Protect Your Data

Understand encryption and security types to make sure your important data is safe.

Critical Areas of Data Protection

Three key areas of data protection are outlined below.

Encryption

Ensure data on the drive is securely encrypted

We offer drives with and without hardware-based encryption. Drives with encryption use AES-256 to encrypt user data at rest.

Access Control

Configure the drive to only allow access to authenticated users

We offer drives with industry-standard access control methods, including ATA Security Feature Set and various TCG SSCs (subsystem classes).

Data Sanitization

Securely erase the data when decommissioning the drive

All drives offer sanitize features that when operated correctly are consistent with the “Purge” function described by the NIST SP 800-88 guidelines for media sanitization.

Compare Security Types

Learn about the four main security types we offer, and discover which may be best for you.

Security Type User Data Encrypted At Rest Data Access Control Preferred NIST Purge- Compliant Erase External Certification of Security Protocol
Secure Erase (SE) ⓘ
Shop Now
ATA Security (SATA only) Sanitize Overwrite (HDD)
Sanitize Block Erase (SSD)
Instant Secure Erase (ISE) ⓘ
Shop Now
ATA Security (SATA only) All of the above, plus Crypto Erase
Trusted Computing Group (TCG) ⓘ
Shop Now
TCG-SSC All of the above, plus Revert
TCG-FIPS ⓘ
Shop Now
TCG-SSC All of the above ✔ FIPS 140-2 Certification by NIST-approved labs1

Secure Erase (SE)

SE drives are offered without user-data encryption, and access control can be provided on SATA drives only. Drive sanitization is performed using standard ATA Security Erase, SCSI Sanitize, or NVMe™ Sanitize commands, and incorporate the Overwrite (HDD) or Block Erase (SSD) methods.