Secure Erase for SSDs Helps Sanitize Data and Boost Efficiency

November 17th, 2016 |
Image for FaceBook
Download PDFRead/Download White Paper (PDF)
 
Share this post:
Facebook | Twitter | Google+ | LinkedIn | Pinterest | Reddit | Email
 
This post can be linked to directly with the following short URL:


 
This pdf file can be linked to by copying the following URL:


 
Download the pdf file.
 
Subscribe:
Connected Social Media - iTunes | Spotify | Google | Stitcher | TuneIn | Twitter | RSS Feed | Email
Intel - iTunes | Spotify | RSS Feed | Email
Intel IT - iTunes | Spotify | RSS Feed | Email
 

IT Best Practices: Protecting data is one of Intel IT’s most important duties to the enterprise. And the practice of protecting data includes not only data that is actively being used, but also data that needs to be erased when repurposing or disposing of PCs. Intel IT uses secure erase because it is the most effective way to sanitize data on an Intel Solid State Drive (Intel SSD). We have validated secure erase through internal testing and third-party testing and have approved its use in place of techniques traditionally used with hard disk drives (HDDs).

Our technicians wipe the data from approximately 20,000 SSDs every year. Secure erase enables technicians to securely wipe a self-encrypting Intel SSD in just seconds. The legacy drive wipe processes involved a three-pass overwrite and could take hours (five or more hours for large drives) and required costly specialized software licenses and equipment. Because the secure erase process is simple and fast, wipe verification and technician training are also simplified. We believe the Intel SSD Professional Family offers the best approach for storing and protecting corporate data and employees’ personally identifiable information and that secure erase is the best method for protecting data when it is no longer needed.


For more information on Intel IT Best Practices, please visit intel.com/IT
 

Tags: , , , , , , , , , , , , , , ,
 
Posted in: Intel, Intel IT, IT White Papers, IT@Intel, Security
 


 


Learn more with Intel IT’s expert on Cyber Risk Management, Tim Casey on:
Intel.com, LinkedIn, or follow him on Twitter.

 

Learn more about IT Business Value from Paula Tolliver, Intel CIO on:
Intel.com, LinkedIn, or follow her on Twitter.