Overview of Data Security Methods: Passwords, Encryption, and Erase
|
|
- William Walters
- 8 years ago
- Views:
Transcription
1 Overview of Data Security Methods: Passwords, Encryption, and Erase Chris Budd SMART High Reliability Solutions Santa Clara, CA 1
2 Overview of Data Security Methods Introduction Data Protection Passwords Encryption Write Protect Questions to Ask Conclusion Data Elimination Erasing Overwrite External Triggers Santa Clara, CA 2
3 Introduction Data security important in all areas of storage Data security has two main components Data Protection Data Elimination Opposites? No. Both guard data from unauthorized access Santa Clara, CA 3
4 Introduction Data protection guards data from access First step of data security Keeps data for use only by authorized users Includes passwords and encryption Santa Clara, CA 4
5 Introduction Data elimination guards data from access Must be last step before adversary obtains drive Removes data before adversary can access it Includes erasing encryption key, and possibly data Santa Clara, CA 5
6 Introduction Additional features for military and industrial Write protect Overwrite after an erase External erase triggers Santa Clara, CA 6
7 Data Protection Passwords Passwords are similar to combination lock on storage shed ATA specifies 32-byte password Binary: 1 in or 1 in 1.16 x ASCII: 1 in or 1 in 1.94 x Automatically locks after reset or power cycle 5 attempts to unlock; then drive must be reset Santa Clara, CA 7
8 Data Protection Encryption Self-Encrypting Drives (SED) No user or host intervention Could erase encryption key in milliseconds If user did not erase before adversary acquires the drive, then encryption is worthless without a password Santa Clara, CA 8
9 Data Protection Encryption If no password, adversary has access to data If password set, adversary must break password or remove flash chips Wear leveling places data randomly Similar to jigsaw puzzle with picture distorted Santa Clara, CA 9
10 Data Protection Write Protect Reasons Protect collected data after mission Protect map data during flight Activation Vendor specific ATA command External pins, but implementation varies Santa Clara, CA 10
11 Data Elimination Erase First step for SED is erase encryption key Crypto or cryptographic erase Normal read/write access useless Encrypted data remains in NAND Santa Clara, CA 11
12 Data Elimination Erase Some SSDs may erase data blocks If user set a password, and if SSD includes crypto and block erase Adversary removing flash chips is similar to jigsaw puzzle with all pieces same shape and same blank picture Santa Clara, CA 12
13 Data Elimination Overwrite Crypto and block erase not always sufficient Some agencies require overwrite IRIG , Chapter 10 Two overwrites: 0x55, then 0xAA All blocks processed; no exclusions Santa Clara, CA 13
14 Data Elimination External Triggers If cannot rely on SW erase command Erase based on hardware input Push button or electrical switch Implementation varies Front or back Shorted or power Santa Clara, CA 14
15 Questions to Ask Crypto or block erase? If block erase, which blocks? Mapping information? User data? Entire contents of NAND flash? Overwrite blocks? Santa Clara, CA 15
16 Questions to Ask How does user know when drive done? LEDs for states: normal, erasing, initializing? Software commands (S.M.A.R.T. attributes)? Does the drive resume after power cycle? Can end user read entire contents of NAND flash to verify? Santa Clara, CA 16
17 Conclusion Data protection Passwords and encryption Keeps data only for authorized users Data elimination Crypto erase and block erase No more data; not even for authorized users Santa Clara, CA 17
18 Conclusion Additional requirements For military and industrial applications Write protect, overwrite, & external erase triggers Ask your SSD vendor tough questions Complete your overall system security design Pass the scrutiny of IA security officer Santa Clara, CA 18
19 Conclusion SMART High Reliability Solutions Has over 20 years of experience in solid-state storage Knows well the data security requirements of military and industrial applications Ask us your data security questions See us in booth #627 Santa Clara, CA 19
Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant
Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant Flash Memory Summit 2014 Santa Clara, CA 1 The Problem 2005-2013: over 864,108,052
More informationEncrypted SSDs: Self-Encryption Versus Software Solutions
Encrypted SSDs: Self-Encryption Versus Software Solutions Michael Willett Storage Security Strategist and VP Marketing Bright Plaza Flash Memory Summit 2015 Santa Clara, CA 1 The Problem 2005-2013: over
More informationXTREMIO DATA AT REST ENCRYPTION
White Paper XTREMIO DATA AT REST ENCRYPTION Abstract Data at Rest Encryption is a mandatory requirement in various industries that host private or sensitive data. This white paper introduces and explains
More informationIndustrial Flash Storage Trends in Software and Security
January 22, 2013 Industrial Flash Storage Trends in Software and Security Many flash storage devices in embedded applications are used to save data but also function as disks for the OS. Most users are
More informationATA Flash Drive 187. RoHS Compliant. High-capacity Product Specifications. February 6 th, 2014. Version 1.0. Apacer Technology Inc.
