Learn the answers to the common security questions about FDE.
Select the security question about FDE to view the corresponding answer.
Below are the FDE features for data security:
- Secure computing environment - Hard drive CPU, storage, and firmware manage drive operations independently, making it difficult to compromise or attack the drive. Seagate Secure technology further strengthens the security of a drive through authentication and communication infrastructure.
- Independent data processing unit - Hard disk drives include powerful processors, high-speed memory, and multiple data ports. Seagate Secure technology has very little impact on the overall performance and speed of drives or systems.
- Private code execution - Drive-level firmware runs in isolation from other system resources and cannot be manipulated or modified by malicious code. Strong access control and trusted communications ensure that only authorized applications have access to security functions for designated storage resources. By protecting critical information, Seagate Secure technology automatically and transparently enables powerful data security. Without any need for user intervention, all data stored on the drive is protected at all times. For example, if a system’s operating system is compromised, the security functions are not affected and will continue to protect the data.
No. FDE device is designed to meet the needs of the most rigid security requirements for banks, corporations, governments, and security professionals.
No. TrueCrypt, which is the target of "evil maid" attack, is an open source product. It is possible for a hacker to discover the necessary function to trap the password at entry.
Endpoint Encryption products are not based on open source code nor reside on unencrypted disk space. We do not run or execute anything in our pre-boot environment that is not our proprietary code or native functionality. Additionally, tamper detection and resistance has been engineered into the Endpoint Encryption pre-boot environment.