COVID-19 STATEMENT: We would like to reassure all of our customers that the iStorage team is fully committed to serving you during these challenging times. Our operations continue as normal, with no adverse impact on our products, services and delivery times. We will continue to monitor the situation closely and post any further updates on our website as and when necessary.
Media – Press releases
The cloudAshur Hardware Security Module is our answer to the biggest issue with the cloud, that is data security. It uses a FIPS certified randomly generated AES 256-bit encrypted encryption key, stored within a dedicated iStorage secure microprocessor, which itself is CC 4+ ready.
Our datAshur PRO²press release is featured on the business.am-news.com news sites
Our datAshur PRO²press release is featured on the nbc29 news sites:
Our datAshur PRO²press release is featured on fox34 site
Our datAshur PRO²press release is featured on valleyscw site
KDVR Morning Television, June 2019, datAshur PRO featured in a Father’s Tech Gift Ideas section: “One of my favourite tech gift ideas” “This is the coolest USB drive I’ve seen in a long time” “Super super secure”
Infosecurity Europe, June 2019, interview with Zaia Gisso introducing cloudAshur:
IT PRO Today, June2019, cloudAshur article featuring Prof John Walker “The testing conducted against this device has gone well beyond attempting to guess the key sequence,” he said. “The core technology of all iStorage devices has also been subjected to penetration testing and attack at the lower levels of the operating stack, including physical tampering, […]
cloudAshur is our answer to the biggest issue with the cloud – data security. It uses a FIPS certified AES 256-bit encrypted encryption key, stored within a dedicated iStorage secure microprocessor
“This was the start of my introduction into their new iStorage Flagship product to secure the Cloud branded as cloudAshur – a product based on their proven hardware based hard drive systems, but in this case its application was cloud centric, and turns what are, potentially insecure Cloud environments into secure and manageable trusted storage […]