RoHS Compliant ATA Flash Drive 187 High-capacity Product Specifications February 6 th, 2014 Version 1.0 Apacer Technology Inc. 1F, No.32, Zhongcheng Rd., Tucheng Dist., New Taipei City, Taiwan, R.O.C Tel:
More informationKeep Your Data Secure: Fighting Back With Flash
Keep Your Data Secure: Fighting Back With Flash CONTENTS: Executive Summary...1 Data Encryption: Ensuring Peace of Mind...2 Enhanced Encryption and Device Decommission in the Enterprise...3 Freeing Up
More informationIndustrial Grade Embedded Flash Storage Devices
Product Line Data Sheet Industrial Grade Embedded Flash Storage Devices L ong Life Cycles - Fixed BOM Control I ndustry Leading: R ugged, Reliable, Based on select SLC NAND components Handling of Unexpected
More informationSolid-State Drives with Self-Encryption: Solidly Secure
Solid-State Drives with Self-Encryption: Solidly Secure 09/22/2011 Michael Willett Storage Security Strategist SAMSUNG SOLID STATE DRIVES Solid-State Drives SSD ADVANTAGES SOLID STATE DRIVES Save $$ on
More informationTechnical Note. Installing Micron SEDs in Windows 8 and 10. Introduction. TN-FD-28: Installing Micron SEDs in Windows 8 and 10.
Technical Note Installing Micron SEDs in Windows 8 and 10 TN-FD-28: Installing Micron SEDs in Windows 8 and 10 Introduction Introduction Self-encrypting drives (SEDs) can provide an effective way of protecting
More informationSerial ATA Flash Drive
RoHS Compliant Serial ATA Flash Drive msata Mini M4 Product Specifications November 7 th, 2012 Version 1.1 Apacer Technology Inc. Apacer Technology Inc. 9/F, No. 100, Hsin Tai Wu Rd., Hsichih, Taipei Hsien
More informationData Security using Encryption in SwiftStack
Data Security using Encryption in SwiftStack May 2015 Copyright 2015 SwiftStack, Inc. swiftstack.com Page 1 of 11 Table of Contents Introduction... 3 Defining Three Threat Models... 3 Encrypted Data and
More informationSerial ATA Flash Drive
RoHS Compliant Serial ATA Flash Drive SAFD25M4 Product Specifications June 13 th, 2013 Version 1.5 Apacer Technology Inc. Apacer Technology Inc. 9/F, No. 100, Hsin Tai Wu Rd., Hsichih, Taipei Hsien 221,
More informationSerial ATA Flash Drive
RoHS Compliant Serial ATA Flash Drive msata M4 Product Specifications May 4 th, 2012 Version 1.3 Apacer Technology Inc. Apacer Technology Inc. 9/F, No. 100, Hsin Tai Wu Rd., Hsichih, Taipei Hsien 221,
More informationSerial ATA Flash Drive
RoHS Compliant Serial ATA Flash Drive SFD25A Product Specifications July 10 th, 2014 Version 1.1 Apacer Technology Inc. 1F, No.32, Zhongcheng Rd., Tucheng Dist., New Taipei City, Taiwan, R.O.C Tel: +886-2-2267-8000
More informationChallenges and Solutions for Effective SSD Data Erasure
Challenges and Solutions for Effective SSD Data Erasure Blancco White Paper Published 8 October 2013 First Edition Table of contents Introduction...3 The Simplicity And Complexity Of SSDs...4 Traditional
