Brief

Intel® RAID Controllers with
Self-Encrypting Drive Support
On Target Security
Whether it is sensitive customer informa-
tion, intellectual property or proprietary
data that helps a company reach its
strategic objectives, a company’s data
may be its most valuable asset. If this data
is misplaced or stolen, organizations run
the risk of lost revenue, legal implications,
and a tarnished reputation. The unfortu-
nate truth is that an organization’s data is
becoming increasingly vulnerable as lost,
accidentally exposed or breached data is
becoming more and more commonplace in
today’s environment. With data security
risks on the rise, an inux of government
mandates and regulations for secur-
ing data have been implemented and is
becoming part of the corporate landscape
for many. Eliminating exposure of private
data is now simply viewed as a sound busi-
ness practice.
To avoid the high costs associated with
data exposures such as these, organiza-
tions must put in place a comprehensive
security strategy. While each point in the
storage infrastructure provides unique
threat models, data-at-rest presents one
of the highest security vulnerabilities.
Data, in fact, spends most of its life at
rest on drives within the data center. As
these drives will eventually leave the data
center either for repair, retirement, reloca-
tion or maintenance, it is at this time that
drives — and the data contained on these
drives — are most vulnerable to being lost
or stolen.
The emergence of self-encrypting drives
is timely in mitigating the security vulner-
abilities of data-at-rest. Self-encrypting
drives that adhere to the TCG (Trusted
Computing Group) Enterprise Security
Subsystem Class specication are National
Security Agency qualied and provide
unparalleled security with government-
grade encryption. With self-encrypting
drives, if a drive is removed from its
storage system or the server it is housed
in, the data on that drive is encrypted and
useless to anyone who attempts to access
it without the appropriate security autho-
rization. Many safe harbor laws protect or-
ganizations that store data in compliance
with security encryption requirements. In
fact, in many cases, an organization will
not have to notify a customer of lost data
if that data was stored on secured self-
encrypting drives.
NEGATIVE IMPACTS OF DATA
BREACHES:
n
Loss of customers and revenue
n
Unplanned expenses
n
Legal implications, penalties and
fines
n
Negative press and tarnished
reputation
n
Lost goodwill and undermining of
other corporate relationships
Simple, affordable protection against data theft
PRODUCT BRIEF
Intel® RAID® Controllers

Summary of content (4 pages)