Agreement makes laptops more secure

Hitachi Global Storage Technologies and Phoenix Technologies Ltd. will collaborate on next-generation mobile PC security for notebook computers with Hitachi hard drives, allowing PC owners to track, remotely disable and securely erase the disk drive.

02/12/2008


San Jose, CA and Milpitas, CA

Hitachi Global Storage Technologies

Phoenix Technologies Ltd

.,ecurity of vital data stored on them.

According to the Privacy Rights Clearinghouse , more than 200 million records containing sensitive personal information, such as credit cards and social security numbers, have been exposed through security breaches in the U.S. over the past three years. Research from the

Ponemon Institute

The FailSafe agent can be installed on an encrypted Hitachi hard drive. In the event of laptop theft, if the FailSafe agent is removed by the perpetrator, the authorized owner will be able to remotely re-install the FailSafe agent in the compromised system and take further steps to ensure integrity of the data on the laptop.

“Increasingly, ” said Masaru Masuda, director of product planning, Hitachi Global Storage Technologies, “leading notebook PC manufacturers depend on Hitachi to gain a competitive advantage through our hard drives, which include 128-bit AES (Advanced Encryption Standard) technology to protect consumers’ valuable and sensitive information. Now, all of our 2007 and 2008 models of 2.5-inch mobile hard drives can be enabled at the factory to utilize powerful AES-128 encryption engine, which is part of the drive electronics SOC (System-on-Chip).

“In addition to providing data protection by on the fly data encryption, simple deletion of the 128-bit encryption key enables cryptographically secure erase of the drive. By incorporating Phoenix FailSafe technology with our mobile hard drives, OEMs can deliver advanced security to prevent data loss and theft. The ability to remotely and securely erase or disable disk drives on mobile PCs offers the next-generation protection our customers need to stand apart from competitors.”

“While laptops and notebooks continue to grow in popularity, there is a clear need to provide advanced protection to secure the sensitive files and data stored on them,” said Surendra Arora, VP of business development at Phoenix Technologies. “By partnering with laptop drive manufacturers such as Hitachi, we can help prevent data theft and associated crimes like identity theft by extending FailSafe protection to laptops which contain sensitive personal and professional information.”

Control Engineering offers various podcasts on security.

C.G. Masi, senior editor
Control Engineering
News Desk
Register here and scroll down to select your choice of eNewsletters free .





No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
Each year, a panel of Control Engineering editors and industry expert judges select the System Integrator of the Year Award winners.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Learn how to create value with re-use; gain productivity with lean automation and connectivity, and optimize panel design and construction.
Go deep: Automation tackles offshore oil challenges; Ethernet advice; Wireless robotics; Product exclusives; Digital edition exclusives
Lost in the gray scale? How to get effective HMIs; Best practices: Integrate old and new wireless systems; Smart software, networks; Service provider certifications
Fixing PID: Part 2: Tweaking controller strategy; Machine safety networks; Salary survey and career advice; Smart I/O architecture; Product exclusives
The Ask Control Engineering blog covers all aspects of automation, including motors, drives, sensors, motion control, machine control, and embedded systems.
Look at the basics of industrial wireless technologies, wireless concepts, wireless standards, and wireless best practices with Daniel E. Capano of Diversified Technical Services Inc.
Join this ongoing discussion of machine guarding topics, including solutions assessments, regulatory compliance, gap analysis...
This is a blog from the trenches – written by engineers who are implementing and upgrading control systems every day across every industry.
IMS Research, recently acquired by IHS Inc., is a leading independent supplier of market research and consultancy to the global electronics industry.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Case Study Database

Case Study Database

Get more exposure for your case study by uploading it to the Control Engineering case study database, where end-users can identify relevant solutions and explore what the experts are doing to effectively implement a variety of technology and productivity related projects.

These case studies provide examples of how knowledgeable solution providers have used technology, processes and people to create effective and successful implementations in real-world situations. Case studies can be completed by filling out a simple online form where you can outline the project title, abstract, and full story in 1500 words or less; upload photos, videos and a logo.

Click here to visit the Case Study Database and upload your case study.