More informationSerial ATA Flash Drive
RoHS Compliant Serial ATA Flash Drive msata A1 Product Specifications July 10 th, 2014 Version 1.3 Apacer Technology Inc. 1F, No.32, Zhongcheng Rd., Tucheng Dist., New Taipei City, Taiwan, R.O.C Tel: +886-2-2267-8000
More informationSECURE USB FLASH DRIVE. Non-Proprietary Security Policy
SECURE USB FLASH DRIVE Non-Proprietary Security Policy FIPS 140-2 SECURITY POLICY VERSION 9 Page 1 of 10 Definitions and Acronyms AES Advanced Encryption Standard CBC Cipher Block Chaining CRC Cyclic Redundancy
More informationMeasuring Interface Latencies for SAS, Fibre Channel and iscsi
Measuring Interface Latencies for SAS, Fibre Channel and iscsi Dennis Martin Demartek President Santa Clara, CA 1 Demartek Company Overview Industry analysis with on-site test lab Lab includes servers,
More informationSamsung SED Security in Collaboration with Wave Systems
Samsung SED Security in Collaboration with Wave Systems Safeguarding sensitive data with enhanced performance, robust security, and manageability Samsung Super-speed Drive Secure sensitive data economically
More informationSerial ATA Flash Drive
RoHS Recast Compliant Serial ATA Flash Drive msata M4 Product Specifications April 22 nd, 2013 Version 1.8 Apacer Technology Inc. Apacer Technology Inc. 9/F, No. 100, Hsin Tai Wu Rd., Hsichih, Taipei Hsien
More informationSerial ATA Flash Drive
RoHS Recast Compliant Serial ATA Flash Drive msata M4 -M Product Specifications March 12 th, 2013 Version 1.8 Apacer Technology Inc. Apacer Technology Inc. 9/F, No. 100, Hsin Tai Wu Rd., Hsichih, Taipei
More informationSerial ATA Flash Drive
RoHS Compliant Serial ATA Flash Drive SFD25A -M Product Specifications September 19 th, 2014 Version 1.6 Apacer Technology Inc. 1F, No.32, Zhongcheng Rd., Tucheng Dist., New Taipei City, Taiwan, R.O.C
More informationTechnical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates
Technical Proposal on ATA Secure Erase Gordon Hughes+ and Tom Coughlin* +CMRR, University of California San Diego *Coughlin Associates Introduction and Summary Secure erase SE is defined in the ATA specification
More informationCHAPTER 11: Flip Flops
CHAPTER 11: Flip Flops In this chapter, you will be building the part of the circuit that controls the command sequencing. The required circuit must operate the counter and the memory chip. When the teach
More informationFIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive
FIPS 140 2 Non Proprietary Security Policy Kingston Technology Company, Inc. DataTraveler DT4000 G2 Series USB Flash Drive Document Version 1.8 December 3, 2014 Document Version 1.8 Kingston Technology
More informationHP FutureSmart Firmware Device Hard Disk Security
HP FutureSmart Firmware Device Hard Disk Security Summary: This document discusses hard disk security for HP FutureSmart Firmware printing devices. Contents: Overview... 2 Secure Erase Commands... 2 1.
