Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Avoid built-in SSD encryption to ensure data recovery after failure, warns specialist

David Braue | July 8, 2013
Companies wanting to ensure their data is recoverable from solid state disk (SSD) drives should make sure they use third-party encryption tools with known keys rather than relying on devices’ built-in encryption, a data-recovery specialist has advised.

Many users had yet to appreciate the complexity that SSD poses, with a November 2012 customer survey suggesting just 31 per cent were aware of the complexity of SSD-based encryption and 48% saying there was no additional risk posed by using SSDs. An additional 38 per cent said they didn't know.

The SSD challenge isn't limited to smartphone-wielding users, however: as data-centre operators increasingly turn to SSD to boost the effective speed of their data-storage operations, Briscoe warned that a growing number of the company's recovery operations were involving data lost to cloud-computing operators.

"A lot of vendors are using hybrid solutions with a bank of SSDs in a storage area network, then write data to [conventional] drives," he said.

"We're seeing more and more instances of cloud providers losing data: they rely very much on snapshots, and if something happens to the data - if there is corruption to the operating system or some type of user error - we are having more and more cloud providers coming to us with data loss."

 

Previous Page  1  2 

Sign up for CIO Asia eNewsletters.