image for this item
The future of cloud data security

cloudAshur is the perfect solution for anyone wanting to securely store, share, manage and monitor data in the cloud. cloudAshur eliminates the security vulnerabilities that exist with cloud platforms, such as lack of control and unauthorised access. Hackers are devising many sophisticated methods to target innocent and vulnerable users. Human error is also prevalent amongst data leakage incidents.

The consequences of a cloud account being hacked can bring about theft and leakage of confidential data, leading to potential job losses, adverse publicity, hefty fines and the downfall of a business.

image for this item
ENCRYPT

Encrypt to ensure the ultimate protection of your data stored in the cloud, on your local PC/MAC, network drive or any data storage device.

image for this item
SHARE

Share your encrypted data securely with authorised users in the cloud as well as via email and file transfer services in real time.

 

image for this item
MANAGE

Manage and monitor your cloudAshur devices centrally.

image for this item
On-device Crypto-chip

Offering 100% real-time military grade AES-XTS or AES-ECB 256-bit Hardware Encryption with FIPS PUB 197 certified USB 3.0 encryption controller. Incorporates a Common Criteria EAL5+ (Hardware Certified) secure microprocessor.

Which offers ultimate security against hackers, detecting and responding to tampering with features such as:

  • Dedicated hardware for protection against SPA/DPA/SEMA, DEMA attacks
  • Advanced protection against physical attacks, including Active Shield, Enhance Protection Object, CStack checker, Slope Detector and Parity Errors
  • Environmental Protection Systems protecting against voltage monitor, frequency monitor, temperature monitor and light protection
  • Secure Memory Management/Access Protection
image for this item
image for this item
FIPS Level 3 compliant tamper proof & evident design

All critical components within the cloudAshur enclosure are covered by a layer of super tough epoxy resin, which is virtually impossible to remove without causing permanent damage to the critical components.

If breached, the cloudAshur modules tamper evident design will provide visible evidence that tampering has occurred.

image for this item
User PIN enrolment

The Admin can set a restriction policy for the user PIN. This includes setting the minimum length of the PIN, as well as requiring the input of one or more special character if needed. The special character functions as SHIFT + digit

image for this item
Five factor authentication

Something you have

  • The cloudAshur hardware security module

Something you know

  • 7-15 digit Admin/User configurable PIN
  • Username and password for the iStorage cloudAshur Windows or macOS client app
  • Where the data is stores, who is the cloud provider
  • Username and password for the cloud account
image for this item

The Admin can program the cloudAshur with a one-time recovery PIN. This is extremely useful in situations where a User has forgotten the PIN to authenticate the cloudAshur. This feature allows the User to enter the Recovery PIN and configure a new User PIN.

image for this item
iStorage cloudAshur KeyWriter

The iStorage Patented KeyWriter software makes sharing of data in the cloud, on your local network drive, via email and file transfer services (e.g. WeTransfer) between authorised users a breeze with ultimate security and peace of mind, allowing users to securely share data with one another, in real-time, regardless of their location.

image for this item
cloudAshur Remote Management

Gives you full control of all cloudAshur hardware security modules deployed within your organisation offering a wide range of features to manage all users.

iStorage Remote Management Console provides the Administrator full visibility and control over the following:

  • Temporarily disable or reset (remote kill) Users cloudAshur modules
  • Restrict file types - control what file types are being uploaded and shared in the cloud in the event of suspicious activity or an employee leaving the organisation
  • View User's log files - full visibility over what each User is doing in the cloud, such as, what files they are uploading, downloading, modifying, etc.
  • Display User's location - You can view the location of User's cloudAshur modules via an on-screen map.
  • Geofencing and Time fencing - restrict the time and location of where and when the cloudAshur encryption module can be used by each individual User.