You can use infrastructure elements that provide data-at-rest protection at the hardware level (such as self-encrypting drives).
Teradata recommends hardware-based encryption elements to minimize performance overheads at the host and database layer.
If hardware-based encryption elements (SED drives) are unavailable, use software-based encryption to achieve data-at-rest protection. Latency-sensitive workloads (for example, tactical work) may exhibit impact relative to running with software-based encryption. For software-based encryption solutions, contact Teradata.