Call us FREE on 0800 488 000
X
X

Please Log In Below

Forgotten Password?
Retry
Login
loading Gif
Sorry! You can't edit your cart on this page.
Sorry! This item could not be added to your cart as it is no longer available from Comms Express.
Please check the quantity you are adding and try again.
The following item has been added to your cart.
Product Code:
Options:
Qty:
Unit Price:£
View Cart
Checkout
Your cart is empty.
Subtotal:
£0
Remove all items from cart
Are you sure? Yes No
Learn more about how
to collect Data Points
for free gifts.
Comms Express Finance Options
Request A Quote
View Cart
Checkout
Cookie Policy×

Hi there! Our website may store cookies on your computer in order to give you the best experience, such as remembering the items in your cart so you can continue shopping where you left off.

By continuing to use our site, you give consent for cookies to be used.

Browse Categories
Spend £100.00 for
FREE DELIVERY.
Free delivery excludes heavy and bulky products
iStorage Logo

USB-C adapter

Compatible with iStorage range

This adapter enables you to use our range with Thunderbolt/USB-C type connections.

Express View Logo
In Stock: Next Day
£7.22
£8.66 Inc Vat
Add To Cart
iStorage Logo

diskAshur M2

The key to your data™





WHY USE CLOUDASHUR? • You hold the encryption key to your data in the securest way possible - you no longer need to worry about whether your data in the cloud is being viewed, stolen and shared. • Five Factor Authentication - making it virtually impossible to hack your data. • GDPR Compliance – The terms and conditions of major cloud providers includes a “Limitations of Liability” clause which puts data security responsibility on the cloud user/customer, even though the data is stored on their servers. For example, AWS states in their T&Cs that they accept no liability whatsoever if there is “Any unauthorized access to, alteration of, or the deletion, destruction, damage, loss or failure to store any of your content or other data.” cloudAshur gives you ultimate protection, if a hacker gains access to your cloud account, they won’t be able to decrypt your data. • If a hacker manages to get hold of your cloud login credentials using “phishing” or other advanced hacking methods, they won’t be able to decrypt your data. • Human error no longer becomes an issue. • Protection against Administrative personnel working for cloud providers who have the capability to access your data as they control the encryption keys • Protection against data privacy concerns. Tens of thousands of requests for user data are sent to Google, Microsoft, and other businesses each year by government agencies. A large percentage of the time, these companies hand over at least some kind of data, even if it’s not the content in full...





ENCRYPT to ensure the ultimate protection of your data stored in the cloud or on your local network drive, PC/MAC or any data storage device.




SHARE your encrypted data with authorised users in the cloud as well as on your local network drive, via email and fi le transfer services, in real-time




MANAGE and monitor your cloudAshur devices centrally


PIN authenticated, hardware encrypted, cloud encryption module (patents pending)
Ultra-secure 7-15-digit PIN to authenticate the cloudAshur module

On-device Crypto-chip
Offering 100% real-time military grade AES-XTS or AES-ECB 256-bit Hardware Encryption with FIPS PUB 197 certifi ed USB 3.0 encryption controller.

    Whitelisting on networks
Configured with a unique VID/PID and internal/external serial number with barcode, allowing easy integration into standard end-point management software (white-listing), to meet internal corporate requirements.

User PIN enrolment
The Admin can set a restriction policy for the user PIN. This includes setting the minimum length of the PIN, as well as requiring the input of one or more ‘Special Character’ if needed

    Inactivity Auto-lock
Configurable to lock after a predetermined period of inactivity. cloudAshur automatically locks when unplugged from the host computer or when there is no longer any power to the USB port.

Customisation services available
Offering an in-house PIN configuration and laser-etching service whereby the cloudAshur sleeve or side of the module can be customised with your name, company name and/or logo, web/email address, phone number.

    IP68 certified
Dust and water resistant. Includes hard anodized and ruggedised extruded aluminium protective sleeve.

Separate Admin and User modes
Supports independent Admin and User PINs

    Self-destruct feature
Pre-program the cloudAshur with a self-destruct PIN, which once entered, the encrypted encryption key and all PINs are deleted.

One-time User recovery PIN
The Admin can program the cloudAshur with a onetime recovery PIN. This is extremely useful in situations where a User has forgotten the PIN to authenticate the cloudAshur.

    Two encryption modes
The cloudAshur can be confi gured in two encryption modes AES-ECB 256-bit (FIPS Compliant) and AES-XTS 256-bit.

Compatible with Windows and macOS
cloudAshur client applications are Windows (7/8/10) and macOS (Sierra/High Sierra/Catalina) compatible.

    Immune to Bad USB
Both the USB Cryptochip and Secure Microprocessor incorporate digitally-signed fl ash lock mechanisms making the cloudAshur immune to Bad USB.

Polymer coated, wear resistant on-board alphanumeric keypad
The cloudAshur is authenticated (unlocked) and all functions are performed using the onboard keypad with zero host involvement. cloudAshur is not vulnerable to key-loggers and brute force attacks.

    Brute force hack defence mechanism
If the User PIN is entered incorrectly 10 consecutive times, the User PIN will be deleted and the drive can only be accessed by entering the Admin PIN in order to reset the User PIN. (Admin can change this from the default 10 incorrect PIN entries, to 1-9, for the User only)
If the Admin PIN is entered incorrectly 10 consecutive times, all PINs and the encrypted encryption key will be lost forever.

Five factor authentication
1. The cloudAshur hardware security module
2. 7-15 digit Admin/User configurable PIN
3. Username and password for the iStorage cloudAshur Windows or macOS client app
4. Where the data is stored, which cloud provider
5. Username and password for the cloud account

 
  Encrypt your files with ease

 






Key Security Features Full encryption of data should not be dependent on the cloud provider.

