Chapter 1: Secure Erase Overview
instructions or security keys that are designed to enhance our product performance.
1.1.2 Secure Erase for ATA SED SSD Devices
Trusted Computing Group (TCG) Locking Range Erase Method Used
The chief concern in secure erase is how to avoid damaging the media drive while
• TCG (Trusted Computing Group)
encrypt a media drive and then destroys the encryption key by performing a secure
erase to overwrite and to erase the instructions of the encryption key. In other words,
destroys that particular encryption key by overwriting it via a secure erase. Since this
Enterprise class systems.
ATA Technique Explained
• ATA
ware settings or software instructions in our computers that are created by Supermicro
or our vendors to maximize system performance and optimize user experience, and
avoid unintentional removal of any data or instructions, resulting in unintended degraded
system performance or user experience.