Skip to product information
1 of 1

ISTORAGE LIMITED

iStorage cloudAshur - Encryption module - USB 3.0

iStorage cloudAshur - Encryption module - USB 3.0

SKU:7169481

Regular price $137.64 USD
Regular price Sale price $137.64 USD
Sale Sold out
Shipping calculated at checkout.

The iStorage cloudAshur Hardware Security Module is a PIN authenticated, hardware encrypted USB device that encrypts all data in transit and at rest with a FIPS certified randomly generated AES 256-bit encrypted encryption key which is stored within a dedicated iStorage secure microprocessor (CC5+(hardware certified)Ready). cloudAshur offers ultimate protection of your data, whether its stored in the cloud, on your PC/MAC or transferred as an email attachment or file sharing software. cloudAshur is the perfect solution for anyone wanting to securely store, share, manage and monitor data in the cloud. Hackers are devising many sophisticated methods to target innocent and vulnerable users. Human error is also prevalent amongst data leakage incidents. The consequences of a cloud account being hacked can bring about theft and leakage of confidential data, leading to potential job losses, adverse publicity, hefty fines and the downfall of a business. To achieve data privacy, encryption of data is important, protection of the encryption key is vital. To be a truly secure solution, it is imperative that the encryption key is stored away from the data. With the cloudAshur, the encrypted encryption key is stored within the device, meaning that you hold the key to your data! Eliminating the security vulnerabilities that exist with cloud platforms, such as lack of control and unauthorized access. cloudAshur uniquely offers 5 factors of authentication: 1) The cloudAshur hardware security module; 2) 7-15 digit Admin/User Configurable PIN; 3) Username and password for the iStorage cloudAshur Windows or MacOS client app; 4) Where the data is stored, which cloud provider; 5) Username and password for the cloud account. Encrypt to ensure the ultimate protection of your data. Share your encrypted data securely with authorized users using KeyWriter application. Manage your cloudAshur devices centrally using the Remote Management Console. cloudAshur KeyWriter makes sharing of data in the cloud, via email and file transfer services (e.g. We Transfer) between authorized users a breeze with ultimate security and peace of mind, allowing users to securely share data with one another, in real-time, regardless of their location. cloudAshur KeyWriter copies all critical security parameters including the randomly generated encryption key and all PINs between the Master cloudAshur module and as many secondary cloudAshur modules as required using any off the shelf USB hub, allowing authorized users to securely share data with one another, in real-time, regardless of their location. The critical security parameters never leave the cloudAshur module and are stored in the Common Criteria EAL5+ (Hardware Certified) ready secure microprocessor. The process of copying the encrypted encryption key and all critical credentials between the Master cloudAshur module and the Secondary cloudAshur modules is protected by a secure protocol incorporated within the iStorage cloudAshur secure microcontroller. The protocol is implemented using cryptographic algorithms, all of which are FIPS certified. Every cloudAshur has a unique certificate issued by a root of trust, which ensures that only iStorage cloudAshur modules can be used during the key exchange process. Gives you full control of all cloudAshur hardware security modules deployed within your organization offering a wide range of features to manage all users. Compatible devices: Desktop Take back control of your data - with the cloudAshur, you hold the KEY to your data! Share your encrypted data security with authorised users in the cloud, via email and file transfer services using the cloudAshur KeyWriter (not included) Manage and monitor your cloudAshur devices centrally using the cloudAshur Remote Management Console (not included) cloudAshur eliminates data security vulnerabilities associated with cloud platforms, such as lack of control and unauthorised access to your confidential data. Encrypt your data with the cloudAshur to ensure the ultimate protection of your data stored in the cloud, on your PC/MAC, transferred as an email attached or file sharing software

View full details