self encrypting drive excerpts - trusted computing group · •it is likely that by about 2017 all...

9
Market & Technology Report Thomas M. Coughlin Coughlin Associates, Inc. August 2011 © 2011 Coughlin Associates, Inc. www.tomcoughlin.com 408-978-8184 Self Encrypting Drive

Upload: others

Post on 06-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Self Encrypting Drive Excerpts - Trusted Computing Group · •It is likely that by about 2017 all HDDs will shift to SED capable units, although estimated security adoption units

Market & Technology Report

Thomas M. Coughlin Coughlin Associates, Inc.

August 2011

© 2011 Coughlin Associates, Inc. www.tomcoughlin.com 408-978-8184

Self Encrypting Drive

Toms Laptop
Typewritten Text
Excerpts
Toms Laptop
Typewritten Text
Toms Laptop
Typewritten Text
Toms Laptop
Typewritten Text
Toms Laptop
Typewritten Text
Toms Laptop
Typewritten Text
Toms Laptop
Typewritten Text
Page 2: Self Encrypting Drive Excerpts - Trusted Computing Group · •It is likely that by about 2017 all HDDs will shift to SED capable units, although estimated security adoption units

Self-Encrypting Drive Market and Technology Report—Coughlin Associates

© 2011 Coughlin Associates Page 2

The Self-Encrypted Drive Market and Technology Report is published by:

Coughlin Associates

9460 Carmel Road

Atascadero, Ca. 93422

Tel (408) 978-8184

www.tomcoughlin.com

© 2011 Coughlin Associates

All rights reserved. No portion of this report may be reproduced in any form or by any means without permission from the publisher. Information in this report is believed to be reliable but cannot be guaranteed to be complete or correct.

Page 3: Self Encrypting Drive Excerpts - Trusted Computing Group · •It is likely that by about 2017 all HDDs will shift to SED capable units, although estimated security adoption units

Self-Encrypting Drive Market and Technology Report—Coughlin Associates

© 2011 Coughlin Associates Page 3

Table of Contents Executive Summary ........................................................................................................ 4 Introduction ..................................................................................................................... 4 Technology Options for Data at Rest .............................................................................. 5 Factors That Led to Slow Market Adoption of Self-Encrypted Storage Devices .............. 6 Factors Favoring Future Growth of Self-Encrypted Storage Devices .............................. 8 Some Additional Benefits with SEDs ............................................................................. 14 Market Projection Methodology for Self-Encrypted HDDs and SSDs ............................ 14 Market Projections for Self-Encrypted HDDs ................................................................ 16 Market Projections for Self-Encrypting SSDs ................................................................ 22 Summary ....................................................................................................................... 25 Appendix: A Discussion of Growth Modeling ............................................................... 26 About the Author: .......................................................................................................... 30 Sources and References ............................................................................................... 30

Table of Figures Figure 1. Banded Hard Drive Volume Projections ........................................................ 16 Figure 2. Projection of Drives by Market Niches (in 1,000’s of units) ........................... 17 Figure 3. Security Adoption for Laptop HDDs .............................................................. 18 Figure 4. Security Adoption for Enterprise HDDs ......................................................... 19 Figure 5. Security Adoption for Desktop HDDs ............................................................ 19 Figure 6. Security Adoption for Consumer Electronics HDDs ...................................... 20 Figure 7. Security Adoption for all HDDs Market Segments ......................................... 21 Figure 8. Security Adoption SED HDD Estimates (high, median and Low) .................. 22 Figure 9. SSD Annual Shipped Unit Projections .......................................................... 23 Figure 10. High/median/low SSD Estimates ................................................................. 23 Figure 11. SSD Security Adoption Projections ............................................................. 25 Figure 12. External Resistance Model Growth Curve................................................... 27 Figure 13. Internal Social Model Growth Curve ............................................................ 29

List of Tables Table 1. HDD Encryption Throughput Test Results (extracted from 2010 Trusted Strategies Report) ......................................................................................................... 10 Table 2. SSD EncryptionThroughput Test Results (extracted from 2010 Trusted Strategies Report) ......................................................................................................... 11

Page 4: Self Encrypting Drive Excerpts - Trusted Computing Group · •It is likely that by about 2017 all HDDs will shift to SED capable units, although estimated security adoption units

Self-Encrypting Drive Market and Technology Report—Coughlin Associates

© 2011 Coughlin Associates Page 4

Executive Summary The major conclusions from this report are:

• It is likely that by about 2017 all HDDs will shift to SED capable units, although estimated security adoption units by 2016 (SED capable HDDs actually used or intended for data security) are only 25% of all HDDs shipped.

• By 2016 the high, median and low estimates for security adoption for SED HDDs are 411 M, 315 M and 122 M units.

• We project that within 2 years (by 2013) SED capability will be in over 80% of SSDs and likely in almost all SSDs within 3 years (2014).

