Information Security

Defending the digital infrastructure


Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Viewpoint: Hard drive encryption growing

Unscrambling Hard Drive Encryption
I just read your TechFocus article on hard disk encryption ("Hard Core," July/August 2007). The article states that "Seagate is the first hard drive manufacturer to release an encrypted drive." I just did a whole disk encryption project and tested an encrypted disk from Stonewood in England called FlagStone. Why didn't you include in your article that this encrypted hard drive product was also available?

Robert J Scharf, IT security officer, Federal Government of Canada

Editor's Note Senior technology editor Neil Roiter responds: Thank you for bringing this to our attention; I wasn't familiar with Stonewood. Seagate is the first major vendor to offer hardware-based encrypted drives, aiming to partner with laptop vendors. ASI Computer Technologies is the first of these. Stonewood Electronics, a British company, has been selling encrypted drives for years, for government and other organizations with projects requiring this kind of technology, such as banking and medical companies.

 It will be interesting to see over the next couple of years how widely available hardware-based encryption will become among PC vendors.



Contact Us
Send your comments to
We reserve the right to edit letters for clarity and space.



Information Security's December issue will mark the 10th anniversary of our covering the information security market, providing the most comprehensive coverage of the people, trends and products you encounter every day on the job.

This keeper issue will traverse the last 10 years in this industry, featuring articles about the innovators, luminaries, practitioners and events that shaped the direction the information security industry has taken.

We want your help. If you have any feedback on the people or landmark events we should include, or if you'd like to share any anecdotes or even photographs from the last decade, we want to hear from you.

Contact us at

December 2007/January 2008 ISSUE
Article 14 of 15

Dig Deeper on Information security policies, procedures and guidelines

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

Get More Information Security

Access to all of our back issues View All