As cloud adoption continues to grow at a rapid rate and due to the virtual treasure trove of data being stored in the cloud, cloud data is coming under increasing and persistent threat with more sophisticated attacks being designed and deployed by cyber criminals. Cloud malware injection attacks, side-channel, DDoS, hijacking and ransomware attacks are common threats that can expose sensitive data. To protect against such risks, data must be encrypted in transit and at rest. ‘But cloud providers offer server-side encryption, so surely my data is safe,’ you may argue. Granted, most cloud providers will encrypt client data. However, the encryption key is stored in the cloud and thus accessible to hackers and cloud staff alike – quite like leaving your house keys under the doormat that half the neighbourhood knows about.


cloudAshur grants the user full and secure control of the encryption key, protecting your data even if your cloud account is hacked. This ensures data confidentiality, guarding against all forms of hacking methods If a hacker obtains your user credentials, the breach will go unnoticed to the cloud provider as they won’t be able to decipher between a legitimate user from an attacker. By keeping the encryption key away from the cloud increases the number of security measures from just one authentication method, the cloud account login credentials, to the cloudAshur’s unprecedented five factor authentication.







The cloudAshur is the only cloud data security solution to boast the following features:

 




ISTORAGE PATENTED KEYWRITER SOFTWARE Makes sharing of data in the cloud, on your local network drive, via email and fi le transfer services between authorised users a breeze with ultimate security and peace of mind!

 





KEYWRITER FEATURES • iStorage KeyWriter copies all critical security parameters including the randomly generated encryption key and all PINs between the Master cloudAshur module and as many secondary cloudAshur modules as required using any off the shelf USB hub, allowing authorised users to securely share data with one another, in real-time, regardless of their location • The critical security parameters never leave the cloudAshur module and are stored in the Common Criteria EAL5+ (Hardware Certifi ed) secure microprocessor. • The process of copying the encrypted encryption key and all critical credentials between the Master cloudAshur module and the secondary cloudAshur modules is protected by a secure protocol incorporated within the iStorage cloudAshur secure microcontroller. The protocol is implemented using cryptographic algorithms, all of which are FIPS certifi ed. Every cloudAshur has a unique certifi cate issued by a root of trust, which ensures that only iStorage cloudAshur modules can be used during the key exchange process. • The cloudAshur modules never output the established session key when running the secure protocol and the sensitive data being copied is only decrypted in the validated recipient cloudAshur module. The iStorage KeyWriter software running on the PC coordinates the operations required by the secure protocol, however the software has zero visibility of both the session key and decrypted data, making it impossible for a hacker to access or retrieve any critical security parameters stored within the cloudAshur module.


CLOUDASHUR REMOTE MANAGEMENT CONSOLE Gives you full control of all cloudAshur hardware security modules deployed within your organisation offering a wide range of features to manage all users.

 





CONSOLE FEATURES iStorage Remote Management Console provides the Administrator full visibility and control over the following: • Temporarily disable or reset (remote kill) Users cloudAshur modules - in the event of suspicious activity or an employee leaving the organisation without returning their cloudAshur encryption module. • Restrict fi le types – control what fi le types are being uploaded and shared in the cloud (EXE, PNG, PDF, etc…) • View User’s log fi les – full visibility over what each User is doing in the cloud, such as, what files they are uploading, downloading, modifying, etc… • Display User’s location – You can view the location of User’s cloudAshur modules via an on-screen map. • Geofencing and Time fencing - restrict the time and location of where and when the cloudAshur encryption module can be used by each individual User.





Incorporates a Common Criteria EAL 5+ (Hardware Certified) secure microprocessor This offers ultimate security against hackers, detecting and responding to tampering with features such as:

• Dedicated hardware for protection against SPA/DPA/SEMA, DEMA attacks

• Advanced protection against physical attacks, including Active Shield, Enhance Protection Object, CStack checker, Slope Detector and Parity Errors

• Environmental Protection Systems protecting against voltage monitor, frequency monitor, temperature monitor and light protection

• Secure Memory Management/Access Protection







5 Factor Authentication Something you have 1. The cloudAshur hardware security module




Something you know

2. 7-15 digit Admin/User configurable PIN


3. Login credentials for the iStorage cloudAshur Windows or macOS client app


4. Where the data is stored, which cloud provider


5. Login credentials for the cloud account





Product Diagram:

 





iStorage software suite cloudAshur Client app (Windows & macOS) cloudAshur is compatible with both PCs and MACs and works with numerous cloud providers including Amazon Drive, Google Drive, OneDrive, Dropbox, iCloud and many more.


cloudAshur KeyWriter app (Windows) The iStorage Patented KeyWriter software makes sharing of encrypted data in the cloud as well as on your local network drive, via email and fi le transfer services (e.g. WeTransfer) between authorised users a breeze with ultimate security and peace of mind, allowing users to securely share data with one another, in real-time, regardless of their location


cloudAshur Remote Management app (Windows) iStorage cloudAshur Remote Management console gives you full control of all cloudAshur hardware security modules deployed within your organisation offering a wide range of features to manage and monitor all users.





Full specification and details can be found in the Product Datasheet PDF file

Express View Logo
In Stock: Next Day
£93.33
£112.00 Inc Vat
Add To Cart
Other Ranges Available
iStorage Flash Drives
View Range
iStorage Hard Disk Drives (HDDs)
View Range
iStorage Solid-State Drives (SSDs)
View Range
iStorage Micro SD Cards
View Range
Join Our Mailing List
Social Links
  • Apply for Credit