to help them closely integrate the latest wipe technology features.


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts