Recommended To Read:

What data recovery tools to buy if you want to start a data recovery business?

Free video data recovery training on how to recover lost data from different hard drives?

Where to buy head and platter replacement tools at good prices?

Data recover case studies step by step guide

I want to attend professional data recovery training courses

As usual, data recovery from encrypted drives or other storage medias can be a hot potato, like so far, it’s very hard to find a good tool to recover data from SANDISK flash drives due to its encryption, data recovery tools manufacturers are working very hard to have a reverse algorizm to restore the data to be readable! Now the new Seagate SED drives can be another challenge to data recovery companies and tools providers!

Seagate Technology announced worldwide availability of the Seagate Secure™ Self-Encrypting Drive (SED) option across its portfolio of enterprise-class hard drives on September 22nd, 2009.

According to Seagate, these enterprise-class products are the company’s first-to-market drives with the SED technology, designed to deliver transparent security features for servers and high-end storage systems; According to Seagate, other than the security, the Seagate SED’s encryption engine matches the full interface speed of the drive and therefore drive performance does not suffer when the encryption is turned on. The company’s disk encryption technology is also supported by the security protocol developed through the Trusted Computing Group (TCG). This means it is compatible with a wide range of devices and major storage system providers.

Highlights of such SED drives

Performance
The encryption engine matches the full interface speed of the drive and therefore drive performance does not suffer. And because each individual drive contains its own encryption engine, there are no bandwidth issues with scalability as your security and storage needs grow with more drives added to the system.

Compatibility
Drive-level full disk encryption (FDE) technology is supported by the security protocol developed through the Trusted Computing Group (TCG), an organization consisting of membership of more than 50 participating companies, including all hard drive manufacturers. Key management standards to insure interoperability are being established via the IEEE 1619.3. All major storage system providers are participating in IEEE 1619.3.

Manageability
Transparent to end user and storage systems, SEDs scale linearly with no bottlenecks or single points of failure. The IT user does not need to escrow the encryption key to maintain data recoverability because the encryption key is held in the drive. This frees the storage administrator from having to schedule and conduct this performance-throttling activity.

Security
SED technology delivers a new standard of security for data-at-rest encryption. Cipher text is never exposed and the drive is locked and inaccessible to anyone without full authorization.

Learn more at  http://www.seagate.com.

Data recovery from such drives with data encrypted can be another new challenge! So users with these drives must have a good habit of  regular data backup and have several copies to be secured.

Data recovery Salon welcomes your comments and share with us your ideas, suggestions and experience. Data recovery salon is dedicated in sharing the most useful data recovery information with our users and only if you are good at data recovery or related knowledge, please kindly drop us an email and we will publish your article here. We need to make data recovery Salon to be the most professional and free data recovery E-book online.