ENCRYPTED

CLOUD MODULE

The unique and patented iStorage cloudAshur hardware security module is the perfect solution for anyone wanting to securely store, share and manage data in the cloud. cloudAshur can also be used to encrypt data stored on a network drive, on a local PC/MAC and to send encrypted email attachments or data via file sharing software applications.

Incorporating similar technology as used in other iStorage products, which are certified to the highest government accreditation schemes, such as FIPS 140-2 Level 3, NCSC CPA, NLNCSA BSPA & Dep V and NATO Restricted level, iStorage has developed a unique solution that stores and protects the encrypted encryption key in the most secure way possible. 

Both data at rest and data in transit is encrypted using the cloudAshur module. In order to decrypt data stored in the cloud, on a network drive, on a local PC/MAC, or to decrypt encrypted email attachments or data transferred via file sharing software applications, the user will need to go through an unprecedented 5-factor authentication process:

5

Factor Authentication

01

The cloudAshur hardware security module

02

7-15 digit Admin/User configurable PIN

03

Login credentials for the iStorage cloudAshur Windows or macOS client app

04

Where the data is stored, which cloud provider

05

Login credentials for the cloud account

Benefits

You are in control

The user holds the encrypted encryption key to their data in the securest way possible. There is no need to be concerned about data in the cloud being viewed, stolen or shared.

5 Factor Authentication

This makes it virtually impossible to hack data that is stored in the cloud.

Protection against cloud provider personnel, who can access user data

With the cloudAshur, data is encrypted at client side and the user controls the encryption key.

Human error no longer an issue

With the cloudAshur Remote Management Console, IT Administrators can manage all cloudAshur modules deployed within an organisation, including the ability to remotely disable or reset a cloudAshur module if lost or stolen.

Regulatory compliance

As stipulated within all major cloud providers’ terms and conditions, the burden of data security is placed firmly upon the cloud user, even though data is stored on their servers. cloudAshur eliminates such vulnerabilities thus users can rest assured that hackers won’t be able to decrypt data stored in the cloud.

cloudAshur eliminates all the security vulnerabilities that exist with cloud platforms, such as lack of control, unauthorised access and human error.