fbpx
0

MANAGE

cloudAshur Remote Management Console

The cloudAshur Remote Management Console provides the IT Administrator full visibility and control of all cloudAshur modules deployed within the organisation. Administrator capabilities include temporarily disabling or resetting cloudAshur encryption modules, restricting file types, viewing user log files, displaying user’s location, as well as restricting the time and locations users can access their cloudAshur.

The next generation remote managed
data storage solution

The iStorage cloudAshur is the next generation of remote managed data storage devices. Rather than store encrypted data on a local device, such as a flash drive or hard drive, the encrypted data is stored in your preferred cloud platform, allowing for real-time, ultra-secure collaboration and limitless data storage.

By using the cloudAshur Remote Management Console, organisations can protect confidential data stored in the cloud and take control of its security.

Full control

If an employee leaves the organisation, or if a cloudAshur module is lost or stolen, the Administrator can deny access to the cloudAshur platform by remotely resetting the device, which deletes all Admin/User credentials as well as the encrypted encryption key.

If a user attempts to access highly confidential information from an insecure location, geofencing restrictions can be implemented. At iStorage we believe that data rights are human rights. It’s time for you to take back control.

Features

Temporarily disable or reset (remote kill) users cloudAshur modules

In the event of suspicious activity, a lost or stolen cloudAshur module or an employee leaving the organisation without returning their cloudAshur encryption module.

Geofencing and time fencing

Restrict the time and location of where and when the cloudAshur encryption module can be used by each individual user.

Restrict file types

Control what file types are being uploaded and shared in the cloud (EXE, PNG, PDF, etc…)

Encrypt file names

With this feature enabled, not only is the data encrypted in the cloud, but all file names are also encrypted.

View users log files

full visibility of each user’s activity in the cloud, such as what files they are uploading, downloading, modifying or deleting. Log files can be exported.

Display users location

The IT Administrator can view the location of all cloudAshur modules via an on-screen map.

 

Frequently Asked Questions

General

Does iStorage offer a trial period of the cloudAshur?

Yes. Should you wish to test any of our devices using our free 30-day evaluation programme, please click here to submit your evaluation request. Alternatively, contact sales@istorage-uk.com to request an evaluation form. 

I have bought over 500 cloudAshur devices. Can iStorage set up the PINs for me?

Yes, we are able to configure the PINs for you. For details on pricing, please contact an iStorage Account Manager:

T: +44 (0)20 8991-6260

E: sales@istorage-uk.com  

Remote Management Console

Can there be more than one IT Administrator?

Yes, there can be one Super IT Manager and multiple IT Managers.

If the IT Administrator leaves the company and takes the Master key with them, is there any way that the organisation can restrict the said Admin’s access to the data?

In order to restrict an Admin’s access, the company will need to contact iStorage.

Is it possible to set up multiple locations per user where the cloudAshur will work?

Currently, only a single location can be set per user for allowed location.

What does IP fencing do?

IP Fencing blocks the user with an unauthorised IP address from accessing cloudAshur.

What is the difference between IP Fencing and Blacklisting?

IP Fencing refers to blocking unauthorised IP addresses and Blacklisting file names refers to restricting certain file types on cloudAshur.

Encrypt

Find out more on how can you encrypt your data securely using the cloudAshur

Share

Find out more on how can you share data securely using the cloudAshur

Buy

Choose the right capacity for your needs.

Get help

Any questions? Call a specialist or chat online.

+44 (0) 20 8991 6260

Chat now >

Technical specifications

Hardware

Hardware Security Module (patent pending)

Interface

FIPS PUB 197 certified USB 3.0 encryption controller

Battery

3.7V Li-Polymer Rechargeable Battery

Weight

Dimensions - H/W/D

87.40mm / 19.40mm / 13.40mm

Compatibility

cloudAshur is compatible with both Windows (7/8/10) and macOS (Sierra/High Sierra/Mojave/Catalina) and works with numerous cloud providers including Amazon Drive, AWS with Amazon WorkDocs Drive, Google Drive, OneDrive, Dropbox/Dropbox Business, iCloud, Box with Box Sync, Egnyte, GSuite with Drive File Stream, HornetDrive, iDrive, Jottacloud/Jottacloud Business, MEGA/MEGA Business, pCloud Drive/pCloud Business, Synx.com/Sync.com Business, Tresorit/Tresorit Business, Yandex, Microsoft Azure File Storage with the 3rd party software "GoodSync" and many more. (All listed cloud providers have been tested by iStorage)

Hardware data encryption

Can be configured in two encryption modes AES-ECB 256-bit (FIPS Compliant) and AES-XTS 256-bit.

Certifications

FIPS 140-2 Level 3, NLNCSA BSPA & NATO Restricted Level (Pending Q3/Q4)

Approvals

Ordering information

iStorage Part Number: IS-EM-CA-256

Warranty

3 years warranty with free lifetime technical support


iStorage cloudAshur is developed and manufactured by iStorage Ltd.

Features

  • PIN authenticated, hardware encrypted, cloud encryption module (patents pending)
  • Five factor authentication
  • On-device Crypto-chip
  • Brute force hack defence mechanism
  • Compatible with Windows and macOS
  • Auto lock on removal
  • Two encryption modes – AES-XTS 256-bit & AES-ECB 256-bit
  • Uniquely incorporates Common Criteria EAL4+ ready secure microprocessor
  • FIPS Level 3 compliant tamper proof & evident design
  • Polymer coated, wear resistant on-board alphanumeric keypad
  • Immune to Bad USB
  • Whitelisting on networks
  • IP68 certified (dust & waterproof)
  • User PIN enrolment
  • Separate Admin and User modes
  • Self-destruct feature
  • Inactivity Auto-lock
  • One-time User recovery PIN
  • Customisation services available

Buy

Now available to buy!

Get help

Any questions? Call a specialist or chat online.

+44 (0) 20 8991 6260

Chat now >

Please choose options

Buying options

cloudAshur is compatible with both PCs and MACs and works with numerous cloud providers including, Amazon Drive, Google Drive, OneDrive, Dropbox, iCloud and many more.

cloudAshur KeyWriter (patent pending) makes sharing of data in the cloud, via email and file transfer services (e.g. WeTransfer) between authorised users a breeze with ultimate security and peace of mind, allowing users to securely share data with one another, in real-time, regardless of location.

cloudAshur Remote Management console gives you full control of all cloudAshur hardware security modules deployed within your organisation, offering a wide range of features to manage and monitor all users.

iStorage Part Number: IS-EM-CA-256

Softwares are compatible with cloudAshur encryption modules only. Software images are for illustration purposes only(Available via download only).

All prices exclude VAT. US Dolar, Euro currency conversion are defined within the shopping cart.