Organizations should have total control over their data security environment to ensure maximum security and transparency. A key consideration for any security product, however, is that managing it should not turn into a full-time job.
This year (2015) the Trusted Computing Group (TCG) Storage Work Group (SWG) published two new specifications derived from the Opal SED specification called Opalite and Pyrite. You may already be familiar with the benefits of using an Opal SED vs software encryption in your laptops and desktops, but are puzzled as to why there are 2 new standards. Perhaps you even wonder if they would be a better fit for your needs than Opal.
In August 2014, the digital security company Websense released a report stating that more than one-third of Canadian IT professionals knew for certain that their company’s data had been the victim of a serious breach.