fbpx
0

The future of cloud data security

The unique and patented iStorage cloudAshur hardware security module is the perfect solution for anyone wanting to securely store, share and manage data in the cloud. cloudAshur can also be used to encrypt data stored on a network drive, on a local PC/MAC and to send encrypted email attachments or data via file sharing software applications.

cloudAshur eliminates all the security vulnerabilities that exist with cloud platforms, such as lack of control, unauthorised access and human error.

cloudAshur_front@2x

(Hardware encryption module)

Incorporating similar technology as used in other iStorage products, which are certified to the highest government accreditation schemes, such as FIPS 140-2 Level 3, NCSC CPA, NLNCSA BSPA & Dep V and NATO Restricted level, iStorage has developed a unique solution that stores and protects the encrypted encryption key in the most secure way possible.

Both data at rest and data in transit is encrypted using the cloudAshur module. In order to decrypt data stored in the cloud, on a network drive, on a local PC/MAC, or to decrypt encrypted email attachments or data transferred via file sharing software applications, the user will need to go through an unprecedented 5-factor authentication process:

Bullet_1@2x

Physically have possession of the cloudAshur module

Bullet_2@2x

Know the 7-15 digit PIN (password) which is entered via the cloudAshur onboard keypad

Bullet_3@2x

Know the login credentials for the iStorage client app

Bullet_4@2x

Know where the data is stored (which cloud)

Bullet_5@2x

Know the login credentials for the cloud account

cloudAshur allows you to

ENCRYPT to ensure the ultimate security of data stored in the cloud or on a local network drive, local PC/MAC or any data storage device

SHARE encrypted data securely with authorised users in the cloud, on a local network drive, via email and with file transfer services in real-time

MANAGE and monitor cloudAshur devices centrally

Why use cloudAshur?

Data privacy and security are top of mind for business leaders and consumers alike. The implementation of data protection regulations, such as GDPR and CCPA, has meant organisations must shoulder greater responsibility in ensuring data confidentiality.

There is no doubting the numerous benefits of adopting and using the cloud, such as providing benefits in scale, functionality, agility and cost savings. However, many organisations are reluctant to migrate to the cloud due to lack of control, data privacy and security concerns. Hackers are devising an array of sophisticated methods to target vulnerable users in order to gain access to confidential data stored in the cloud, which can lead to hefty fines, job losses as well as severe brand damage.

Benefits of using the cloudAshur

01

You are in control

The user holds the encrypted encryption key to their data in the securest way possible. There is no need to be concerned about data in the cloud being viewed, stolen or shared.

02

5 Factor Authentication

This makes it virtually impossible to hack data that is stored in the cloud.

03

Regulatory compliance

As stipulated within all major cloud providers’ terms and conditions, the burden of data security is placed firmly upon the cloud user, even though data is stored on their servers. cloudAshur eliminates such vulnerabilities thus users can rest assured that hackers won’t be able to decrypt data stored in the cloud.

04

Human error no longer an issue

With the cloudAshur Remote Management Console, IT Administrators can manage all cloudAshur modules deployed within an organisation, including the ability to remotely disable or reset a cloudAshur module if lost or stolen.

05

Protection against cloud provider personnel, who can access user data

With the cloudAshur, data is encrypted at client side and the user controls the encryption key.

Encrypt

with the iStorage cloudAshur module

The cloudAshur hardware encryption module encrypts all data in transit and at rest with a FIPS certified randomly generated AES 256-bit encrypted encryption key, which is stored and protected within a dedicated iStorage secure microprocessor (Common Criteria EAL4+ ready). cloudAshur grants the user full and secure control of the encryption key, thus protecting data even if the cloud account is hacked. cloudAshur also encrypts data stored on a local network drive, portable data storage devices as well as PCs/MACs.

Share

using the iStorage KeyWriter application

The iStorage patented cloudAshur KeyWriter application enables the required number of cloudAshur modules to be cloned with the same encryption key allowing real-time, ultra-secure collaboration with authorised users regardless of location.

Manage

using the iStorage Remote Management Console

The cloudAshur Remote Management Console provides the IT Administrator full visibility and control of all cloudAshur modules deployed within the organisation. Administrator capabilities include temporarily disabling or resetting cloudAshur encryption modules, restricting file types, viewing user log files, displaying user location, as well as restricting the time and location users can access cloudAshur modules

Buy

Choose the right capacity for your needs.

