The next generation remote managed data storage solutionThe iStorage cloudAshur is the next generation of remote managed data storage devices. Rather than store encrypted data on a local device, such as a flash drive or hard drive, the encrypted data is stored in your preferred cloud platform, allowing for real-time, ultra-secure collaboration and limitless data storage.Full controlIf an employee leaves the organisation, or if a cloudAshur module is lost or stolen, the Administrator can deny access to the cloudAshur platform by remotely resetting the device, which deletes all Admin/User credentials as well as the encrypted encryption key.If a user attempts to access highly confidential information from an insecure location, geofencing restrictions can be implemented. At iStorage we believe that data rights are human rights. It’s time for you to take back control.Temporarily disable or reset (remote kill) users cloudAshur modulesIn the event of suspicious activity, a lost or stolen cloudAshur module or an employee leaving the organisation without returning their cloudAshur encryption module.Geofencing and time fencingRestrict the time and location of where and when the cloudAshur encryption module can be used by each individual user.Restrict file typesControl what file types are being uploaded and shared in the cloud (EXE, PNG, PDF, etc…)Encrypt file namesWith this feature enabled, not only is the data encrypted in the cloud, but all file names are also encrypted.View users log filesfull visibility of each user’s activity in the cloud, such as what files they are uploading, downloading, modifying or deleting. Log files can be exported.Display users locationThe IT Administrator can view the location of all cloudAshur modules via an on-screen map.
The next generation remote managed data storage solutionThe iStorage cloudAshur is the next generation of remote managed data storage devices. Rather than store encrypted data on a local device, such as a flash drive or hard drive, the encrypted data is stored in your preferred cloud platform, allowing for real-time, ultra-secure collaboration and limitless data storage.Full controlIf an employee leaves the organisation, or if a cloudAshur module is lost or stolen, the Administrator can deny access to the cloudAshur platform by remotely resetting the device, which deletes all Admin/User credentials as well as the encrypted encryption key.If a user attempts to access highly confidential information from an insecure location, geofencing restrictions can be implemented. At iStorage we believe that data rights are human rights. It’s time for you to take back control.Temporarily disable or reset (remote kill) users cloudAshur modulesIn the event of suspicious activity, a lost or stolen cloudAshur module or an employee leaving the organisation without returning their cloudAshur encryption module.Geofencing and time fencingRestrict the time and location of where and when the cloudAshur encryption module can be used by each individual user.Restrict file typesControl what file types are being uploaded and shared in the cloud (EXE, PNG, PDF, etc…)Encrypt file namesWith this feature enabled, not only is the data encrypted in the cloud, but all file names are also encrypted.View users log filesfull visibility of each user’s activity in the cloud, such as what files they are uploading, downloading, modifying or deleting. Log files can be exported.Display users locationThe IT Administrator can view the location of all cloudAshur modules via an on-screen map.
The iStorage patented* cloudAshur KeyWriter application enables the required number of cloudAshur modules to be cloned with the same encrypted encryption key allowing real-time, ultra-secure collaboration with authorised users regardless of location.Setting the standard for secure collaborationSharing encrypted data securely allows for instant collaboration in the cloud, granting flexibility of working across departments, countries or organisations and saving time in what would be days of posting encrypted USB flash drives to and from colleagues.With the cloudAshur, only authorised users with a cloned cloudAshur encryption module can decrypt and view data.cloudAshur KeyWriter copies all critical security parameters including the randomly generated encrypted encryption key and all PINs between the Master cloudAshur module and as many Secondary cloudAshur modules as required using any off the shelf USB hub.This allows secure and instant collaboration in the cloud between authorised users, as well securely sharing encrypted files on a local network drive, portable data storage device or via email and file transfer services.Cloning processThe process of copying the encrypted encryption module key and all critical credentials between the Master cloudAshur module and Secondary cloudAshur modules is protected by a secure protocol incorporated within the iStorage cloudAshur secure microcontroller.The protocol is implemented using cryptographic algorithms, all of which are FIPS certified. Every cloudAshur has a unique certificate issued by a root of trust, which ensures that only iStorage cloudAshur modules can be used during the key exchange process.You can't hack what you can't seeThe KeyWriter software has zero visibility of both the session key and decrypted data. This makes it impossible for a hacker to access or retrieve any critical security parameters stored within the cloudAshur module.
