Welcome!

News Feed Item

Toshiba Self-encrypting HDD Meets Government-class Security Requirements

Toshiba Corporation (TOKYO:6502) today announced that the MQ01ABUxxxBW series, a mobile-grade thin 7mm hard disk drive (HDD) with self-encrypting technology, including Toshiba’s unique wipe technology, which automatically erases data when an HDD is accessed by an unregistered system, has achieved validation to U.S. Federal Information Processing Standard 140-2 (FIPS 140-2). This is the first Toshiba self-encrypting drive (SED) validated to the FIPS 140-2 standard. Toshiba’s SED models are designed to the Trusted Computing Group’s (TCG) industry-standard “Opal” Security Sub-Classification. This globally accepted standard, implements protocols created to help IT managers, security management application providers and client security professionals to better manage data security and to help prevent potentially damaging and costly breaches to sensitive information. The FIPS-validated model also provides tamper-evident labeling for additional security, with a resulting validation to Level 2 of the FIPS 140-2 standard.

Toshiba: Self-encrypting Thin-type HDD "MQ01ABUxxxBW Series" (Photo: Business Wire)

Toshiba: Self-encrypting Thin-type HDD "MQ01ABUxxxBW Series" (Photo: Business Wire)

The 7mm mobile thin SED series underwent rigorous cryptographic module validation testing by a U.S. National Institute of Standards and Technology (NIST)-certified testing laboratory in order to be validated by the U.S. Federal Information Processing standard. As a result of this validation, this Toshiba HDD series is now available for use in highly regulated and security-sensitive storage applications, such as government systems. The combination of support for ATA (Advanced Technology Attachment) Enhanced Secure Cryptographic Erase function, the TCG-Opal SSC (Security Subsystem Class) protocols, the Toshiba wipe technology extensions of the Opal protocols, and the FIPS 140-2 module level validation makes the MQ01ABUxxxBW series suitable for encrypting confidential data stored on client-grade mobile and desktop computers protected by security management applications.

Unlike software-based encryption products, SEDs perform encryption securely within the drive’s hardware at full interface speeds. This helps to improve system performance, and reduce support burden and integration concerns versus software encryption which performs encryption as a background software task that can negatively impact user productivity. In addition, SED use can eliminate the need for a “re-encryption” cycle during initial client configuration and the drive’s embedded SED encryption cannot be disabled, thus decreasing the risk that security practices required by policy for legal compliance might be put at risk by end-user actions.

Some makers of printers, copiers and other OEM commercial systems apply the added security enabled by Toshiba’s unique wipe technology. Wipe technology helps make it so that self-encrypting drives in such systems can be easily and securely cryptographically erased to protect against data breaches when systems are retired from service, re-deployed or returned to a 3rd party service provider.

Toshiba’s MQ01ABUxxxBW series is currently shipping. For more information on this model’s FIPS 140-2 validation, please reference certificate number 2082 and visit the US NIST CMVP website at:
http://csrc.nist.gov/groups/STM/cmvp/validation.html#01

 

Outline of the New Products

Model Name   Recording Capacity   Height   Interface   Suitable Application   Security
MQ01ABU050BW 500GB[1] 7mm SATA

• Mobile PC,

MFP,

POS


• Government use

• SED (TCG-OPAL SSC)
• Cryptographic-erase (Sanitize)
• Wipe technology
• FIPS 140-2 validated

MQ01ABU032BW   320GB        
 

Notes
[1] Definition of capacity: Toshiba defines a megabyte (MB) as 1,000,000 bytes, a gigabyte (GB) as 1,000,000,000 bytes and a terabyte (TB) as 1,000,000,000,000 bytes. A computer operating system, however, reports storage capacity using powers of 2 for the definition of 1GB = 230 = 1,073,741,824 bytes and therefore shows less storage capacity. Available storage capacity (including examples of various media files) will vary based on file size, formatting, settings, software and operating system, such as Microsoft Operating System and/or pre-installed software applications, or media content. Actual formatted capacity may vary.

Follow this link for more on this product.
http://www.semicon.toshiba.co.jp/eng/product/storage/built-in/client_hdd/index.html

Customer Inquiries:
Storage Products Division
Tel: +81-3-3457-2445

Information in this document, including product prices and specifications, content of services and contact information, is current on the date of the announcement but is subject to change without prior notice.

About Toshiba

Toshiba is a world-leading diversified manufacturer, solutions provider and marketer of advanced electronic and electrical products and systems. Toshiba Group brings innovation and imagination to a wide range of businesses: digital products, including LCD TVs, notebook PCs, retail solutions and MFPs; electronic devices, including semiconductors, storage products and materials; industrial and social infrastructure systems, including power generation systems, smart community solutions, medical systems, escalators and elevators; and home appliances.

Toshiba was founded in 1875, and today operates a global network of more than 590 consolidated companies, with 206,000 employees worldwide and annual sales surpassing 5.8 trillion yen (US$61 billion). Visit Toshiba's web site at www.toshiba.co.jp/index.htm

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
With over 720 million Internet users and 40–50% CAGR, the Chinese Cloud Computing market has been booming. When talking about cloud computing, what are the Chinese users of cloud thinking about? What is the most powerful force that can push them to make the buying decision? How to tap into them? In his session at 18th Cloud Expo, Yu Hao, CEO and co-founder of SpeedyCloud, answered these questions and discussed the results of SpeedyCloud’s survey.
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the develo...
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, explained how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
In today's uber-connected, consumer-centric, cloud-enabled, insights-driven, multi-device, global world, the focus of solutions has shifted from the product that is sold to the person who is buying the product or service. Enterprises have rebranded their business around the consumers of their products. The buyer is the person and the focus is not on the offering. The person is connected through multiple devices, wearables, at home, on the road, and in multiple locations, sometimes simultaneously...
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
"We've discovered that after shows 80% if leads that people get, 80% of the conversations end up on the show floor, meaning people forget about it, people forget who they talk to, people forget that there are actual business opportunities to be had here so we try to help out and keep the conversations going," explained Jeff Mesnik, Founder and President of ContentMX, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Isomorphic Software will exhibit at DevOps Summit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Isomorphic Software provides the SmartClient HTML5/AJAX platform, the most advanced technology for building rich, cutting-edge enterprise web applications for desktop and mobile. SmartClient combines the productivity and performance of traditional desktop software with the simp...
"When you think about the data center today, there's constant evolution, The evolution of the data center and the needs of the consumer of technology change, and they change constantly," stated Matt Kalmenson, VP of Sales, Service and Cloud Providers at Veeam Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Redis is not only the fastest database, but it is the most popular among the new wave of databases running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 19th Cloud Expo, Dave Nielsen, Developer Advocate, Redis Labs, will share the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.