Instant Keychange

Apacer based the Instant Keychange™ function on AES encryption, and it can be trigged either via hardware or software. Destroying the original key and creating a new one takes less than a second – much faster than traditional forms of drive erasure.

When the crypto command is accessed, the cipher key is destroyed and all data on the disk is unable to be read. Because there is no need to overwrite the data, Instant Keychange™ only takes a few milliseconds to make the disk unreadable compared to other sanitization methods which can take several minutes depending on the number of passes and the size of the disk., but it is functionally unreadable and therefore completely protected.

Related Technologies
Recommended Products
ATA Secure Erase

When this command is given, an SSD will reset all its storage cells to empty, releasing trapped electrons and restoring the drive to its original state. This operation completely wipes data ...

CoreSecurity2

Apacer’s CoreSecurity2 is a proprietary data protection technology developed to elevate the data security level through customized firmware and prevent data leakage, delivering higher reliab...

CoreDestroyer

The CoreDestroyer functionality is a software function that renders the entire SSD unusable, for cases where the SSD is about to fall into the hands of an unauthorized user.

Instant Keychange

Apacer based the Instant Keychange™ function on AES encryption, and it can be trigged either via hardware or software. Destroying the original key and creating a new one takes less than a se...

Opaque

Apacer has developed the Opaque software as a custom implementation of the TCG Opal 2.0 standard. Its accessible interface allows users to control useful security functions, such as pre-boot...

Signed Firmware

Apacer’s Signed Firmware technology is a secure way to update firmware. By including a digital signature, a firmware update will be authenticated by the Apacer SSD before a firmware update i...

TCG Opal 2.0

TCG Opal handles the encryption/decryption of information within the device without requiring a host, enabling fast encryption/ decryption and minimizing the risk of data leakage without und...

Write Protect

Write Protect can prevent drives from unauthorized data writing via a hardware switch/pin or vendor software command.