Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Self-Encrypting Drives (SED) with Array Controller RAID and BitLocker

Posted on 2015-02-11
2
Medium Priority
?
606 Views
Last Modified: 2015-02-11
We are installing HP DL380 Gen9 servers with HP Smart Array P440ar contollers and SED drives that conform to the TCG Opal v2.0 standard, compatible with the Microsoft eDrive IEEE 1667 protocol.

We plan to use Server 2012 BitLocker to secure data at rest. According to BitLocker literature, the 2012 implementation uses SED drive hardware to accelerate drive encryption and also that BitLocker works with hardware RAID arrays. I can find no information that indicates whether BitLocker can use [take advantage of] SED hardware to accelerate encryption on drives connected to an array controller configured in RAID [10] or not.

Can BitLocker use SED hardware to accelerate encryption on drives connected to an array controller configured in RAID [10]?
0
Comment
Question by:immix
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 56

Accepted Solution

by:
McKnife earned 2000 total points
ID: 40604360
No it can't. Only with single drives - each drive has a single key. But feel free to try, setup a RAID, BL will not allow the option to use hw encryption.
0
 

Author Comment

by:immix
ID: 40604417
Thanks McKnife, thought so.
0

Featured Post

[Webinar] Lessons on Recovering from Petya

Skyport is working hard to help customers recover from recent attacks, like the Petya worm. This work has brought to light some important lessons. New malware attacks like this can take down your entire environment. Learn from others mistakes on how to prevent Petya like worms.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question