What change of behavior is required from IT managers to use products based on the Storage Specification?
Traditionally, storage devices have been viewed as “simply” storage. However, storage devices can have powerful computing systems on board and lots of available memory, all protected behind a tightly closed and access-controlled environment, largely immune to the vulnerabilities of the operating system-based platform itself (e.g., viruses). And, the data is on the storage device. Why not put the security functions related to data protection directly on the device housing the data? TCG and its members believe that IT managers will appreciate the advantages of pairing security and data storage in the same device.