Absolute Software SED-GD-MO-9K-M-24 Product Datasheet

Page of 2
Product datasheet
www.absolute.com
absolute secure drive
Many organizations rely on encryption to protect their sensitive corporate data. If a device 
containing company information is compromised, encryption is relied upon to protect the 
organization from data breaches and the negative publicity and impact to reputation that will 
follow. 
But most encryption solutions present their own set of challenges:
  traditional software applications are expensive
  computer performance can be negatively impacted
  Management of encryption keys is a manual process, that consumes significant It resources
even if you get everything right, there is one point of failure beyond your control...the end user. 
If the user fails to store the documents in the appropriate volume or if they do not safeguard 
their encryption key, then encryption will provide you with no protection at all.
to combat this reality, computer manufacturers are building self-encrypting drives (seds) into 
their devices, providing a standardized, hardware-based method of encryption that will ship with 
the computer. 
self-encrypting drives & oPaL specifications 
seds that are built into new computers comply with the oPaL specifications – an industry 
standard released in early 2009 by the trusted computing Group. By encrypting the drive itself, 
rather than other components of the Pc, the content of an oPaL sed is always encrypted, 
including the encryption keys.
absolute secure drive
 
With encryption built into computers, it is imperative that the organization take immediate 
control to ensure the encrypted hard drive (and the data it contains) is not compromised.
absolute
®
 secure drive supports the new oPaL seds, placing control of this encryption 
technology in the hands of the organization. It administrators can easily configure and set up 
oPaL seds on each computer. then they can administer users, authentication methods, policies, 
and system maintenance through to end-of-life, all from a central administration console and 
much more cost effectively than traditional software-based encryption solutions.
Manage
configure oPaL seds and manage authentication 
mechanisms including single-sign-on options.
Protect
remote encryption key erase for cryptographic data 
wipe drive decommissioning or at Pc end of life. 
recover
easily restore credentials if the system crashes or 
an authentication device fails.
“My hard drive is 
 self-encrypting.”
self-encrypting drive
Fig 1. Computer manufacturers are building SEDs into new computers that comply with the OPAL specifications