We've seen this coming over time: Based on the Trusted Computing Group's standard, hard drives and solid state drives (SSD), are offering self-encryption built-in. We’ve seen this coming over time: Based on the Trusted Computing Group’s standard, hard drives and solid state drives (SSD), are offering self-encryption built-in. The key difference with these next-generation encrypted drives is that these units have the encryption integrated into a single chip on drive in the drive.Securing data storage is especially important for small businesses, due to legal specifications that require companies to report breaches, and to maintain data for long periods of time for accountability purposes.More than 45 states have data privacy laws with encryption safe harbors. In 2008, the average cost of notification regarding a data breach was $6.65 million per incident.That adds up fast if a flash drive with company personnel and salary data is compromised, for example. At the Storage Visions 2011 conference here in Las Vegas, another stat thrown around that’s gives pause: Since 2005, over 345,124,400 records containing sensitive personal information have been involved in security breaches. One of the advantages to the single-chip, no-software approach now in place: There’s no performance degradation. It’s also safer; the encryption keys are generated within the drive, so there are no keys to lose. The keys never leave the drive.What is a self-encrypted hard drive? The drive itself protects the data, with either 128-bit or 256-bit AES keys that are stored in the drive itself. “Technically, it’s a self-protecting device,” says Robert Thibadeau, senior vice president and chief scientist at Wave Systems, and a representative for the Trusted Computing Group, which oversees the technical specification for self-encrypting hard drives.There’s the media encryption key that encrypts the data, and the authentication key that is used to unlock the drive and decrypt the media encryption key. Without the authentication key, there is no media encryption key in the drive at all. You create the password, then the only way to get back onto the drive–and to the data that’s on the drive–is with the password (or passwords) you set up.Full-disk encryption can refer to software or hardware encryption, whereas self-encrypted hard drives are just hardware encryption. Microsoft coined the term full-disk encryption, but that term became confused with the encryption done by software like Bitlocker. Initially there was a premium, but at this point there’s little to no premium for buying one. Every drive maker makes self-encrypting drives.In a few years, predicts Thibadeau, you’ll be buying a self-encrypting drive and you won’t even realize it-because it will be so pervasive. “The encryption just works, it doesn’t impact you.”Samsung just introduced at CES it’s a 256-bit self-encrypted series of USB 3.0 hard drives. The drives include three new external drives, in 1TB, 1.5TB, and 2TB. The drives come with Samsung’s auto-backup software, and Samsung SecretZone for creating a secure virtual drive, and SafetyKey for setting up passwords and encrypted data backup. The drives are due in April; prices to be announced.Check out our complete coverage of CES 2011. Related content news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year Researchers from Group-IB believe it's likely the group is an independent affiliate working for multiple ransomware-as-a-service operations By Lucian Constantin Oct 02, 2023 4 mins Hacker Groups Ransomware Cybercrime feature 10 things you should know about navigating the dark web A lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely. By Rosalyn Page Oct 02, 2023 13 mins Cybercrime Cybercrime Security news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Government Security Practices news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe