Welcome!

.NET Authors: Srinivasan Sundara Rajan, Pat Romanski, Bob Gourley, Michael Jannery, Yakov Fain

News Feed Item

Toshiba Announces Cryptographic-Erase and Self-Encryption Features for New Enterprise SSD and Mobile HDD Models

The Storage Products Business Unit of Toshiba America Electronic Components, Inc., a committed technology leader, announces new enterprise-grade SATA SSD models supporting cryptographic-erase and self-encrypting drive (SED) models, one an enterprise SAS solid state drive (eSSD) and the other a mobile SATA hard disk drive (HDD). Collectively, these four new 2.5-inch storage device models provide both IT system and PC system administrators with more effective tools to help secure sensitive business information.

Toshiba's MQ01ABU***W with new security features. (Photo: Business Wire)

Toshiba's MQ01ABU***W with new security features. (Photo: Business Wire)

For the enterprise, the PX02AMU value line of SATA eSSD models and PX03ANU read-intensive line of SATA SSD models feature cryptographic-erase. In addition, the PX02SMQ/U series offers Trusted Computing Group (TCG) enterprise protocol self-encryption and cryptographic-erase support in high-performance eSSD SAS models.

For mobile computing, the MQ01ABU***W series provides self-encryption, cryptographic-erase and TCG-Opal protocol support in a slim 7mm height with up to 500GB of storage capacity. The MQ01ABU***W series also supports Toshiba’s wipe technology, which allows systems designers to automatically cryptographic-erase data if an unexpected host attempts to access the HDDs or if a defined number of authentication failures occurs.

“According to Symantec,1 the average cost of an enterprise data breach is $5.5 million. System administrators can help to better secure sensitive data by using encrypted storage devices,” said Scott Wright, product manager, Toshiba Storage Products Business. “Toshiba’s latest eSSD and mobile HDD SED models provide the advanced security features companies need to properly sanitize SSDs in server and storage subsystems and ensure the security of private data on HDDs in mobile and desktop PCs to help prevent costly data breaches.”

With the continued adoption of cloud computing and data warehousing, companies face additional challenges in securing critical business information to meet compliance requirements. To help safeguard confidential data, these new Toshiba models use government-grade Advanced Encryption Standard (AES) 256-bit self-encryption, and the PX02SMQ/U series SEDs support the TCG Enterprise Security Subsystem Class (SSC) protocols to provide additional security features.

Unlike a regular disk erase, which uses lengthy over-write operations, the Cryptographic-Erase function simply regenerates the SED drive’s encryption key, effectively invalidating all previously stored user data. This allows SED storage devices to be quickly and securely sanitized before re-allocation, redeployment or retirement.

  • The PX02AMU and PX03ANU are SATA MLC SSDs that provide transparent onboard hardware encryption to enable fast and secure cryptographic-erase using the industry-standard ATA Enhanced Secure Cryptographic Erase function. The PX02AMU has storage capacities of 100GB, 200GB and 400GB,2 and the PX02ANU includes 55GB, 120GB, 240GB and 480GB models. Both are suited for entry to mid-range server and storage systems, as well as read-intensive and boot devices for datacenter-optimized servers and scale-out storage systems.
  • The PX02SMQ/U series is an enterprise-class SAS MLC SSD with available storage capacities of 200GB, 400GB, 800GB and 1.6TB.3 Support of both SANITIZE Cryptographic-Erase and the TCG Enterprise SSC makes the PX02SMQ/U series suitable for management and protection of confidential data on mission-critical and business-critical server and storage systems.
  • The MQ01ABU***W series are 7mm high SATA 2.5-inch 5,400 RPM HDD SEDs with available storage capacities of 250GB, 320GB and 500GB. Support of both the ATA Enhanced Secure Cryptographic Erase function and the TCG-Opal SSC protocols makes the MQ01ABU series ideal for encrypting and protecting access to confidential data stored on mobile and desktop PCs protected by security management applications.

Sample shipments of the PX02AMU and PX03ANU SATA eSSD drives are scheduled for January 2013. In the first quarter of 2013, sample shipments are scheduled to begin for the PX02SMQ/U SAS eSSD SED drives and MQ01ABU***W series mobile SATA HDD SED.

Self-encryption and other security features are also available on select Toshiba enterprise-class 3.5-inch and 2.5-inch HDD models, as well as select 2.5-inch client SSD and HDD models. Toshiba is also working on FIPS 140-2 certification4 on select SED products to meet government-class security requirements.

For more information on Toshiba’s industry-leading enterprise-class and mobile-class SSDs and HDDs, visit www.toshibastorage.com. To connect with Toshiba Storage, visit the corporate blog at http://storage.toshiba.com/corporateblog and follow @ToshibaStorage on Twitter.

About Toshiba Storage Products

Toshiba Corporation and its affiliates offer one-of-a-kind global storage solutions, offering hard disk drives (HDDs), solid state drives (SSDs) and NAND flash memories — technologies that drive a wide range of consumer electronics, computer and automotive applications, as well as enterprise solutions for the global marketplace. Toshiba is a leader in the development, design and manufacture of mobile, consumer and enterprise hard disk drives and solid state drives. In North America, the Storage Products Business Unit of Toshiba America Electronic Components, Inc., markets high-quality storage peripherals to original equipment manufacturers, original design manufacturers, value-added resellers, value-added dealers, systems integrators and distributors worldwide. Inherent in the Toshiba storage family are the high-quality engineering and manufacturing capabilities that have established Toshiba products as innovation leaders worldwide. For more information, visit www.toshibastorage.com.

About Toshiba Corp. and Toshiba America Electronic Components, Inc. (TAEC)

Through proven commitment, lasting relationships and advanced, reliable electronic components, Toshiba enables its customers to create market-leading designs. Toshiba is the heartbeat within product breakthroughs from OEMs, ODMs, CMs, VARs, distributors and fabless chip companies worldwide. A committed electronic components leader, Toshiba designs and manufactures high-quality flash memory-based storage solutions, solid state drives (SSDs), hard disk drives (HDDs), discrete devices, advanced materials, medical tubes, custom SoCs/ASICs, imaging products, microcontrollers and wireless components that make possible today’s leading smartphones, tablets, MP3 players, cameras, medical devices, automotive electronics, enterprise solutions and more.

Toshiba America Electronic Components, Inc. is an independent operating company owned by Toshiba America, Inc., a subsidiary of Toshiba Corporation, Japan’s largest semiconductor manufacturer and the world’s third largest semiconductor manufacturer (Gartner, 2011 Worldwide Semiconductor Revenue, March, 2012). Toshiba Corporation was founded in 1875 and today has over 490 subsidiaries and affiliates, with 203,000 employees worldwide. Visit Toshiba’s web site at www.toshiba.co.jp/index.htm.

© 2013 Toshiba America Electronic Components, Inc. All rights reserved. All product, service and company names are trademarks, registered trademarks or service marks of their respective owners. Information in this press release, including product pricing and specifications, content of services and contact information, is current and believed to be accurate on the date of the announcement, but is subject to change without prior notice. Technical and application information contained here is subject to the most recent applicable Toshiba product specifications.

1. Based on the March 2012 Ponemon Institute LLC study sponsored by Symantec, “2011 Cost of Data Breach Study: United States” http://www.symantec.com/content/en/us/about/media/pdfs/b-ponemon-2011-cost-of-data-breach-us.en-us.pdf.

2. One Gigabyte (1GB) means 109 = 1,000,000,000 bytes using powers of 10. A computer operating system, however, reports storage capacity using powers of 2 for the definition of 1GB = 230 = 1,073,741,824 bytes and therefore shows less storage capacity. Available storage capacity (including examples of various media files) will vary based on file size, formatting, settings, software and operating system, such as Microsoft Operating System and/or pre-installed software applications, or media content. Actual formatted capacity may vary.

3. One Terabyte (1TB) means 1012= 1,000,000,000,000 bytes using powers of 10. A computer operating system, however, reports storage capacity using powers of 2 for the definition of 1TB = 240 = 1,099,511,627,776 bytes and therefore shows less storage capacity. Available storage capacity (including examples of various media files) will vary based on file size, formatting, settings, software and operating system, such as Microsoft Operating System and/or pre-installed software applications, or media content. Actual formatted capacity may vary.

4. FIPS 140-2, Federal Information Processing Standards 140-2 is a U.S. government computer security standard used to certify cryptographic modules.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
Today’s enterprise is being driven by disruptive competitive and human capital requirements to provide enterprise application access through not only desktops, but also mobile devices. To retrofit existing programs across all these devices using traditional programming methods is very costly and time consuming – often prohibitively so. In his session at @ThingsExpo, Jesse Shiah, CEO, President, and Co-Founder of AgilePoint Inc., discussed how you can create applications that run on all mobile devices as well as laptops and desktops using a visual drag-and-drop application – and eForms-buildi...
The Industrial Internet revolution is now underway, enabled by connected machines and billions of devices that communicate and collaborate. The massive amounts of Big Data requiring real-time analysis is flooding legacy IT systems and giving way to cloud environments that can handle the unpredictable workloads. Yet many barriers remain until we can fully realize the opportunities and benefits from the convergence of machines and devices with Big Data and the cloud, including interoperability, data security and privacy.
IoT is still a vague buzzword for many people. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. He also discussed how IoT is perceived by investors and how venture capitalist access this space. Other topics discussed were barriers to success, what is new, what is old, and what the future may hold. Mike Kavis is Vice President & Principal Cloud Architect at Cloud Technology Pa...
SYS-CON Events announced today that CodeFutures, a leading supplier of database performance tools, has been named a “Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. CodeFutures is an independent software vendor focused on providing tools that deliver database performance tools that increase productivity during database development and increase database performance and scalability during production.
Dale Kim is the Director of Industry Solutions at MapR. His background includes a variety of technical and management roles at information technology companies. While his experience includes work with relational databases, much of his career pertains to non-relational data in the areas of search, content management, and NoSQL, and includes senior roles in technical marketing, sales engineering, and support engineering. Dale holds an MBA from Santa Clara University, and a BA in Computer Science from the University of California, Berkeley.
The Internet of Things (IoT) is rapidly in the process of breaking from its heretofore relatively obscure enterprise applications (such as plant floor control and supply chain management) and going mainstream into the consumer space. More and more creative folks are interconnecting everyday products such as household items, mobile devices, appliances and cars, and unleashing new and imaginative scenarios. We are seeing a lot of excitement around applications in home automation, personal fitness, and in-car entertainment and this excitement will bleed into other areas. On the commercial side, m...
The Internet of Things (IoT) promises to evolve the way the world does business; however, understanding how to apply it to your company can be a mystery. Most people struggle with understanding the potential business uses or tend to get caught up in the technology, resulting in solutions that fail to meet even minimum business goals. In his session at @ThingsExpo, Jesse Shiah, CEO / President / Co-Founder of AgilePoint Inc., showed what is needed to leverage the IoT to transform your business. He discussed opportunities and challenges ahead for the IoT from a market and technical point of vie...
Things are being built upon cloud foundations to transform organizations. This CEO Power Panel at 15th Cloud Expo, moderated by Roger Strukhoff, Cloud Expo and @ThingsExpo conference chair, addressed the big issues involving these technologies and, more important, the results they will achieve. Rodney Rogers, chairman and CEO of Virtustream; Brendan O'Brien, co-founder of Aria Systems, Bart Copeland, president and CEO of ActiveState Software; Jim Cowie, chief scientist at Dyn; Dave Wagstaff, VP and chief architect at BSQUARE Corporation; Seth Proctor, CTO of NuoDB, Inc.; and Andris Gailitis, C...