• Although actual SSD SED feature implementation in 2016 is likely to 100% in about 122 M SSDs, the projected actual SSDs from that year used for security and data protection purposes is estimated at less than 18 M units

Introduction In July and August 2011, in cooperation with members of the Trusted Computing Group storage w orking group, C oughlin Associates c onducted a s urvey of a num ber o f interested p arties t o the us e o f encryption t o pr ovide s ecurity i n v arious t ypes o f electronic equipment t hat use s torage d evices. Those i nterviewed i ncluded s torage device s uppliers ( hard di sk dr ives and s olid state d rives), s ystems O EMs, se curity software companies, storage controller suppliers and others.

Based u pon i nput from t he i nterviews we c reated a l ist of dr ivers for t he use o f s elf-encrypting dr ives ( SEDs) as well as f actors t hat l imit t heir us e i n t he m arket, bot h historically as w ell as i n t he near future. In t his r eport w e ex amine each o f t hese positive and negative factors and look at their historical impact on the SED market and the implications of these factors in the future growth of SEDs, both HDDs and SSDs.

In addition to input from the interviews we a lso used public information such as press releases, reports and presentations to look at both past projections and factors driving or moderating future growth. We include references and material from these sources as appropriate in this report.

In the course of our analysis we came to realize that there was more than one type of metric for the growth of SED devices. The f irst metric is the growth of SED capable devices or SED adoption. SED c apable devices hav e s elf-encryption bui lt i nto t he

Page 5: Self Encrypting Drive Excerpts - Trusted Computing Group · •It is likely that by about 2017 all HDDs will shift to SED capable units, although estimated security adoption units

Self-Encrypting Drive Market and Technology Report—Coughlin Associates

© 2011 Coughlin Associates Page 5

basic architecture of the device. Data coming into and out of the device are encrypted or c an be encrypted i f this feature i s e nabled. The s econd metric i s t he g rowth o f security adoption using SEDs. T he first metric enables the second metric but not all SED c apable dev ices will ac tually be or are intended t o b e us ed f or pr otecting t he privacy of data. Thus security adoption will by its nature be slower than SED capability growth.

We base our projections upon a s implified version o f the Bass D iffusion Model9. This model i s a m athematical m odel t hat projects g rowth of a m arket based u pon accelerating a nd r esisting f actors. A s a r esult o f t he i nteraction of t hese factors t he resulting growth curve has a f amiliar s-shape. An analysis of the factors leading to s-curve growth is given in the report appendix. In our projection for security adoption we assume that all the SED capable devices sold to date are actually used for or intended to be us ed for t he protection o f da ta. We us e hi storical dat a o n S ED H DDs and appropriate growth factors for several HDD markets to project security adoption in each of t hese m arkets and by ag gregating t hese pr ojections g et a p rojection of s ecurity adoption g rowth f or HDDs. Hi gh, m edian and l ow es timates for security adopt ion are based upon high, median and low estimates for total HDD shipments.

Separately we make projections for the growth of SED capable storage devices, arguing that once t he de mand for t hese devices i n a g iven m arket exceeds s ome threshold value that al l HDDs intended for that market will become SED capable devices within some reasonable period of time.

Although the available historical data for SED SSDs is less available we have created a model based upon analogy to the HDD model for both security adoption as well as SED capable s torage devices. N ote that due to the importance of crypto-erase for making data i naccessible on a S SD, we ex pect S ED c apable S SDs t o become w idespread more quickly than we project for HDDs.

For More Please see the Full Report

Page 6: Self Encrypting Drive Excerpts - Trusted Computing Group · •It is likely that by about 2017 all HDDs will shift to SED capable units, although estimated security adoption units

Self-Encrypting Drive Market and Technology Report—Coughlin Associates

© 2011 Coughlin Associates Page 6

About the Author:

Tom C oughlin, P resident, C oughlin A ssociates i s a w idely respected s torage an alyst and c onsultant. H e has ov er 3 0 years i n t he dat a s torage i ndustry with m ultiple eng ineering and management positions at high profile companies.

Dr. C oughlin has many publ ications and s ix pat ents t o hi s credit. Tom is also the author of Digital Storage in Consumer Electronics: T he Essential G uide, w hich was publ ished by Newnes P ress. C oughlin A ssociates provides m arket a nd technology anal ysis ( including r eports on s everal digital

storage t echnologies and ap plications and a new sletter) as well as D ata S torage Technical C onsulting s ervices. T om i s publ ishes a Digital Storage in Consumer Electronics Report, a Media and Entertainment Storage Report, and a Capital Equipment and Technology Report for the Hard Disk Drive Industry.

Tom i s a ctive w ith S MPTE, SNIA, ID EMA, th e I EEE M agnetics S ociety, IEEE C E Society, and other professional organizations. Tom is the founder and organizer of the Annual S torage V isions C onference ( www.storagevisions.com), a par tner t o t he International Consumer Electronics Show, as well as the Creative Storage Conference (www.creativestorage.org). H e i s al so a S enior m ember o f t he I EEE, L eader i n t he Gerson Lehrman Group Councils of Advisors and a member of the Consultants Network of Silicon Valley (CNSV). For more information on Tom Coughlin and his publications. go to www.tomcoughlin.com.

