Product on Review: iStorage CloudAshur
Street Price: GBP: £99
iStorage is a British company specialising in the absolute and total protection of your data, complying with many stringent regulations and directives to safeguard valuable or sensitive data. We’ve looked at a couple of their storage drives in the past, with great praise given, but today we look at something a little different.
With our ever-increasing reliance on and use of data, including photographs, videos, music, work files etc. potential hackers have more incentive than ever to worm their way into your digital belongings, whether that’s to extract information or to demand a ransom to get it back. The iStorage CloudAshur is a data encryption device which is a little unique in its approach, carrying no actual data within the unit and instead providing a robust security measure for data stored in the cloud.
The CloudAshur uses real-time military grade AES-XTS or AES-ECB 256-bit hardware encryption through a FIPS PUB 197 certified USB 3.0 encryption controller to ensure your cloud data remains safe and secure. iStorage have also incorporated a robust, tamper-proof design that makes the device almost impossible to open without damaging permanently.
Of course, the device requires some bespoke software to function correctly, with iStorage’s CloudAshjur Remote Management and CloudAshur Key Writer. The software works in tandem to maintain security throughout.
The device itself is £99, to buy a single unit, but due to the nature of the device, volume-discounts are of course available to allow you to deploy this amongst your team, if you wish to keep business secrets safe.
Enough of all of that, anyway, let’s take a look and see what it’s made of.
iStorage on the CloudAshur:
cloudAshur is the perfect solution for anyone wanting to securely store, share, manage and monitor data in the cloud. cloudAshur eliminates the security vulnerabilities that exist with cloud platforms, such as lack of control and unauthorised access. Hackers are devising many sophisticated methods to target innocent and vulnerable users. Human error is also prevalent amongst data leakage incidents.