More informationSSD Server Hard Drives for IBM
New for 2011! Axiom is introducing a new line of SSD Hot-Swap Server Hard Drives. Our high performance SSD hard drives have been paired with system specific Hot-Swap trays to deliver seamless integration
More informationFLASH USB 2. 0. Introduction ENGLISH
ENGLISH FLASH RED LED (LOCKED) GREEN LED (UNLOCKED) KEY BUTTON PIN KEYS BLUE LED (ACTIVITY) Introduction Thank you for purchasing the Corsair Your new Flash Padlock 2 is a 256-bit hardware encrypted USB
More informationStrategies for Firmware Support of Self-Encrypting Drives
presented by Strategies for Firmware Support of Self-Encrypting Drives UEFI Winter Plugfest February 21-23, 2011 Presented by Jeff Bobzin (Insyde Software, Inc.) Updated 2011-06-01 UEFI Plugfest February
More informationDestroying Flash Memory-Based Storage Devices (draft v0.9)
Destroying Flash Memory-Based Storage Devices (draft v0.9) Dr. Steven Swanson Director, Non-volatile Systems Laboratory Department of Computer Science and Engineering University of California, San Diego
More informationFeatures. SSD370S SATA III 6Gb/s SSD. Advanced Global Wear-Leveling and Block management for reliability
SSD370S SATA III 6Gb/s SSD Due to Ultra-slim (fit the standard dimensions of 2.5 SATA Hard Disk Drives), huge capacity, SATA 6Gb/s speed, and low power consumption, Solid State Drive is the perfect replacement
More informationMontgomery Auditorium
Montgomery Auditorium Projector Screen Document Camera Computer Monitor Smart Classroom Quick Start Guide Orientation Montgomery Auditorium Computer Monitor Document Camera AMX Remote Booth Phone Cabinet
More informationIntel Solid State Drive Toolbox
3.3.5 Document Number: 325993-026US Intel technologies features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending
More informationUsing Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012
Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012 Contact the ITS Helpdesk at 402-559-7700 or helpdesk@unmc.edu with questions. How it works Basically, BitLocker
More information3.1 Backup and Recovery System
3.1 Backup and Recovery System FriendlyARM English User Manual 197 In the development process, we often need to constantly update the programmer and system debugging, and sometimes you will be with the
More information1. System Requirements
BounceBack Data Transfer 14.2 User Guide This guide presents you with information on how to use BounceBack Data Transfer 14.2. Contents 1. System Requirements 2. Attaching Your New Hard Drive To The Data
More informationDESIGNING SECURE USB-BASED DONGLES
DESIGNING SECURE USB-BASED DONGLES By Dhanraj Rajput, Applications Engineer Senior, Cypress Semiconductor Corp. The many advantages of USB Flash drives have led to their widespread use for data storage
More informationAES 256-BIT HARDWARE ENCRYPTED USB FLASH DRIVES & SSD
AES 256-BIT HARDWARE ENCRYPTED USB FLASH DRIVES & SSD Integral Encrypted USB Product Range About Integral Memory plc Integral Memory was established in 1989 and has been involved in the flash storage industry
More informationOpal SSDs Integrated with TPMs
Opal SSDs Integrated with TPMs August 21, 2012 Robert Thibadeau, Ph.D. U.S. Army SSDs Must be Opal s We also Studied using the TPM (Trusted Platform Module) with an Opal SSD (Self-Encrypting Drive) 2 Security
More informationFlash Memory Solutions for Small Business
Optimization Techniques Change the Competitive Landscape Jered Floyd CTO, Permabit Technology Corp. Flash Memory Summit 2013 Santa Clara, CA 1 Permabit and Albireo Overview Headquarters: Cambridge, MA
More informationSOLID STATE DRIVES AND PARALLEL STORAGE
SOLID STATE DRIVES AND PARALLEL STORAGE White paper JANUARY 2013 1.888.PANASAS www.panasas.com Overview Solid State Drives (SSDs) have been touted for some time as a disruptive technology in the storage
More informationCan Flash help you ride the Big Data Wave? Steve Fingerhut Vice President, Marketing Enterprise Storage Solutions Corporation
Can Flash help you ride the Big Data Wave? Steve Fingerhut Vice President, Marketing Enterprise Storage Solutions Corporation Forward-Looking Statements During our meeting today we may make forward-looking
More informationTufts University. COMP116 Introduction to Computer Security. Recovery After Losing the Physical Device
Tufts University COMP116 Introduction to Computer Security Recovery After Losing the Physical Device Dec. 11 th 2014 Author: Haoyang Mao Mentor: Ming Chow 1 Abstract The only truly secure system is one
More informationThis is an example of MFP password entry in the administration mode for hard-disk protection:
Data security Hard disk password protection The built-in hard disk of the MFP is automatically protected by a password. This password is stored in the hard disk BIOS and prevents access to the hard disk
More informationNew Drive Technologies Enable Strong Data Protection Strategies: Managing Self-Encrypting Drives in the Enterprise
New Drive Technologies Enable Strong Data Protection Strategies: Managing Self-Encrypting Drives in the Enterprise Contents Addressing Common Encryption Issues... 2 Always-On Encryption... 2 Timesavings...
