Secure your data with Seagate's portfolio of Self-Encrypting Drives (SED) with options like Seagate Instant Secure Erase (ISE) for painless drive retirement. Choose the level of ‘data-at-rest’ security that’s right for you. Seagate Secure™ Technology:

  • Quick and easy hard drive retirement with the Instant Secure Erase (ISE) feature on all SEDs
  • Full protection of your data-at-rest with standards-based self-encrypting drive locking
  • Advanced government-grade hard drive security with FIPS 140-2 certification
  • All Seagate Secure Drives are designed in accordance with Trusted Computing Group (TCG) specifications http://www.trustedcomputinggroup.org/
image

Data at Rest - Data stored on a hard drive on any other long or short term device.

Drive Locking - SED ability to block reads/writes on certain LBA’s on a drive.

Federal Information Processing Standards (FIPS) - Publicly announced standards developed by the United States federal government for use in computer systems by non-military government agencies and government contractors.

Independent Software Vendors (ISV) - Companies who create software to manage SED drives. This includes setting up the drive to be able to boot the system while the drive is locked and set a unique password on the drive so that user may unlock it.

Instant Secure Erase (ISE) - This feature utilized the encryption on SED drives by deleting the media encryption key on the drive. As the drive now contains a new media encryption key all data read from the drive will be garbage data.

Secure Downloads & Diagnostics (SD&D) - Prevents unauthorized access to a drive's firmware and blocks tampering with firmware executables and sensitive system-level data.

Self-Encrypting Drive (SED) - A hard drive or SSD that encrypts all data that is stored on the media and decrypts that data during a read. It behaves like a normal drive until configured by the owner of the drive.

TCG - Trusted Computing technologies developed by TCG members now are deployed in enterprise systems, storage systems, networks, embedded systems, and mobile devices and can help secure cloud computing and virtualized systems.