The unique and patented iStorage cloudAshur hardware security module is the perfect solution for anyone wanting to securely store, share and manage data in the cloud. cloudAshur can also be used to encrypt data stored on a network drive, on a local PC/MAC and to send encrypted email attachments or data via file sharing software applications.
Incorporating similar technology as used in other iStorage products, which are certified to the highest government accreditation schemes, such as FIPS 140-2 Level 3, NCSC CPA, NLNCSA BSPA & Dep V and NATO Restricted level, iStorage has developed a unique solution that stores and protects the encrypted encryption key in the most secure way possible.
Both data at rest and data in transit is encrypted using the cloudAshur module. In order to decrypt data stored in the cloud, on a network drive, on a local PC/MAC, or to decrypt encrypted email attachments or data transferred via file sharing software applications, the user will need to go through an unprecedented 5-factor authentication process:
5
Factor Authentication
01
The cloudAshur hardware security module
02
7-15 digit Admin/User configurable PIN
03
Login credentials for the iStorage cloudAshur Windows or macOS client app
04
Where the data is stored, which cloud provider
05
Login credentials for the cloud account
Benefits
You are in control
The user holds the encrypted encryption key to their data in the securest way possible. There is no need to be concerned about data in the cloud being viewed, stolen or shared.
5 Factor Authentication
This makes it virtually impossible to hack data that is stored in the cloud.
Protection against cloud provider personnel, who can access user data
With the cloudAshur, data is encrypted at client side and the user controls the encryption key.
Human error no longer an issue
With the cloudAshur Remote Management Console, IT Administrators can manage all cloudAshur modules deployed within an organisation, including the ability to remotely disable or reset a cloudAshur module if lost or stolen.
Regulatory compliance
As stipulated within all major cloud providers’ terms and conditions, the burden of data security is placed firmly upon the cloud user, even though data is stored on their servers. cloudAshur eliminates such vulnerabilities thus users can rest assured that hackers won’t be able to decrypt data stored in the cloud.
cloudAshur eliminates all the security vulnerabilities that exist with cloud platforms, such as lack of control, unauthorised access and human error.