More information256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE
256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE USB 3.0 USB 2.0 SSD integralmemory.com About Us Introducing Integral Memory plc are one of the largest digital memory producers in Europe with more than 20
More information256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE
256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE USB 3.0 USB 2.0 SSD integralmemory.com About Us Introducing Integral Memory plc are one of the largest digital memory producers in Europe with more than 20
More informationQuick Reference Guide. Online Courier: FTP. Signing On. Using FTP Pickup. To Access Online Courier. https://onlinecourier.suntrust.
Quick Reference Guide Online Courier: FTP https://onlinecourier.suntrust.com With SunTrust Online Courier, you can have reports and files delivered to you using an FTP connection. There are two delivery
More informationAcceptable Encryption Usage for UTHSC
This document explains the acceptable use of encryption for the UTHSC system. It includes: acceptable encryption software, techniques, algorithms and instructions. Encryption methods and software are arranged
More informationIntel Solid State Drive Toolbox
3.3.6 Document Number: 325993-027US Intel technologies features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending
More informationAPPLICATION NOTE. AT07175: SAM-BA Bootloader for SAM D21. Atmel SAM D21. Introduction. Features
APPLICATION NOTE AT07175: SAM-BA Bootloader for SAM D21 Atmel SAM D21 Introduction Atmel SAM Boot Assistant (Atmel SAM-BA ) allows In-System Programming (ISP) from USB or UART host without any external
More informationFrequently Asked Questions: EMC Isilon Data at Rest Encryption Solution
1 Frequently Asked Questions: EMC Isilon Data at Rest Encryption Solution Table of Contents What s New? Target Customers Customer Benefits Competitive Positioning Technical Sales Questions General Sales
More information1-10 The USB PIC K150 microcontroller programmer Hardware version V2.0 File version V2.0 Product Image
1-10 The USB PIC K150 microcontroller programmer Hardware version V2.0 File version V2.0 Product Image 2-10 Product Description: K150 is the latest of a low-cost high-performance PIC programmer, support
More informationHigh-Performance SSD-Based RAID Storage. Madhukar Gunjan Chakhaiyar Product Test Architect
High-Performance SSD-Based RAID Storage Madhukar Gunjan Chakhaiyar Product Test Architect 1 Agenda HDD based RAID Performance-HDD based RAID Storage Dynamics driving to SSD based RAID Storage Evolution
More informationThis user guide describes features that are common to most models. Some features may not be available on your computer.
