In today s business environment, data creates value so it s more important than ever to protect it as a vital business asset

Similar documents
Trusted. Efficient. Versatile. Exos 7E2000

Nytro 5910 NVMe SSD. Compatibility Report Summary

Trusted. Efficient. Versatile. Exos 7E8

Trusted. Efficient. Versatile. Exos 15E900

Seagate Supply Chain Standards and Operational Systems

Best-Fit Applications

Lightspeed. Solid. Impressive. Nytro 3000 SAS SSD

Capacity-Optimised Enterprise Hard Drive for Bulk-Data Applications

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage

Enterprise Product List March 2015

Disk Encryption Buyers Guide

Implementing Disk Encryption on System x Servers with IBM Security Key Lifecycle Manager Solution Guide

Introduction to AWS GoldBase

Scalable. Responsive. Innovative. Exos X10

Xerox FreeFlow Print Server. Security White Paper. Secure solutions. for you and your customers

The Road to a Secure, Compliant Cloud

Automate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds

Security in NVMe Enterprise SSDs

Key Advantages. ATA streaming support enables recordings from up to 64 HD cameras for smooth, uninterrupted footage.

Key Advantages. ATA streaming support enables recordings from up to 64 HD cameras for smooth, uninterrupted footage.

Does a SAS 70 Audit Leave you at Risk of a Security Exposure or Failure to Comply with FISMA?

Governance, Risk, and Compliance: A Practical Guide to Points of Entry

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored

Introduction to Device Trust Architecture

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

Who s Protecting Your Keys? August 2018

Best Practices in Securing a Multicloud World

Adobe Sign and 21 CFR Part 11

locuz.com SOC Services

Security: The Key to Affordable Unmanned Aircraft Systems

Toward sustainable IT products

Veritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW

Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera

Cloud Communications for Healthcare

Continuous protection to reduce risk and maintain production availability

Trusted Computing Today: Benefits and Solutions

FIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates

Single Secure Credential to Access Facilities and IT Resources

Secure Government Computing Initiatives & SecureZIP

SEAhawk and Self Encrypting Drives (SED) Whitepaper

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

UNDERSTAND THE OPPORTUNITY

Nearline Storage. Enterprise Product List Internal Drives May Enterprise Capacity 3.5 HDD. Page 1

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE

Actionable Insights USE CASES. Plantronics All Rights Reserved. 1

HIPAA / HITECH Overview of Capabilities and Protected Health Information

What can the OnBase Cloud do for you? lbmctech.com

Guidance for Requirements for qualified trust service providers: trustworthy systems and products

Deploying Simple Secure Storage Systems

HP Device as a Service (DaaS)

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

MAXIMIZE SOFTWARE INVESTMENTS

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

A Commitment To Comprehensive

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

TRACKVIA SECURITY OVERVIEW

ngenius Products in a GDPR Compliant Environment

SOLUTION BRIEF Virtual CISO

Security Solutions. End-to-end security. Protecting your physical access control system.

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

Oracle Buys Automated Applications Controls Leader LogicalApps

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

Data Erasure Software Changes

Weighing in on the Benefits of a SAS 70 Audit for Third Party Administrators

Evolved Backup and Recovery for the Enterprise

IBM Security Access Manager

ADVANTAGES TO INCLUDING Autotask Endpoint Backup IN YOUR MANAGED SERVICES PORTFOLIO

Security Enhancements

Make security part of your client systems refresh

HALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD. Automated PCI compliance anytime, anywhere.

SECURING DEVICES IN THE INTERNET OF THINGS

Aon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

SECURING DEVICES IN THE INTERNET OF THINGS

Securing Devices in the Internet of Things

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1

Deliver Data Protection Services that Boost Revenues and Margins

Achilles System Certification (ASC) from GE Digital

Securing Your Most Sensitive Data

HIPAA Regulatory Compliance

Network Visibility and Segmentation

Ten Innovative Financial Services Applications Powered by Data Virtualization

Overview of Archiving. Cloud & IT Services for your Company. EagleMercury Archiving

INTELLIGENCE DRIVEN GRC FOR SECURITY

Sustainable Security Operations

Cyber security for digital substations. IEC Europe Conference 2017

Tags: /vu?pi=zgxzwod3kzdubjz0

10/18/2016. Preparing Your Organization for a HHS OIG Information Security Audit. Models for Risk Assessment

How to Create, Deploy, & Operate Secure IoT Applications

Complete document security

Requirements for Building Effective Government WLANs

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

Sparta Systems TrackWise Digital Solution

Guide: HIPPA Compliance. Corporate HIPAA Compliance Guide. Privacy, productivity and remote access. gotomypc.com

A Robust, Flexible Platform for Expanding Your Storage without Limits

SECURITY & PRIVACY DOCUMENTATION

TechDirect User's Guide for ProDeploy Client Suite

WHITE PAPER. Meeting GDPR Challenges with Delphix. KuppingerCole Report

University of Pittsburgh Security Assessment Questionnaire (v1.7)

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

Transcription:

In today s business environment, data creates value so it s more important than ever to protect it as a vital business asset

Seagate Secure Reliable Data Protection Solutions Always-on Data Protection In today s business environment, data creates value so it s more important than ever to protect it as a vital business asset. Data managers need sustainable, long-term security solutions that minimize risk with the least impact on productivity. But greater value means greater threats, and software based security measures alone are no longer sufficient to ensure that your data stays under your control. In fact, software-only solutions intensify the pressure on the data storage lifecycle, making end-to-end security both more important and more difficult. That s why security analysts recommend a broad range of solutions including hardware-based encryption. The self-encrypting drive (SED) was introduced in 2009 as a hardware-based data security measure, and Seagate has embraced the standard and engineered it into an essential component of modern asset protection. Combined with its protected hardware lifecycle and integration of multiple levels of security protocols, this added layer gives Seagate Secure storage devices the edge. Seagate leads the way on data security Seagate s long history with data storage has given us deep understanding and insight into data security. Seagate Secure SEDs protect your data at rest and make device retirement a breeze. For those with more stringent requirements, we also offer advanced government-grade security.