The iStorage patented* cloudAshur KeyWriter application enables the required number of cloudAshur modules to be cloned with the same encrypted encryption key allowing real-time, ultra-secure collaboration with authorised users regardless of location.Setting the standard for secure collaborationSharing encrypted data securely allows for instant collaboration in the cloud, granting flexibility of working across departments, countries or organisations and saving time in what would be days of posting encrypted USB flash drives to and from colleagues.With the cloudAshur, only authorised users with a cloned cloudAshur encryption module can decrypt and view data.cloudAshur KeyWriter copies all critical security parameters including the randomly generated encrypted encryption key and all PINs between the Master cloudAshur module and as many Secondary cloudAshur modules as required using any off the shelf USB hub.This allows secure and instant collaboration in the cloud between authorised users, as well securely sharing encrypted files on a local network drive, portable data storage device or via email and file transfer services.Cloning processThe process of copying the encrypted encryption module key and all critical credentials between the Master cloudAshur module and Secondary cloudAshur modules is protected by a secure protocol incorporated within the iStorage cloudAshur secure microcontroller.The protocol is implemented using cryptographic algorithms, all of which are FIPS certified. Every cloudAshur has a unique certificate issued by a root of trust, which ensures that only iStorage cloudAshur modules can be used during the key exchange process.You can't hack what you can't seeThe KeyWriter software has zero visibility of both the session key and decrypted data. This makes it impossible for a hacker to access or retrieve any critical security parameters stored within the cloudAshur module.
The next generation remote managed data storage solutionThe iStorage cloudAshur is the next generation of remote managed data storage devices. Rather than store encrypted data on a local device, such as a flash drive or hard drive, the encrypted data is stored in your preferred cloud platform, allowing for real-time, ultra-secure collaboration and limitless data storage.Full controlIf an employee leaves the organisation, or if a cloudAshur module is lost or stolen, the Administrator can deny access to the cloudAshur platform by remotely resetting the device, which deletes all Admin/User credentials as well as the encrypted encryption key.If a user attempts to access highly confidential information from an insecure location, geofencing restrictions can be implemented. At iStorage we believe that data rights are human rights. It’s time for you to take back control.Temporarily disable or reset (remote kill) users cloudAshur modulesIn the event of suspicious activity, a lost or stolen cloudAshur module or an employee leaving the organisation without returning their cloudAshur encryption module.Geofencing and time fencingRestrict the time and location of where and when the cloudAshur encryption module can be used by each individual user.Restrict file typesControl what file types are being uploaded and shared in the cloud (EXE, PNG, PDF, etc…)Encrypt file namesWith this feature enabled, not only is the data encrypted in the cloud, but all file names are also encrypted.View users log filesfull visibility of each user’s activity in the cloud, such as what files they are uploading, downloading, modifying or deleting. Log files can be exported.Display users locationThe IT Administrator can view the location of all cloudAshur modules via an on-screen map.
The next generation remote managed data storage solutionThe iStorage cloudAshur is the next generation of remote managed data storage devices. Rather than store encrypted data on a local device, such as a flash drive or hard drive, the encrypted data is stored in your preferred cloud platform, allowing for real-time, ultra-secure collaboration and limitless data storage.Full controlIf an employee leaves the organisation, or if a cloudAshur module is lost or stolen, the Administrator can deny access to the cloudAshur platform by remotely resetting the device, which deletes all Admin/User credentials as well as the encrypted encryption key.If a user attempts to access highly confidential information from an insecure location, geofencing restrictions can be implemented. At iStorage we believe that data rights are human rights. It’s time for you to take back control.Temporarily disable or reset (remote kill) users cloudAshur modulesIn the event of suspicious activity, a lost or stolen cloudAshur module or an employee leaving the organisation without returning their cloudAshur encryption module.Geofencing and time fencingRestrict the time and location of where and when the cloudAshur encryption module can be used by each individual user.Restrict file typesControl what file types are being uploaded and shared in the cloud (EXE, PNG, PDF, etc…)Encrypt file namesWith this feature enabled, not only is the data encrypted in the cloud, but all file names are also encrypted.View users log filesfull visibility of each user’s activity in the cloud, such as what files they are uploading, downloading, modifying or deleting. Log files can be exported.Display users locationThe IT Administrator can view the location of all cloudAshur modules via an on-screen map.
MFR: Netgear, Inc
Qty: 1
Part #: GS105NA