The Benefits of a Self-encrypting Drive
Data stored on business systems can be a liability. Customer credit card information, personal identification numbers, email lists, internal policies, product roadmaps, and intellectual property is stored on nearly every computer, which means that these systems are vulnerable to accidental loss, hackers, and data thieves. The good news: it doesn’t have to be this way.
Software encryption vs. hardware encryption
There are a variety of software programs that can encrypt the data on your computer's storage drive. These programs use the CPU to encrypt and decrypt data as it's being written to or read from your storage drive.
Software encryption has some drawbacks. Because the processor is working to encrypt and decrypt the data, it can slow down system performance. There are also ways to recover data that has been encrypted. This is good if you lose the encryption key, but bad if someone else is able to decrypt the data. With some methods of software encryption, it is possible to see the data, even though it's encrypted.
A better way to protect the data is to encrypt it at the hardware level. If your storage drive has a built-in controller that supports hardware encryption, such as a 256-bit AES encryption controller, you can use full disk encryption, which is sometimes called a self-encrypting drive.
Hardware encryption is better for security because it's almost impossible for someone to get the data off a drive that is encrypted. The person who has the encryption key, however, can encrypt or decrypt the drive in just a few clicks. Because the encryption method uses the drive, rather than the CPU, there is no slow down in performance.
The Crucial® MX-series SSDs have a 256-bit AES encryption controller. It's simple to swap out a hard drive or existing solid state drive for an SSD with better data security. For more information on installing an SSD, look here.
How does Solid State Drive encryption work?
Due to the nature of Flash, Solid State Drives are harder to encrypt. SSD encryption uses two symmetric encryption keys with a 128- or 256-bit AES algorithm. The first key is the Encryption Key and the second is the Authorisation Key.
©2018 Micron Technology, Inc. All rights reserved. Information, products, and/or specifications are subject to change without notice. Neither Crucial nor Micron Technology, Inc. is responsible for omissions or errors in typography or photography. Micron, the Micron logo, Crucial, and the Crucial logo are trademarks or registered trademarks of Micron Technology, Inc. All other trademarks and service marks are the property of their respective owners.