RAID User Guide Copyright 2011 Hewlett-Packard Development Company, L.P. Intel is a trademark of Intel Corporation in the U.S. and other countries. Microsoft and Windows are U.S. registered trademarks
More informationFrequently Asked Questions (FAQs) SIPRNet Hardware Token
Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:
More informationTesting SSD s vs. HDD s. The Same But Different. August 11, 2009 Santa Clara, CA Anthony Lavia President & CEO
Testing SSD s vs. HDD s The Same But Different August 11, 2009 Santa Clara, CA Anthony Lavia President & CEO Introduction HDD vs. SSD Is SSD technology disruptive? Customer Expectations Factors Affecting
More informationSolid Security: The Rise of Self-Encrypting. Solid State Drives. Thomas Coughlin
Self-Encrypting PRESENTATION TITLE GOES HERE Solid State Drives Thomas Coughlin Marketing Chair, SNIA Solid State Storage Initiative President, Coughlin Associates About the Presenter Tom Coughlin, Marketing
More informationGSM Smart Switch USER GUIDE
GSM Smart Switch USER GUIDE GSM Smart Switch allows switching almost any appliance ON and OFF remotely via mobile network. It is designed to receive start/stop commands from specially coded messages or
More informationTwo Factor Authentication. Software Version (SV) 1.0
Two Factor Authentication Software Version (SV) 1.0 Property of: Worldwide Interactive Services, Inc. 5025 South Orange Avenue Orlando, FL 32809 The data contained in this documentation is PROPRIETARY
More informationIntel Solid-State Drive 320 Series
Intel Solid-State Drive 320 Series Enterprise Server/Storage Application Product Specification Addendum Form Factors: 1.8-inch and 2.5-inch Capacity: 80/160/300 GB (1.8-inch) 40/80/120/160/300/600 GB (2.5-inch)
More informationImation Clip USB 2.0 Flash Drive. Imation Drive Manager Software. User s Manual
Imation Clip USB 2.0 Flash Drive Imation Drive Manager Software User s Manual Contents Introduction... 3 Features... 3 System Requirements... 4 Handling and Operating Recommendations... 4 Driver Installation...
More informationFull Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
More informationIBM Crypto Server Management General Information Manual
CSM-1000-0 IBM Crypto Server Management General Information Manual Notices The functions described in this document are IBM property, and can only be used, if they are a part of an agreement with IBM.
More informationNasir Memon Polytechnic Institute of NYU
Nasir Memon Polytechnic Institute of NYU SSD Drive Technology Overview SSD Drive Components NAND FLASH Microcontroller SSD Drive Forensics Challenges Overview SSD s are fairly new to the market Whereas
More informationHIGHSEC eid App Administration User Manual
HIGHSEC eid App Administration User Manual Contents 1 Introduction... 3 2 Application overview... 3 3 Managing HIGHSEC eid App... 3 3.1 Deleting card pairings... 4 4 Inspecting smart card contents... 5
More informationSolid State Drive (SSD) FAQ
Solid State Drive (SSD) FAQ Santosh Kumar Rajesh Vijayaraghavan O c t o b e r 2 0 1 1 List of Questions Why SSD? Why Dell SSD? What are the types of SSDs? What are the best Use cases & applications for
More informationSecureStore I.CA. User manual. Version 2.16 and higher
User manual Version 2.16 and higher Contents SecureStore I.CA 1. INTRODUCTION...3 2. ACCESS DATA FOR THE CARD...3 2.1 Card initialisation...3 3. MAIN SCREEN...4 4. DISPLAYING INFORMATION ABOUT THE PAIR
More informationPowerProtector: Superior Data Protection for NAND Flash
PowerProtector: Superior Data Protection for NAND Flash Introduction The unstable power conditions of outdoor applications such as transportation, telecommunications/networking and embedded systems run
More informationAssessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives
Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents
More informationIntel RAID Controller Premium Feature Key Training
Intel RAID Controller Premium Feature Key Training AXXRPFKSNSH Snapshot Recovery AXXRPFKDE Self Encrypting Drive (SED) AXXRPFKSSD SSD Cache with Fastpath Note: Graphics for this training is based on RAID
More informationCalsoft Webinar - Debunking QA myths for Flash- Based Arrays
Most Trusted Names in Data Centre Products Rely on Calsoft! September 2015 Calsoft Webinar - Debunking QA myths for Flash- Based Arrays Agenda Introduction to Types of Flash-Based Arrays Challenges in
More informationSeagate Instant Secure Erase Deployment Options
Technology Paper Seagate Instant Secure Erase Introduction When hard drives are retired and moved outside the data centre into the hands of others, the data on those drives is put at significant risk.
