The AES standard, certified through the National Institute of Standards and Technology (NIST), is a widely employed method of securing data-at-rest and when coupled with authentication through the industry-standard TCG Enterprise interface, provides a powerful method of protecting data that users can trust and that IT Managers can depend on.
An encryption key is used to convert user data into coded data that can not be de-coded without the same key. Eliminating the encryption takes a few hundred milliseconds and results in the automatic creation of a new key. User data remains on the drive in its originally encrypted format and can not be decoded using the new encryption key.
|Product Family||Interface||Secure Erase Type||Encryption|
|Optimus Family||SAS||ATA-8 Security Erase||AES 256-bit
TCG Enterprise compliant
|XceedIOPS2||SATA||ATA-8 Security Erase||AES 256-bit|
|CloudSpeed 500||SATA||ATA-8 Security Erase||AES 256-bit|
|Xcel-10||SATA||ATA-7 Security Erase||N/A|
|Xcel-200||SATA||ATA-8 Security Erase||AES 128-bit|