Please complete the form below to download a copy of the whitepaper.
Media - All product reviews
cloudAshur reviews
“The cloudAshur looks like a USB drive, but it’s actually a module that adds a PIN-protected encryption to your files as you save them to the cloud. It’s not fast but its effective and totally unique”
“The device itself is up to the usual standard from iStorage, flawless design and build quality, and it’s truly a beautifully designed and beautifully crafted piece filled with smart anti-hacking technologies like wear-resistant switches, a solid aluminium body and more.”
Father’s day finds gadget dads will adore.
“The unique collection of security features in the cloudAshur makes it trusted by police forces, governments and multinational corporations alike. Why wouldn’t it work for dad?”
“The hardware of the data protection field is better than ever, and iStorage is at the forefront, bringing straightforward, effective encryption solutions to the masses.”
“Hardware encryption modules are an excellent solution for those who want to keep their data “behind seven locks”. Application of FIPS 256-bit AES encryption code, protection against hacking, foreign manipulation and boot-force.”
“This innovative USB device encrypts your cloud storage with minimal fuss”
“Hardware encryption modules are an excellent solution for those who want to keep their data “behind seven locks”. Application of FIPS 256-bit AES encryption code, protection against hacking, foreign manipulation and boot-force.”
“The various modules in iStorage cloudAshur combined result in a very robust and impressive multi-layer authentication approach to data security.”
“The cloudAshur delivers on everything iStorage advertises it for. It can be used to encrypt both local and Cloud based files and folders and on top of that thanks to the extra apps you can clone it and place several safeguards for increased protection. As always, we used several ways to try and break the encryption of the drive, without luck however so…overall I was very satisfied with the cloudAshur which is why it deserves our Golden Award”
“If someone loses a device or leaves the company without giving it back, you can remotely kill the cloudAshur hardware; you can also temporarily disable a key if it’s misplaced (and having both options stops users delaying reporting a key they hope to track down because having to get it reset or replaced will be inconvenient). You can also reset and redeploy a key, so if someone leaves the company you can safely reuse their key (and at this price, you’ll want to).”
“Overall, cloudAshur is fairly well designed and offers a useful security boost “
“While it is possible to use a two-factor identification, the iStorage secure storage specialist has decided to go further. In addition, the level of security is high since the files can be decrypted only if the person has the device and the PIN code, as well as the connection parameters of the program and the Cloud account. The CloudAshur USB key will be available in August .“
“While it is possible to use a two-factor identification, the iStorage secure storage specialist has decided to go further. In addition, the level of security is high since the files can be decrypted only if the person has the device and the PIN code, as well as the connection parameters of the program and the Cloud account. The CloudAshur USB key will be available in August .“
IT PRO Today, June2019, cloudAshur article featuring Prof John Walker “The testing conducted against this device has gone well beyond attempting to guess the key sequence,” he said. “The core technology of all iStorage devices has also been subjected to penetration testing and attack at the lower levels of the operating stack, including physical tampering, […]
Infosecurity Europe, June 2019, interview with Zaia Gisso introducing cloudAshur:
“The cloudAshur looks like a USB drive, but it’s actually a module that adds a PIN-protected encryption to your files as you save them to the cloud. It’s not fast but its effective and totally unique”
16 Nov 2020