Multiple points of protection from design to usage and beyond.
To keep your data safe, Western Digital has a holistic security process for enterprise hard drives and SSDs. By integrating security into the firmware, hardware, and manufacturing processes, we ensure your data is protected using industry-standard encryption protocols and data access control.
From the early stages of product design, data security is a key consideration.
Stringent processes ensure drive authenticity and protection.
Secure firmware download and authentication make sure the device is protected.
Industry-standard protocols help protect against unauthorized access to the device data.
Our Easy Recycle program sustainably and securely recycles the device.
Purposeful security-oriented design and feature development help ensure two main outcomes.
For tamper-proof protection, security is built into the drive at various points.
Unique identifiers, including, but not limited to, a serial number for every drive, allow for tracing and authentication measures.
The drive can also offer protection for user data at rest, through encryption and access control, to ensure that the data can only be accessed by authorized users in the case of loss, theft, or remote attack.
After manufacture, drive firmware is protected with secure download and authentication procedures. These help ensure that the drive functionality cannot be maliciously tampered with during the delivery process to the customer, or thereafter.
The drive must offer protection when the drive is decommissioned, such that user data can be erased and the drive taken out of use or repurposed for another use.
TECH BRIEF
How to Set Up a TCG Ruby Compliant Drive with SEDutil
Understand the basics of TCG Ruby on Western Digital SSDs.
TECH BRIEF
Protect Your Drive, Protect Your Data
Learn more about our security approach to enterprise drives.
Data encryption is a useful and strong solution for providing data security, either by use of software or hardware. Encryption scrambles data into meaningless characters that can only be made readable with an encryption key, and enables Instant Secure Erase where you can eradicate your data instantly by destroying the encryption key.
Disclosures
1. Program may not be available in all regions of the world.
References to certain features or services do not imply that they will be made available in all countries or an all products.