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
"People are a lot more knowledgeable about APIs now. There are two types of people who work with APIs - IT people who want to use APIs for something internal and the product managers who want to do something outside APIs for people to connect to them," explained Roberto Medrano, Executive Vice President at SOA Software, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Performance is the intersection of power, agility, control, and choice. If you value performance, and more specifically consistent performance, you need to look beyond simple virtualized compute. Many factors need to be considered to create a truly performant environment. In his General Session at 15th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, discussed how to take advantage of a multitude of compute options and platform features to make cloud the cornerstone of your online presence.
SYS-CON Media announced that Splunk, a provider of the leading software platform for real-time Operational Intelligence, has launched an ad campaign on Big Data Journal. Splunk software and cloud services enable organizations to search, monitor, analyze and visualize machine-generated big data coming from websites, applications, servers, networks, sensors and mobile devices. The ads focus on delivering ROI - how improved uptime delivered $6M in annual ROI, improving customer operations by mining large volumes of unstructured data, and how data tracking delivers uptime when it matters most.
In this Women in Technology Power Panel at 15th Cloud Expo, moderated by Anne Plese, Senior Consultant, Cloud Product Marketing at Verizon Enterprise, Esmeralda Swartz, CMO at MetraTech; Evelyn de Souza, Data Privacy and Compliance Strategy Leader at Cisco Systems; Seema Jethani, Director of Product Management at Basho Technologies; Victoria Livschitz, CEO of Qubell Inc.; Anne Hungate, Senior Director of Software Quality at DIRECTV, discussed what path they took to find their spot within the technology industry and how do they see opportunities for other women in their area of expertise.
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential.
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
SYS-CON Media announced that Cisco, a worldwide leader in IT that helps companies seize the opportunities of tomorrow, has launched a new ad campaign in Cloud Computing Journal. The ad campaign, a webcast titled 'Is Your Data Center Ready for the Application Economy?', focuses on the latest data center networking technologies, including SDN or ACI, and how customers are using SDN and ACI in their organizations to achieve business agility. The Cisco webcast is available on-demand.
"BSQUARE is in the business of selling software solutions for smart connected devices. It's obvious that IoT has moved from being a technology to being a fundamental part of business, and in the last 18 months people have said let's figure out how to do it and let's put some focus on it, " explained Dave Wagstaff, VP & Chief Architect, at BSQUARE Corporation, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Building low-cost wearable devices can enhance the quality of our lives. In his session at Internet of @ThingsExpo, Sai Yamanoor, Embedded Software Engineer at Altschool, provided an example of putting together a small keychain within a $50 budget that educates the user about the air quality in their surroundings. He also provided examples such as building a wearable device that provides transit or recreational information. He then reviewed the resources available to build wearable devices at home including open source hardware, the raw materials required and the options available to power s...
“The age of the Internet of Things is upon us,” stated Thomas Svensson, senior vice-president and general manager EMEA, ThingWorx, “and working with forward-thinking companies, such as Elisa, enables us to deploy our leading technology so that customers can profit from complete, end-to-end solutions.” ThingWorx, a PTC® (Nasdaq: PTC) business and Internet of Things (IoT) platform provider, announced on Monday that Elisa, Finnish provider of mobile and fixed broadband subscriptions, will deploy ThingWorx® platform technology to enable a new Elisa IoT service in Finland and Estonia.
Advanced Persistent Threats (APTs) are increasing at an unprecedented rate. The threat landscape of today is drastically different than just a few years ago. Attacks are much more organized and sophisticated. They are harder to detect and even harder to anticipate. In the foreseeable future it's going to get a whole lot harder. Everything you know today will change. Keeping up with this changing landscape is already a daunting task. Your organization needs to use the latest tools, methods and expertise to guard against those threats. But will that be enough? In the foreseeable future attacks w...