Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Details about the security of Full Disk Encryption (FDE)

    • Updated:
    • 24 Nov 2016
    • Product/Version:
    • Endpoint Encryption
    • Platform:
    • Windows 2003 Standard 64-bit
    • Windows 2008 Server R2
    • Windows 7 32-bit
    • Windows 7 64-bit
    • Windows 8 32-bit
    • Windows 8 64-bit
    • Windows Vista 32-bit
    • Windows Vista 64-bit
    • Windows XP Professional
    • Windows XP Professional 64-bit
    • Windows XP SP3 32-bit

Learn the answers to the common security questions about FDE.


Select the security question about FDE to view the corresponding answer.

Below are the FDE features for data security:

  • Secure computing environment - Hard drive CPU, storage, and firmware manage drive operations independently, making it difficult to compromise or attack the drive. Seagate Secure technology further strengthens the security of a drive through authentication and communication infrastructure.
  • Independent data processing unit - Hard disk drives include powerful processors, high-speed memory, and multiple data ports. Seagate Secure technology has very little impact on the overall performance and speed of drives or systems.
  • Private code execution - Drive-level firmware runs in isolation from other system resources and cannot be manipulated or modified by malicious code. Strong access control and trusted communications ensure that only authorized applications have access to security functions for designated storage resources. By protecting critical information, Seagate Secure technology automatically and transparently enables powerful data security. Without any need for user intervention, all data stored on the drive is protected at all times. For example, if a system’s operating system is compromised, the security functions are not affected and will continue to protect the data.

No. FDE device is designed to meet the needs of the most rigid security requirements for banks, corporations, governments, and security professionals.

No. TrueCrypt, which is the target of "evil maid" attack, is an open source product. It is possible for a hacker to discover the necessary function to trap the password at entry.

Endpoint Encryption products are not based on open source code nor reside on unencrypted disk space. We do not run or execute anything in our pre-boot environment that is not our proprietary code or native functionality. Additionally, tamper detection and resistance has been engineered into the Endpoint Encryption pre-boot environment.

Configure; Troubleshoot; Deploy; Install; Migrate
Solution Id:
Did this article help you?

Thank you for your feedback!

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.