Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Toshiba Enhances Self-Encrypting Drives with Wipe Technology

Toshiba has rolled out a new technology for its self-encrypting hard disks that provides additional security features to prevent data leakage. 

The Japan based company said that Wipe technology for its SED models was capable of automatically deleting sensitive user information stored on the HDDs when the system is turned-off or the hard drive is removed from the system.

Toshiba has rolled out a new technology for its self-encrypting hard disks that provides additional security features to prevent data leakage. 

The Japan based company said that Wipe technology for its SED models was capable of automatically deleting sensitive user information stored on the HDDs when the system is turned-off or the hard drive is removed from the system.

The new features will come in handy in managing and deleting sensitive data from a system when it is returned after the lease period expires, when the system is being disposed-off or is being sent for maintenance, the company explained. Wipe is targeted at organizations that have an obligation towards protecting sensitive user information and can save them hefty fines and embarrassment if a data leak was to happen. The new feature has been designed to securely delete the information stored in the hard drive when a system is lost or stolen for nefarious purposes.

Toshiba also added that many copiers or printers supported hard disks in order to store the documents printed through them for data recalling purposes. This factor posed a huge data security risk for IT administrators who are already neck-deep in complying with stringent security protocols defined by data security watchdogs. Anyone wishing to steal information can do so by simply accessing the hard drives on these printers and copiers. However, by using the Wipe-enabled SEDs, IT administrators can make sure that the data is securely and automatically deleted when the machine is powered-down, eliminating the risk of data being stored on the hard drive.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Cybersecurity Funding

CommandK announced that it has raised $3 million in a seed funding round for a solution designed to help organizations secure sensitive data.