Sources and References 1 Trusted Platform Module (TPM): Adoption Dynamics, IDC, 2006 2 Trusted Computing is Real and it’s Here, Endpoint Technologies Associates, 2007 3 Perceptions about Self-Encrypting Drives: A Study of IT Partitioners, Ponemon Institute, 2011. 4 Employment Size of Firms, US Census Bureau, 2008. 5 FDE Performance Comparison: Hardware vs. Software Full Drive Encryption, Trusted Strategies, February 9, 2010. 6 Full Drive Encryption with Samsung Solid State Drives, Trusted Strategies, November 2010. 7 Reliably Erasing data from Flash-Based Solid State Drives, M. Wei et. al, Presented at Fast 2011 8 Based upon discussions with encryption and SED experts during the course of this research 9 New Product Diffusion Models in Marketing: A Review and Direction for Research, V. Mahajan, E. Muller and F.M. Bass, Journal of Marketing, Vol. 54 (January 1990), pp 1-26. 10 Managing technology and innovation for competitive advantage, V. K. Narayanan, 2001, Prentice Hall. 11 Digital Storage Technology Newsletter, Coughlin Associates, July 2011. 12 Seagate Tops 1 Million Mark in Shipments of Self-Encrypting Hard Drives for Laptop PC’s and Data Center Servers, Seagate Press Release, February 14, 2011. 13 Solid State Drives: Outlook 2010, Objective Analysis, 2010

Page 7: Self Encrypting Drive Excerpts - Trusted Computing Group · •It is likely that by about 2017 all HDDs will shift to SED capable units, although estimated security adoption units

ORDER FORM FOR THE 2011 SELF ENCRYPTING DRIVE MARKET AND TECHNOLOGY REPORT (PDF)

NAME: _____________________________________

TITLE: _____________________________________

COMPANY: _________________________________

ADDRESS: _________________________________

CITY: __________________STATE:_____________

ZIP: _______________________________________

TELEPHONE: _______________________________

FAX: ______________________________________

E-MAIL: ___________________________________

Company License $3,000

Visa Mastercard American Express

Credit Card Number: _________________________

Expiration Date: _____________________________

Signature: __________________________________

Make checks payable to: Coughlin Associates

Mail to 1665 Willowmont Ave., San Jose, CA 95124 Telephone: 408-871-8808 Fax: 866-374-6345

Email: [email protected]

Page 8: Self Encrypting Drive Excerpts - Trusted Computing Group · •It is likely that by about 2017 all HDDs will shift to SED capable units, although estimated security adoption units

The Trusted Computing Group (TCG) is an international industry standards group that develops specifications amongst it members and publishes the specifications for use and implementation by the industry.

The TCG is organized into a work group model whereby experts from each technology category can work together to develop the specifications. This fosters a neutral environment where competitors and collaborators can develop industry best capabilities that are vendor neutral and interoperable. The organization's structure has been designed to enable broad participation, efficient management, and widespread adoption of the organization's specifications.

Membership is open to a wide range of for-profit corporations, non-profit corporations, and other enterprises supportive of TCG's goals and includes reasonable and non-discriminatory (RAND) patent licensing policy among members. The TCG provides a number of marketing and certification programs for leading hardware, security, services and other organizations with a stake in security. Membership at the Contributor level enables companies to partake in the development of specifications, as well as help shape the direction of the trusted enterprise.

The TCG Storage Work Group builds upon existing TCG technologies and philosophy, with a focus on standards for security services on dedicated storage systems. One objective is to develop standards and practices for defining the same security services across dedicated storage controller interfaces, including, but not limited to, ATA, Serial ATA, SCSI, FibreChannel, USB Storage, IEEE 1394, Network Attached Storage (TCP/IP), and iSCSI. Storage systems include disk drives, removable media drives, flash storage, and multiple storage device systems.

A key deliverable of the Storage Work Group is the Opal Specification, which enables self-encrypting drives. Variants of this specification apply to hard disk drives, SSDs and enterprise-class drives. The Storage Work Group is also developing additional enhancements and specifications to address other storage security issues, as it aligns its work with other storage standards organizations. Details on the Storage Work Group’s deliverables are at http://www.trustedcomputinggroup.org/developers/storage.

More information on membership can be found at http://www.trustedcomputinggroup.org/join_now/membership_benefits.

Page 9: Self Encrypting Drive Excerpts - Trusted Computing Group · •It is likely that by about 2017 all HDDs will shift to SED capable units, although estimated security adoption units

26 Data Protection for Small Businesses and Homes

Self Encrypting Drive Market and Technology ReportThomas M. CoughlinCoughlin Associates, Inc. August 2011

©2011 Coughlin Associates, Inc. www.tomcoughlin.com 408.978.8184 [email protected]