Big data, cloud computing, and artificial intelligence (AI) have become supporting technologies for driving a new round of industrial revolution. As these technologies continually develop, data security and privacy have become two of the most serious problems. Take the EU’s General Data Protection Regulation (GDPR) as an example. It is a regulation set up to protect the privacy and personal information of general users. This also induced more companies to pay attention to data security and gradually choose Self-Encrypting Drives (SED) that support AES 256-bit encryption technology to avoid legal risks caused by leaked data.
What is TCG OPAL ?
TCG (Trusted Computing Group) is an organization dedicated to the development of industrial standards which developed and formulated the OPAL Storage Specification. Devices that meet TCG OPAL standards can perform data encryption, storage, and hierarchical management without going through the host terminal or additional host hardware.
A⁺ OPAL – Exclusive data security encryption software from ADATA
The exclusive A⁺ OPAL software from ADATA is applicable to all ADATA industrial NVMe and SATA III SSDs that support TCG OPAL. It can help users run TCG OPAL SED (Self-Encrypting Drive) more easily to satisfy medical, military, industrial, and network communication, server and monitoring applications, and the rigorous requirements that governments have for data security.
Why You Need A⁺ OPAL?
Compared to time-consuming encryption software that takes up system resources (CPU/Memory), TCG OPAL hardware SED (Self-Encrypting Drive) technology is a more efficient, secure, and easier management method. The A⁺ OPAL software developed independently by the R&D team of ADATA allows for easier encryption technology:
1. Lowers the threshold for users without a technical background to enable TCG OPAL encryption.
2. Intuitive and simple operation interfaces that can help users to easily provide complete protection for hard drives.
3. With the help of hardware encryption technology, the load from host system encryption can be reduced so that performance will not to be sacrificed while protecting data.
Target Applications