Self-encrypting hard drives automatically and continuously encrypt all data in the drive itself, protecting it from loss, theft or attack. This type of technology is becoming more important as we continue to see data loss incidents plague organizations around the world.
Data storage industry analyst Dr. Thomas Coughlin, who has more than 30 years in the data storage industry, this week revealed the industry’s first forecast examining the adoption of self-encrypting drives (SEDs).
Coughlin addressed attendees in an Emerging Technologies session at the NSA Trusted Computing Conference and Expo that took place this week in Orlando.
According to Coughlin’s research:
• By 2013 SED capability will be in over 80 percent of SSDs and likely in almost all SSDs by 2014.
• By 2017, almost all HDDs will include SED capability.
• By 2016 the high, median and low estimates for security adoption for SED HDDs are 411 million, 315 million and 122 million units.
What factors come into play when it comes to deployment of SEDs? Coughlin notes that a number of factors will foster adoption. These include cost parity of SEDs to non-self encrypting storage devices; no performance impact on individual systems with SEDs compared to software-based encryption; no performance overhead compared to software encryption running on the host; and possibly longer useful drive life than drives used in a software encrypted system, due to increased reads and writes with SW encryption.
The report also notes additional benefits of SEDs. These include:
• The encryption key is stored on the storage device and cannot be accessed through host hacking, which is a typical and common attack on systems with software encryption.
• SEDs are less complex to implement in storage array encryption solutions.
• Increasing legislation and regulations favor the use of SEDs, particularly those with FIPS 140 certification.
Servers and Desktop systems are not the only technology assets that make use of hard drives holding potentially sensitive corporate data. Copiers and printers often utilize hard disks in order to store and process documents, creating another data security risk for information security teams who are already challenged with security and compliance requirements.

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.
More from Mike Lennon
- Watch Now: Threat Detection and Incident Response Virtual Summit
- Registration Now Open: 2023 ICS Cybersecurity Conference | Atlanta
- NetRise Adds $8 Million in Funding to Grow XIoT Security Platform
- Virtual Event Today: Zero Trust Strategies Summit
- Virtual Event Tomorrow: Zero Trust Strategies Summit
- Watch: How to Build Resilience Against Emerging Cyber Threats
- Video: How to Build Resilience Against Emerging Cyber Threats
- Webinar Today: Understanding Hidden Third-Party Identity Access Risks
Latest News
- Chrome 114 Released With 18 Security Fixes
- Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards
- Breaking Enterprise Silos and Improving Protection
- Spyware Found in Google Play Apps With Over 420 Million Downloads
- Millions of WordPress Sites Patched Against Critical Jetpack Vulnerability
- Barracuda Zero-Day Exploited to Deliver Malware for Months Before Discovery
- PyPI Enforcing 2FA for All Project Maintainers to Boost Security
- Personal Information of 9 Million Individuals Stolen in MCNA Ransomware Attack
