Protect Your Data
Understand encryption and security types to make sure your important data is safe.
Critical Areas of Data Protection
Three key areas of data protection are outlined below.
Encryption
Ensure data on the drive is securely encrypted
We offer drives with and without hardware-based encryption. Drives with encryption use AES-256 to encrypt user data at rest.
Access Control
Configure the drive to only allow access to authenticated users
We offer drives with industry-standard access control methods, including ATA Security Feature Set and various TCG SSCs (subsystem classes).
Data Sanitization
Securely erase the data when decommissioning the drive
All drives offer sanitize features that when operated correctly are consistent with the “Purge” function described by the NIST SP 800-88 guidelines for media sanitization.
Compare Security Types
Learn about the four main security types we offer, and discover which may be best for you.
Security Type | User Data Encrypted At Rest | Data Access Control | Preferred NIST Purge- Compliant Erase | External Certification of Security Protocol |
Secure Erase (SE) ⓘ Shop Now |
— | ATA Security (SATA only) | Sanitize Overwrite (HDD) Sanitize Block Erase (SSD) |
— |
Instant Secure Erase (ISE) ⓘ Shop Now |
✔ | ATA Security (SATA only) | All of the above, plus Crypto Erase | — |
Trusted Computing Group (TCG) ⓘ Shop Now |
✔ | TCG-SSC | All of the above, plus Revert | — |
TCG-FIPS ⓘ Shop Now |
✔ | TCG-SSC | All of the above | ✔ FIPS 140-2 Certification by NIST-approved labs1 |
Have a question about data security?
Disclosures
1. FIPS 140-3 in progress on certain products.
References to certain features or services do not imply that they will be made available in all countries or an all products.