More informationScaling from Datacenter to Client
Scaling from Datacenter to Client KeunSoo Jo Sr. Manager Memory Product Planning Samsung Semiconductor Audio-Visual Sponsor Outline SSD Market Overview & Trends - Enterprise What brought us to NVMe Technology
More informationUnlock the value of data with smarter storage solutions.
Unlock the value of data with smarter storage solutions. Data is the currency of the new economy.... At HGST, we believe in the value of data, and we re helping the world harness its power.... Data is
More informationHow to Guide FUJITSU COMPUTER PRODUCTS OF AMERICA, INC. 1255 E. Arques Ave., Sunnyvale, CA, 94085 Telephone: 408-746-7000 Facsimile: 408-746-6914
How to Guide FUJITSU COMPUTER PRODUCTS OF AMERICA, INC. 1255 E. Arques Ave., Sunnyvale, CA, 94085 Telephone: 408-746-7000 Facsimile: 408-746-6914 How to Install and Setup a Fujitsu MHZ2-CJ Series FDE HDD
More informationFlash Storage: Trust, But Verify
Flash Storage: Trust, But Verify A better, vendor-independent way to analyze flash performance Leah Schoeb, Evaluator Group Peter Murray, Load DynamiX 1 Introductions 2 Speakers Leah Schoeb Senior Partner
More informationQuickSpecs. SATA (Serial ATA) Hard Drives for HP Workstations. Introduction. SATA (Serial ATA) Hard Drives for HP Workstations.
Overview Introduction Commercial grade SATA 7200 rpm drives are our standard high bandwidth hard drive storage option. Storage capacities for the 7200 rpm drives range up to a massive 4.0TB. This enables
More informationminiflash User Manual
miniflash User Manual 1 miniflash 2015 Cloud-9 All Rights Reserved All portions of this hardware are copyrighted and are the proprietary and trade secret information of Cloud-9. Use, reproduction or publication
More informationActive Directory (AD) Self-Service
Active Directory (AD) Self-Service TETRA IT has implemented a way for you to: 1. Set-Up/Maintain AD Contact Information (Use this option to create an AD Self-Serve Account and/or Maintain your AD Contact
More informationConfiguring Drobo Sync for Offsite Backup with Drobo model B800fs
The Drobo 8-bay File Sharing Storage for Busines (model B800fs) with Drobo Sync is an ideal solution for file sharing and data replication activities in a small to medium business (SMB). Drobo Sync is
More informationAdvances in Storage Security Standards Jason Cox Intel Corporation
Advances in Storage Security Standards Jason Cox Intel Corporation Objectives Overview of Trusted Computing Group (TCG) Storage Work Group Review of TCG Document types and Goals Describe recent specifications
More informationTable of Contents. What is Brute Force Attack? 13 How does the diskashur protect against brute force attack? 13
User s Manual Table of Contents About the istorage diskashur Secure Hard Drive 4 Package contents 4 istorage diskashur button panel 5 istorage diskashur - Getting Started 6 Before you begin 6 Connecting
More informationUsing AES 256 bit Encryption
Using AES 256 bit Encryption April 16 2014 There are many questions on How To Support AES256 bit encryption in an Industrial, Medical or Military Computer System. Programmable Encryption for Solid State
More informationSSDs tend to be more rugged than hard drives with respect to shock and vibration because SSDs have no moving parts.
Overview Introduction Solid State Drives (SSDs) are fast becoming a real force with respect to storage in the computer industry. With no moving parts, storage is no longer bound by mechanical barriers
More informationSLC vs MLC: Proper Flash Selection for SSDs in Industrial, Military and Avionic Applications. A TCS Space & Component Technology White Paper
SLC vs MLC: Proper Flash Selection for SSDs in Industrial, Military and Avionic Applications A TCS Space & Component Technology White Paper Introduction As with most storage technologies, NAND Flash vendors
More informationKT-1 Key Chain Token. QUICK Reference. Copyright 2005 CRYPTOCard Corporation All Rights Reserved 051004
KT-1 Key Chain Token QUICK Reference Copyright 2005 CRYPTOCard Corporation All Rights Reserved 051004 http://www.cryptocard.com Table of Contents OVERVIEW... 1 Token control... 1 OPERATING MODES & OPTIONS...