Get help

Any questions? Call a specialist or chat online.

+44 (0) 20 8991 6260

Chat now >

Technical specifications

Hardware

Hardware Security Module (patent pending)

Interface

FIPS PUB 197 certified USB 3.0 encryption controller

Battery

3.7V Li-Polymer Rechargeable Battery

Weight

Dimensions - H/W/D

87.40mm / 19.40mm / 13.40mm

Compatibility

cloudAshur is compatible with both PCs and MACs and works with numerous cloud providers including Amazon Drive, AWS with Amazon WorkDocs Drive, Google Drive, OneDrive, Dropbox/Dropbox Business, iCloud, Box with Box Sync, Egnyte, GSuite with Drive File Stream, HornetDrive, iDrive, Jottacloud/Jottacloud Business, MEGA/MEGA Business, pCloud Drive/pCloud Business, Synx.com/Sync.com Business, Tresorit/Tresorit Business, Yandex, Microsoft Azure File Storage with the 3rd party software "GoodSync" and many more. (All listed cloud providers have been tested by iStorage)

Hardware data encryption

Can be configured in two encryption modes AES-ECB 256-bit (FIPS Compliant) and AES-XTS 256-bit.

Certifications

FIPS 140-2 Level 3, NLNCSA BSPA & NATO Restricted Level (Pending Q3/Q4)

Approvals

Ordering information

iStorage Part Number: IS-EM-CA-256

Warranty

3 years warranty with free lifetime technical support

<div class=”cei-tech-specs-drive-size-titel”>

<!– XX = drive size in GBs –>

</div>
<div class=”cei-tech-specs-drive-size-contant-para”>

<!– *All listed capacities, within the datAshur range is used for formatting and other functions and thus is not available for data storage. As such, the actual available capacity for data storage is less than what is listed on the products. –>
iStorage cloudAshur is developed and manufactured by iStorage Ltd.

</div>
<div class=”cei-tech-specs-drive-size-lock-sec”>
<div class=”cei-tech-specs-drive-size-lock-images”></div>
</div>

Features

<ul>
<li>PIN authenticated, hardware encrypted, cloud encryption module (patents pending)</li>
<li>Five factor authentication</li>
<li>On-device Crypto-chip</li>
<li>Brute force hack defence mechanism</li>
<li>Compatible with Windows and macOS</li>
<li>Auto lock on removal</li>
<li>Two encryption modes – AES-XTS 256-bit &amp; AES-ECB 256-bit</li>
<li>Uniquely incorporates Common Criteria EAL4+ ready secure microprocessor</li>
<li>FIPS Level 3 compliant tamper proof &amp; evident design</li>
<li>Polymer coated, wear resistant on-board alphanumeric keypad</li>
<li>Immune to Bad USB</li>
<li>Whitelisting on networks</li>
<li>IP68 certified (dust &amp; waterproof)</li>
<li>User PIN enrolment</li>
<li>Separate Admin and User modes</li>
<li>Self-destruct feature</li>
<li>Inactivity Auto-lock</li>
<li>One-time User recovery PIN</li>
<li>Customisation services available</li>
</ul>

Buy

Now available to buy!

Get help

Any questions? Call a specialist or chat online.

+44 (0) 20 8991 6260

Chat now >

Please choose options

Buying options

cloudAshur is compatible with both PCs and MACs and works with numerous cloud providers including, Amazon Drive, Google Drive, OneDrive, Dropbox, iCloud and many more.

cloudAshur KeyWriter (patent pending) makes sharing of data in the cloud, via email and file transfer services (e.g. WeTransfer) between authorised users a breeze with ultimate security and peace of mind, allowing users to securely share data with one another, in real-time, regardless of location.

cloudAshur Remote Management console gives you full control of all cloudAshur hardware security modules deployed within your organisation, offering a wide range of features to manage and monitor all users.

iStorage Part Number: IS-EM-CA-256

Softwares are compatible with cloudAshur encryption modules only. Software images are for illustration purposes only(Available via download only).

All prices exclude VAT. US Dolar, Euro currency conversion are defined within the shopping cart.