Click here to close now.

Welcome!

Cloud Expo Authors: Liz McMillan, Elizabeth White, Pat Romanski, Carmen Gonzalez, Jason Bloomberg

News Feed Item

Toshiba Announces Cryptographic-Erase and Self-Encryption Features for New Enterprise SSD and Mobile HDD Models

The Storage Products Business Unit of Toshiba America Electronic Components, Inc., a committed technology leader, announces new enterprise-grade SATA SSD models supporting cryptographic-erase and self-encrypting drive (SED) models, one an enterprise SAS solid state drive (eSSD) and the other a mobile SATA hard disk drive (HDD). Collectively, these four new 2.5-inch storage device models provide both IT system and PC system administrators with more effective tools to help secure sensitive business information.

Toshiba's MQ01ABU***W with new security features. (Photo: Business Wire)

Toshiba's MQ01ABU***W with new security features. (Photo: Business Wire)

For the enterprise, the PX02AMU value line of SATA eSSD models and PX03ANU read-intensive line of SATA SSD models feature cryptographic-erase. In addition, the PX02SMQ/U series offers Trusted Computing Group (TCG) enterprise protocol self-encryption and cryptographic-erase support in high-performance eSSD SAS models.

For mobile computing, the MQ01ABU***W series provides self-encryption, cryptographic-erase and TCG-Opal protocol support in a slim 7mm height with up to 500GB of storage capacity. The MQ01ABU***W series also supports Toshiba’s wipe technology, which allows systems designers to automatically cryptographic-erase data if an unexpected host attempts to access the HDDs or if a defined number of authentication failures occurs.

“According to Symantec,1 the average cost of an enterprise data breach is $5.5 million. System administrators can help to better secure sensitive data by using encrypted storage devices,” said Scott Wright, product manager, Toshiba Storage Products Business. “Toshiba’s latest eSSD and mobile HDD SED models provide the advanced security features companies need to properly sanitize SSDs in server and storage subsystems and ensure the security of private data on HDDs in mobile and desktop PCs to help prevent costly data breaches.”

With the continued adoption of cloud computing and data warehousing, companies face additional challenges in securing critical business information to meet compliance requirements. To help safeguard confidential data, these new Toshiba models use government-grade Advanced Encryption Standard (AES) 256-bit self-encryption, and the PX02SMQ/U series SEDs support the TCG Enterprise Security Subsystem Class (SSC) protocols to provide additional security features.

Unlike a regular disk erase, which uses lengthy over-write operations, the Cryptographic-Erase function simply regenerates the SED drive’s encryption key, effectively invalidating all previously stored user data. This allows SED storage devices to be quickly and securely sanitized before re-allocation, redeployment or retirement.

  • The PX02AMU and PX03ANU are SATA MLC SSDs that provide transparent onboard hardware encryption to enable fast and secure cryptographic-erase using the industry-standard ATA Enhanced Secure Cryptographic Erase function. The PX02AMU has storage capacities of 100GB, 200GB and 400GB,2 and the PX02ANU includes 55GB, 120GB, 240GB and 480GB models. Both are suited for entry to mid-range server and storage systems, as well as read-intensive and boot devices for datacenter-optimized servers and scale-out storage systems.
  • The PX02SMQ/U series is an enterprise-class SAS MLC SSD with available storage capacities of 200GB, 400GB, 800GB and 1.6TB.3 Support of both SANITIZE Cryptographic-Erase and the TCG Enterprise SSC makes the PX02SMQ/U series suitable for management and protection of confidential data on mission-critical and business-critical server and storage systems.
  • The MQ01ABU***W series are 7mm high SATA 2.5-inch 5,400 RPM HDD SEDs with available storage capacities of 250GB, 320GB and 500GB. Support of both the ATA Enhanced Secure Cryptographic Erase function and the TCG-Opal SSC protocols makes the MQ01ABU series ideal for encrypting and protecting access to confidential data stored on mobile and desktop PCs protected by security management applications.

Sample shipments of the PX02AMU and PX03ANU SATA eSSD drives are scheduled for January 2013. In the first quarter of 2013, sample shipments are scheduled to begin for the PX02SMQ/U SAS eSSD SED drives and MQ01ABU***W series mobile SATA HDD SED.

Self-encryption and other security features are also available on select Toshiba enterprise-class 3.5-inch and 2.5-inch HDD models, as well as select 2.5-inch client SSD and HDD models. Toshiba is also working on FIPS 140-2 certification4 on select SED products to meet government-class security requirements.

For more information on Toshiba’s industry-leading enterprise-class and mobile-class SSDs and HDDs, visit www.toshibastorage.com. To connect with Toshiba Storage, visit the corporate blog at http://storage.toshiba.com/corporateblog and follow @ToshibaStorage on Twitter.

About Toshiba Storage Products

Toshiba Corporation and its affiliates offer one-of-a-kind global storage solutions, offering hard disk drives (HDDs), solid state drives (SSDs) and NAND flash memories — technologies that drive a wide range of consumer electronics, computer and automotive applications, as well as enterprise solutions for the global marketplace. Toshiba is a leader in the development, design and manufacture of mobile, consumer and enterprise hard disk drives and solid state drives. In North America, the Storage Products Business Unit of Toshiba America Electronic Components, Inc., markets high-quality storage peripherals to original equipment manufacturers, original design manufacturers, value-added resellers, value-added dealers, systems integrators and distributors worldwide. Inherent in the Toshiba storage family are the high-quality engineering and manufacturing capabilities that have established Toshiba products as innovation leaders worldwide. For more information, visit www.toshibastorage.com.

About Toshiba Corp. and Toshiba America Electronic Components, Inc. (TAEC)

Through proven commitment, lasting relationships and advanced, reliable electronic components, Toshiba enables its customers to create market-leading designs. Toshiba is the heartbeat within product breakthroughs from OEMs, ODMs, CMs, VARs, distributors and fabless chip companies worldwide. A committed electronic components leader, Toshiba designs and manufactures high-quality flash memory-based storage solutions, solid state drives (SSDs), hard disk drives (HDDs), discrete devices, advanced materials, medical tubes, custom SoCs/ASICs, imaging products, microcontrollers and wireless components that make possible today’s leading smartphones, tablets, MP3 players, cameras, medical devices, automotive electronics, enterprise solutions and more.

Toshiba America Electronic Components, Inc. is an independent operating company owned by Toshiba America, Inc., a subsidiary of Toshiba Corporation, Japan’s largest semiconductor manufacturer and the world’s third largest semiconductor manufacturer (Gartner, 2011 Worldwide Semiconductor Revenue, March, 2012). Toshiba Corporation was founded in 1875 and today has over 490 subsidiaries and affiliates, with 203,000 employees worldwide. Visit Toshiba’s web site at www.toshiba.co.jp/index.htm.

© 2013 Toshiba America Electronic Components, Inc. All rights reserved. All product, service and company names are trademarks, registered trademarks or service marks of their respective owners. Information in this press release, including product pricing and specifications, content of services and contact information, is current and believed to be accurate on the date of the announcement, but is subject to change without prior notice. Technical and application information contained here is subject to the most recent applicable Toshiba product specifications.

1. Based on the March 2012 Ponemon Institute LLC study sponsored by Symantec, “2011 Cost of Data Breach Study: United States” http://www.symantec.com/content/en/us/about/media/pdfs/b-ponemon-2011-cost-of-data-breach-us.en-us.pdf.

2. One Gigabyte (1GB) means 109 = 1,000,000,000 bytes using powers of 10. A computer operating system, however, reports storage capacity using powers of 2 for the definition of 1GB = 230 = 1,073,741,824 bytes and therefore shows less storage capacity. Available storage capacity (including examples of various media files) will vary based on file size, formatting, settings, software and operating system, such as Microsoft Operating System and/or pre-installed software applications, or media content. Actual formatted capacity may vary.

3. One Terabyte (1TB) means 1012= 1,000,000,000,000 bytes using powers of 10. A computer operating system, however, reports storage capacity using powers of 2 for the definition of 1TB = 240 = 1,099,511,627,776 bytes and therefore shows less storage capacity. Available storage capacity (including examples of various media files) will vary based on file size, formatting, settings, software and operating system, such as Microsoft Operating System and/or pre-installed software applications, or media content. Actual formatted capacity may vary.

4. FIPS 140-2, Federal Information Processing Standards 140-2 is a U.S. government computer security standard used to certify cryptographic modules.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
T-Mobile has been transforming the wireless industry with its “Uncarrier” initiatives. Today as T-Mobile’s IT organization works to transform itself in a like manner, technical foundations built over the last couple of years are now key to their drive for more Agile delivery practices. In his session at DevOps Summit, Martin Krienke, Sr Development Manager at T-Mobile, will discuss where they started their Continuous Delivery journey, where they are today, and where they are going in an effort ...
Gartner predicts that the bulk of new IT spending by 2016 will be for cloud platforms and applications and that nearly half of large enterprises will have cloud deployments by the end of 2017. The benefits of the cloud may be clear for applications that can tolerate brief periods of downtime, but for critical applications like SQL Server, Oracle and SAP, companies need a strategy for HA and DR protection. While traditional SAN-based clusters are not possible in these environments, SANless cluste...
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
SYS-CON Events announced today that the "First Containers & Microservices Conference" will take place June 9-11, 2015, at the Javits Center in New York City. The “Second Containers & Microservices Conference” will take place November 3-5, 2015, at Santa Clara Convention Center, Santa Clara, CA. Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities.
Disruptive macro trends in technology are impacting and dramatically changing the "art of the possible" relative to supply chain management practices through the innovative use of IoT, cloud, machine learning and Big Data to enable connected ecosystems of engagement. Enterprise informatics can now move beyond point solutions that merely monitor the past and implement integrated enterprise fabrics that enable end-to-end supply chain visibility to improve customer service delivery and optimize sup...
The OpenStack cloud operating system includes Trove, a database abstraction layer. Rather than applications connecting directly to a specific type of database, they connect to Trove, which in turn connects to one or more specific databases. One target database is Postgres Plus Cloud Database, which includes its own RESTful API. Trove was originally developed around MySQL, whose interfaces are significantly less complicated than those of the Postgres cloud database. In his session at 16th Cloud...
IoT is still a vague buzzword for many people. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. He also discussed how IoT is perceived by investors and how venture capitalist access this space. Other topics discussed were barriers to success, what is new, what is old, and what th...
To manage complex web services with lots of calls to the cloud, many businesses have invested in Application Performance Management (APM) and Network Performance Management (NPM) tools. Together APM and NPM tools are essential aids in improving a business's infrastructure required to support an effective web experience... but they are missing a critical component - Internet visibility. Internet connectivity has always played a role in customer access to web presence, but in the past few years u...
There's Big Data, then there's really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. In her session at Big Data Expo®, Hannah Smalltree, Director at Treasure Data, discussed how IoT, Big D...
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists will peel away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud en...
SYS-CON Events announced today that MetraTech, now part of Ericsson, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Ericsson is the driving force behind the Networked Society- a world leader in communications infrastructure, software and services. Some 40% of the world’s mobile traffic runs through networks Ericsson has supplied, serving more than 2.5 billion subscribers.
There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophisticated, and the standard paradigm of supporting historical analytics queries is often just one facet of what is needed. As Big Data growth continues, organizations are demanding real-time access to data, allowing immed...
Enterprises are fast realizing the importance of integrating SaaS/Cloud applications, API and on-premises data and processes, to unleash hidden value. This webinar explores how managers can use a Microservice-centric approach to aggressively tackle the unexpected new integration challenges posed by proliferation of cloud, mobile, social and big data projects. Industry analyst and SOA expert Jason Bloomberg will strip away the hype from microservices, and clearly identify their advantages and d...
SYS-CON Media named Andi Mann editor of DevOps Journal. DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. DevOps Journal brings valuable information to DevOps professionals who are transforming the way enterprise IT is done. Andi Mann, Vice President, Strategic Solutions, at CA Technologies, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, communicator, and thought lea...
Enterprises are turning to the hybrid cloud to drive greater scalability and cost-effectiveness. But enterprises should beware as the definition of “policy” varies wildly. Some say it’s the ability to control the resources apps’ use or where the apps run. Others view policy as governing the permissions and delivering security. Policy is all of that and more. In his session at 16th Cloud Expo, Derek Collison, founder and CEO of Apcera, will: Explain what policy is; Show how policy should be arc...
Even though it’s now Microservices Journal, long-time fans of SOA World Magazine can take comfort in the fact that the URL – soa.sys-con.com – remains unchanged. And that’s no mistake, as microservices are really nothing more than a new and improved take on the Service-Oriented Architecture (SOA) best practices we struggled to hammer out over the last decade. Skeptics, however, might say that this change is nothing more than an exercise in buzzword-hopping. SOA is passé, and now that people are ...
Information Technology (IT) service providers have historically struggled between the huge capital expenditure and long development cycles of building their own cloud versus the thin margins and limited flexibility of using public retailers such as Amazon Web Services (AWS). The emergence of wholesale cloud, and the technologies that make it possible, is revolutionizing how and by whom enterprise IT is delivered. Wholesale cloud is the game-changing third option between building your own (BYO) c...
Shipping daily, injecting faults, and keeping an extremely high availability "without Ops"? Understand why NoOps does not mean no operations. Agile development methodologies require evolved operations to be successful. In his keynote at DevOps Summit, David Tesar, Microsoft Technical Evangelist on Microsoft Azure and DevOps, will discuss how Microsoft teams who have made huge progress with a DevOps transformation effectively utilize operations staff and how challenges were overcome. Regardless ...
You often hear the two titles of "DevOps" and "Immutable Infrastructure" used independently. In his session at DevOps Summit, John Willis, Technical Evangelist for Docker, will cover the union between the two topics and why this is important. He will cover an overview of Immutable Infrastructure then show how an Immutable Continuous Delivery pipeline can be applied as a best practice for "DevOps." He will end the session with some interesting case study examples.
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. 8th International Big Data Expo, co-located with 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. As advanced data storage, access and analytics technologies aimed at handling high-volume and/or fast moving data all move center stage, aided by the cloud computing bo...