More informationFirmware Update Instructions for Crucial Client SSDs
Firmware Update Instructions for Crucial Client SSDs Overview By using this guide, a user can perform a firmware update on Crucial Client SSDs installed in a personal computing environment, referred to
More informationHow To Set Up A Hard Drive With A Harddrive With A 2Gb Hard Drive (I386) And 2Gb Drive (Amd64) On A Hardrive (I219) (Iee) (Amd66) (Ai219
1 Package Contents Device User manual Power adapter Power cord USB 2.0 Cable FireWire 800 Cable (IEEE1394.B) esata cable 2 Front View of the Device A Drive eject button B LED indicator C Front door panel
More informationFlash vs. Hard disks FFS problems New problems. SSDs und LogFS. Jörn Engel. Lazybastard.org. November 12, 2009
Lazybastard.org November 12, 2009 Market Research SmartMedia Approach Modern SSDs The good Lower random access times More IO/s More robust against mechanical failures Less noise Lower power consumption
More informationSecurity Technical. Overview. BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Security Technical Overview Published: 2014-01-17 SWD-20140117135425071 Contents 1 New in this release...10 2 Overview...
More informationImporting your personal certificate(s) to Microsoft Internet Explorer from a Back-up (or export) file
Importing your personal certificate(s) to Microsoft Internet Explorer from a Back-up (or export) file You may use your Medium Assurance Certificate(s) on any computer that you wish to by importing them
More informationUSB Secure Management for ProCurve Switches
ProCurve Networking USB Secure Management for ProCurve Switches Introduction... 2 A simple solution with multiple uses... 2 Staged deployment... 2 Remote deployment or upgrade... 3 Troubleshooting... 3
More informationSATA-Disk Module 5. RoHS Recast Compliant. SDM5 7P/180D Slim2 Product Specifications. July 17 th, 2014. Version 1.2. Apacer Technology Inc.
RoHS Recast Compliant SATA-Disk Module 5 SDM5 7P/180D Slim2 Product Specifications July 17 th, 2014 Version 1.2 Apacer Technology Inc. 1F, No.32, Zhongcheng Rd., Tucheng Dist., New Taipei City, Taiwan,
More informationMyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia.
About Digital Signature using MyKey Purpose MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia. A document digitally
More informationTechnologies Supporting Evolution of SSDs
Technologies Supporting Evolution of SSDs By TSUCHIYA Kenji Notebook PCs equipped with solid-state drives (SSDs), featuring shock and vibration durability due to the lack of moving parts, appeared on the
More informationBlackBerry Enterprise Server 5.0 SP3 and BlackBerry 7.1
BlackBerry Enterprise Server 5.0 SP3 and BlackBerry 7.1 Version: 5.0 Service Pack: 3 Security Technical Overview Published: 2012-01-17 SWD-1936256-0117012253-001 Contents 1 Document revision history...
More informationOmniAccess 3500 Nonstop Laptop Guardian. Release 2.2. What s New?
OmniAccess 3500 Nonstop Laptop Guardian Release 2.2 What s New? Document Version: 1.0 Part Number: 060294-00 Published: 12.20.2009 Legal Notice Alcatel-Lucent Proprietary 2009 Alcatel-Lucent. All rights
More informationNAND Flash Memories. Using Linux MTD compatible mode. on ELNEC Universal Device Programmers. (Quick Guide)
NAND Flash Memories Using Linux MTD compatible mode on ELNEC Universal Device Programmers (Quick Guide) Application Note April 2012 an_elnec_linux_mtd, version 1.04 Version 1.04/04.2012 Page 1 of 16 As
More informationSecureD Technical Overview
WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD
More information