cloudAshur Hardware Encryption Module

The cloudAshur hardware encryption module encrypts all data in transit and at rest with a FIPS certified randomly generated AES 256-bit encrypted encryption key, which is stored and protected within a dedicated iStorage secure microprocessor (Common Criteria EAL5+ (Certified Hardware) ). cloudAshur can be used to encrypt data in the cloud, on a local network drive, on a portable data storage device, on a local PC/Mac, as well as encrypt files shared via email or file sharing services (such as WeTransfer, Monday.com or eFileCabinet).

Encrypt your files with ease

Add your cloud folder

Drag and drop files

Your files are encrypted

Key Security Features


As cloud adoption continues to grow at a rapid rate and due to the virtual treasure trove of data being stored in the cloud, cloud data is coming under increasing and persistent threat with more sophisticated attacks being designed and deployed by cyber criminals. Cloud malware injection attacks, side-channel, DDoS, hijacking and ransomware attacks are common threats that can expose sensitive data. To protect against such risks, data must be encrypted in transit and at rest.

‘But cloud providers offer server-side encryption, so surely my data is safe,’ you may argue. Granted, most cloud providers will encrypt client data. However, the encryption key is stored in the cloud and thus accessible to hackers and cloud staff alike – quite like leaving your house keys under the doormat that half the neighbourhood knows about.

Full encryption of data should not be dependent on the cloud provider.

cloudAshur grants the user full and secure control of the encryption key, protecting your data even if your cloud account is hacked. This ensures data confidentiality, guarding against all forms of hacking methods.

If a hacker obtains your user credentials, the breach will go unnoticed to the cloud provider as they won’t be able to decipher between a legitimate user from an attacker. By keeping the encryption key away from the cloud increases the number of security measures from just one authentication method, the cloud account login credentials, to the cloudAshur’s unprecedented five factor authentication.


Something you have


The cloudAshur hardware security module

Something you know


7-15 digit Admin/User configurable PIN


Login credentials for the iStorage cloudAshur Windows or macOS client app


Where the data is stored, which cloud provider


Login credentials for the cloud account

The cloudAshur is the only cloud data security solution to boast the following features:

The cloudAshur can be configured in two encryption modes AES-ECB 256-bit (FIPS compliant) and AES-XTS 256-bit

The encryption module contains an on-device crypto-chip, offering 100% real-time military grade hardware encryption with FIPS PUB 197 certified USB 3.0 encryption controller

The cloudAshur incorporates a Common Criteria EAL5+ (Certified Hardware) secure microprocessor, which stores and protects the encrypted encryption key.

Incorporates a Common Criteria EAL 5+ (Hardware Certified) secure microprocessor

This offers ultimate security against hackers, detecting and responding to tampering with features such as:
  • – Dedicated hardware for protection against SPA/DPA/SEMA, DEMA attacks
  • – Advanced protection against physical attacks, including Active Shield, Enhance Protection Object, CStack checker, Slope Detector and Parity Errors
  • – Environmental Protection Systems protecting against voltage monitor, frequency monitor, temperature monitor and light protection
  • – Secure Memory Management/Access Protection

Frequently Asked Questions


Does iStorage offer a trial period of the cloudAshur?

Yes. Should you wish to test any of our devices using our free 30-day evaluation programme, please click here to submit your evaluation request. Alternatively, contact sales@istorage-uk.com to request an evaluation form. 

I have bought over 500 cloudAshur devices. Can iStorage set up the PINs for me?

Yes, we are able to configure the PINs for you. For details on pricing, please contact an iStorage Account Manager:

T: +44 (0)20 8991-6260

E: sales@istorage-uk.com  

cloudAshur Encryption Module

Is there a limit to the file name length when placed into an encrypted folder?

The operating system limits the file name length to 255 characters. This can vary depending on the file system in use.

Is it possible to work offline in any way?

cloudAshur requires network connection to authenticate user credentials when logging in to the Client App.

Is it possible to use preview files directly from the cloud, not from the cloudAshur local folder?

Since the files are stored in encrypted form, the file will not be executable online from the cloud.


Find out more on how can you share data securely using the cloudAshur


Find out more on how can you manage your users using the cloudAshur


Choose the right capacity for your needs.

Get help

Any questions? Call a specialist or chat online.

+44 (0) 20 8991 6260

Chat now >

Technical specifications


Hardware Security Module (patent pending)


FIPS PUB 197 certified USB 3.0 encryption controller


3.7V Li-Polymer Rechargeable Battery


Dimensions - H/W/D

87.40mm / 19.40mm / 13.40mm


cloudAshur is compatible with both Windows (7/8/10) and macOS (Sierra/High Sierra/Mojave/Catalina) and works with numerous cloud providers including Amazon Drive, AWS with Amazon WorkDocs Drive, Google Drive, OneDrive, Dropbox/Dropbox Business, iCloud, Box with Box Sync, Egnyte, GSuite with Drive File Stream, HornetDrive, iDrive, Jottacloud/Jottacloud Business, MEGA/MEGA Business, pCloud Drive/pCloud Business, Synx.com/Sync.com Business, Tresorit/Tresorit Business, Yandex, Microsoft Azure File Storage with the 3rd party software "GoodSync" and many more. (All listed cloud providers have been tested by iStorage)

Hardware data encryption

Can be configured in two encryption modes AES-ECB 256-bit (FIPS Compliant) and AES-XTS 256-bit.


FIPS 140-2 Level 3, NLNCSA BSPA & NATO Restricted Level (Pending Q3/Q4)


Ordering information

iStorage Part Number: IS-EM-CA-256


3 years warranty with free lifetime technical support

iStorage cloudAshur is developed and manufactured by iStorage Ltd.


  • PIN authenticated, hardware encrypted, cloud encryption module (patents pending)
  • Five factor authentication
  • On-device Crypto-chip
  • Brute force hack defence mechanism
  • Compatible with Windows and macOS
  • Auto lock on removal
  • Two encryption modes – AES-XTS 256-bit & AES-ECB 256-bit
  • Incorporates a Common Criteria EAL 5+ (Hardware Certified) secure microprocessor.
  • FIPS Level 3 compliant tamper proof & evident design
  • Polymer coated, wear resistant on-board alphanumeric keypad
  • Immune to Bad USB
  • Whitelisting on networks
  • IP68 certified (dust & waterproof)
  • User PIN enrolment
  • Separate Admin and User modes
  • Self-destruct feature
  • Inactivity Auto-lock
  • One-time User recovery PIN
  • Customisation services available


Now available to buy!

Get help

Any questions? Call a specialist or chat online.

+44 (0) 20 8991 6260

Chat now >

Please choose options

Buying options

cloudAshur is compatible with both PCs and MACs and works with numerous cloud providers including, Amazon Drive, Google Drive, OneDrive, Dropbox, iCloud and many more.

cloudAshur KeyWriter (patent pending) makes sharing of data in the cloud, via email and file transfer services (e.g. WeTransfer) between authorised users a breeze with ultimate security and peace of mind, allowing users to securely share data with one another, in real-time, regardless of location.

cloudAshur Remote Management console gives you full control of all cloudAshur hardware security modules deployed within your organisation, offering a wide range of features to manage and monitor all users.

iStorage Part Number: IS-EM-CA-256

Softwares are compatible with cloudAshur encryption modules only. Software images are for illustration purposes only(Available via download only).

All prices exclude VAT. US Dolar, Euro currency conversion are defined within the shopping cart.