Importance of Data Security
SecurStor is ATP’s answer to the growing data security concerns in the industry and is integrated into most of ATP’s new or upcoming industrial only flash storage solutions. Its feature set can be customized to the individual requirements of an application or a system and with that helps protect mission-critical applications against unauthorized access to data or systems.
SecurStor’s feature range includes, but goes far beyond, conventionally available data at rest protection mechanisms such as encryption or TCG Opal to assure protection not only of data that is stored in the NAND but can also be used as the foundation for protecting data that is being processed inside a system or sent across a network.
Gone are the days when vehicles were merely modes of transportation, household appliances performed limited functions and machines were just mechanical contraptions. Today, things no longer function in isolation. They communicate and interact with one another, with people, with the environment and essentially with everything that is connected to the vast network commonly called the Internet of Things (IoT), which is increasingly growing and transforming into the Internet of Everything (IoE) While this unstoppable phenomenon is creating limitless opportunities, it is also creating unimaginable security threats and vulnerabilities with the constant generation, movement, processing and storing of data. If prevention and management measures are not in place, such risks could result in substantial financial and legal consequences.
According to the "2018 Cost of a Data Breach" Study conducted by Ponemon Institute and sponsored by IBM Security, the global average cost of a data breach in 2018 amounted to $3.86 million, up 6.4% compared with 2017. Each stolen record containing sensitive and confidential information cost $148, a 4.8% increase year over year. The table below shows the possible risks and types of protection mechanism typically employed for specific data states:
Data at Rest
System-Level & Network-level
Data stored on media, not in use
Data in process and/or shared in cloud/network
Theft of HW, „unsafe disposal“
Malware, Spyware, Ransomware, Unauthorized access
ATP custom features
common controller feature
limited but growing
SecurStor Security Suite
Data at Rest Protection
Many ATP products come with data at rest security features by default. They include encryption mechanisms, TCG OPAL, eDrive or Self-Encrypting Drive (SED) and aim at protecting data that is stored on the media. With the help of data at rest protection mechanisms, individuals and corporations can limit unauthorized access to their data in case of device theft or unsafe disposal of IT systems or storage media.
SecurStor Security Suite
Custom-Built Security Solutions
In the connected world, data frequently travels between multiple locations. However, as soon as it leaves a storage media, e.g. to run in a system or be sent through a network, data at rest protection mechanisms fall short as they are only able to protect data that remains inside. ATP SecurStor includes a variety of options that go beyond data at rest protection. These features can be customized to specific application requirements and help protect against unauthorized access and illegal copying to ensure data, O/S and FW integrity.
Databases are large compilations of data, such as customer information, employee information, credit card numbers, phone numbers, financial data and other information that is usually sensitive and confidential. Cybercriminals target databases for the value of the data they hold. Adding to their vulnerability is the fact that several users can access them simultaneously for collection and processing. It is thus crucial that effective data security solutions are in place to protect stored data and make sure that it is kept away from intruders and unauthorized persons who would alter, disclose or distribute the information maliciously.
Public Networks Security
Stolen credentials and illegal access to accounts are among the critical issues that could lead to fraudulent transactions over networks. Mobile devices connecting to banking services for example, are big targets of cybercriminals. Keys and personal information stored in local drives or over networks may be falsely used as authentication credentials, so these should be well protected.
Cloud Data Security
Employees working remotely using their own devices in their home networks could increase security vulnerabilities as they access cloud-based apps and team collaboration apps such as emails, chat, video and file sharing. Data leakage, regulatory compliances depending on geography, abuse of user privileges and poorly managed backups are just a few pervasive cloud data security issues. Security solutions should ensure a trusted environment regardless of where the data is actually located.
Hardware based product identification, using physically unclonable function (PUF) technology where needed.
Ensures the integrity and validity of the stored system’s BIOS configuration.
Ensures the integrity and validity of any update to the firmware.
Password-protected access to all or part(s) of the User Data area.
Puts the device into “Write-Once” mode.
AES-256 encryption for the User Data area.
Pairs the storage device with a specific type of customer device to prevent illegal copying.
Ensures the integrity and validity of the operating system or application image stored in the User Data Area.
Plus other features defined for data storage devices by the Trusted Computing Group.
Fast, safe and permanent removal of data by deleting the encryption key.
|Securboot/Securencrypt microSD card|
|Density||4 GB to 16 GB|
|Performance Sequential Read up to (MB/s)||10.2|
|Performance Sequential Write up to (MB/s)||6.0|
|Operating Temperature||-25°C to 85°C|
|Reliability MTBF @ 25°C||>2,000,000 hours|
|Reliability Number of Insertions||10,000|
|Dimensions: L x W x H (mm)||15.0 x 11.0 x 1.0|