Data Security Lifecycle All Seagate Secure devices are built using a secure supply chain. True data security begins before storage devices are put into use. Seagate focuses on maintaining holistic security solutions throughout the product lifecycle. DESIGN: Security is embedded in the Seagate lifecycle Data security starts long before you purchase your storage device and persists indefinitely after you stop using it. All Seagate Secure devices are protected from attackers at every stage of the lifecycle, from the conceptual phase of design to their final retirement or reuse. You can rest assured that attackers haven t accessed your device at any stage before you deploy it, and that your data is inaccessible after you retire your device. We ensure that our hardware design process is closed to all but our own vetted workforce. COMPONENT SOURCING: Every component of every device is sourced from trusted vendors. MANUFACTURE: Each component is assembled in a secured facility. DELIVERY: We engage only trusted vendors to deliver all Seagate Secure devices. DEPLOYMENT: It s simple and straightforward to roll out our storage devices, minimizing the risk of security-related errors. IN-USE: Our SEDs make sure that your users and only your users can access your data. RETIREMENT: Our Instant Secure Erase feature lets you eradicate all data in seconds for quick, painless device retirement.

Seagate Secure delivers solutions you can depend on Whether you need a secure laptop or a hardened data storage facility, Seagate has got you covered. Our Essential feature set delivers protection that suits most needs, and we offer the Certified level of service with FIPS, Common Criteria and TAA-compliant solutions for government or enterprise customers running highly secure, data sensitive services and applications. We offer two levels of service: FIPS 140-2 CERTIFIED Trade Agreement Act Common Criteria ESSENTIAL Self-Encrypting Drive Secure Diagnosis & Download Instant Secure Erase Secure Supply Chain Essential features are available on Seagate Secure drives.

LEVEL 1 - ESSENTIAL INCLUDED these features are available on Seagate Secure drives: Secure Supply Chain: Each of our components is sourced securely from trusted sources. Seagate complies with the Open Trusted Technology Provider Standard (O-TTPS) Increasing trust of third-party processes to Seagate and O-TTPS security policies Ensuring customers receive authentic products, components, and firmware Self-Encrypting Drive: Every device uses hardware-based encryption to protect against attacks. Secure data locking using AES 256 standards with hardware root key and device root of trust Drive locks on power-down Industry-standard authentication key management interfaces Secure Diagnosis & Download (SD&D): Your firmware is protected from attackers throughout its working life. Digitally signed firmware with rogue firmware detection Locked diagnostic ports Cross-segment downloads blocked Secure boot process Instant Secure Erase: Administrators can instantly replace the encryption key on any device, rendering its data crypographically erased and making retirement or reuse much easier. Fast, secure, and complete data erasure in seconds Internationally sanctioned erasure according to NIST 800-88 and ISO 27040

LEVEL 2 - CERTIFIED OPTIONAL these features may be added to meet regulatory or other requirements: FIPS 140-2 Level 2 Certified Configuration Federal government encryption standard for sensitive, but not classified, data Required for Health Insurance Portability and Accountability Act (HIPAA) Tamper-evident labels Trade Agreement Act (TAA) Compliant Storage Client, Enterprise, and SSD product compliance Meets origin requirements for US Government purchasing contracts Adopted and recognized by 126 member nations Common Criteria Evaluated1 International standard for date security certification Neutral third-party evaluation to certify secure IT products Adopted and recognized by 25 member nations 1 Releases on March 2018 Learn More Where to Purchase Seagate Secure storage devices deliver world-class data protection. We d love to answer your questions or discuss solutions tailored to your unique needs. Please reach out to your Seagate Sales Representative any time. For Trade Act Compliance (TAA) please visit: seagategov.com/contacts For all other Seagate Secure inquiries, please visit wheretobuy.seagate.com

2017 Seagate Technology LLC. All rights reserved. Printed in USA. Seagate, Seagate Technology and the Spiral logo are registered trademarks of Seagate Technology LLC in the United States and/or other countries. ImagePerfect and SkyHawk are either trademarks or registered trademarks of Seagate Technology LLC or one of its affiliated companies in the United States and/or other countries. All other trademarks or registered trademarks are the property of their respective owners. When referring to drive capacity, one gigabyte, or GB, equals one billion bytes and one terabyte, or TB, equals one trillion bytes. Your computer s operating system may use a different standard of measurement and report a lower capacity. In addition, some of the listed capacity is used for formatting and other functions, and thus will not be available for data storage. Quantitative usage examples for various applications are for illustrative purposes. Actual quantities will vary based on various factors, including file size, file format, features and application software. Actual data rates may vary depending on operating environment and other factors. The export or re-export of Seagate hardware or software is regulated by the U.S. Department of Commerce, Bureau of Industry and Security (for more information, visit www.bis.doc.gov), and may be controlled for export, import and use in other countries. Seagate reserves the right to change, without notice, product offerings or specifications, October 2017