Search  for anything...

iStorage cloudAshur Hardware encrypted Security Module

  • Based on 7 reviews
Condition: New
Checking for product changes
$127.80 Why this price?

Buy Now, Pay Later


As low as $21.30 / mo
  • – 6-month term
  • – No impact on credit
  • – Instant approval decision
  • – Secure and straightforward checkout

Ready to go? Add this product to your cart and select a plan during checkout.

Payment plans are offered through our trusted finance partners Klarna, PayTomorrow, Affirm, Afterpay, Apple Pay, and PayPal. No-credit-needed leasing options through Acima may also be available at checkout.

Learn more about financing & leasing here.

Free shipping on this product

This item is eligible for return within 30 days of receipt

To qualify for a full refund, items must be returned in their original, unused condition. If an item is returned in a used, damaged, or materially different state, you may be granted a partial refund.

To initiate a return, please visit our Returns Center.

View our full returns policy here.


Availability: In Stock.
Fulfilled by iStorageLtd

Arrives May 27 – May 29
Order within 4 hours and 2 minutes
Available payment plans shown during checkout

Features

  • Encrypt your data with the cloudAshur to ensure the ultimate protection of your data stored in the cloud, on your PC/MAC, transferred as an email attached or file sharing software
  • Share your encrypted data security with authorised users in the cloud, via email and file transfer services using the cloudAshur KeyWriter (not included)
  • Manage and monitor your cloudAshur devices centrally using the cloudAshur Remote Management Console (not included)
  • cloudAshur eliminates data security vulnerabilities associated with cloud platforms, such as lack of control and unauthorised access to your confidential data.
  • Take back control of your data - with the cloudAshur, you hold the KEY to your data!

Description

The future of cloud data security cloudAshur is the perfect solution for anyone wanting to securely store, share, manage and monitor data in the cloud. cloudAshur eliminates the security vulnerabilities that exist with cloud platforms, such as lack of control and unauthorised access. Hackers are devising many sophisticated methods to target innocent and vulnerable users. Human error is also prevalent amongst data leakage incidents. The consequences of a cloud account being hacked can bring about theft and leakage of confidential data, leading to potential job losses, adverse publicity, hefty fines and the downfall of a business. ENCRYPT Encrypt to ensure the ultimate protection of your data stored in the cloud, on your local PC/MAC, network drive or any data storage device. SHARE Share your encrypted data securely with authorised users in the cloud as well as via email and file transfer services in real time. MANAGE Manage and monitor your cloudAshur devices centrally. Read more On-device Crypto-chip Offering 100% real-time military grade AES-XTS or AES-ECB 256-bit Hardware Encryption with FIPS PUB 197 certified USB 3.0 encryption controller. Incorporates a Common Criteria EAL5+ (Hardware Certified) secure microprocessor. Which offers ultimate security against hackers, detecting and responding to tampering with features such as: Dedicated hardware for protection against SPA/DPA/SEMA, DEMA attacksAdvanced protection against physical attacks, including Active Shield, Enhance Protection Object, CStack checker, Slope Detector and Parity ErrorsEnvironmental Protection Systems protecting against voltage monitor, frequency monitor, temperature monitor and light protectionSecure Memory Management/Access Protection FIPS Level 3 compliant tamper proof & evident design All critical components within the cloudAshur enclosure are covered by a layer of super tough epoxy resin, which is virtually impossible to remove without causing permanent damage to the critical components. If breached, the cloudAshur modules tamper evident design will provide visible evidence that tampering has occurred. User PIN enrolment The Admin can set a restriction policy for the user PIN. This includes setting the minimum length of the PIN, as well as requiring the input of one or more ‘Special Character’ if needed. The ‘Special Character’ functions as ‘SHIFT + digit’ Five factor authentication Something you have The cloudAshur hardware security module Something you know 7-15 digit Admin/User configurable PINUsername and password for the iStorage cloudAshur Windows or macOS client appWhere the data is stored, which cloud providerUsername and password for the cloud account One- time User recovery PIN The Admin can program the cloudAshur with a one-time recovery PIN. This is extremely useful in situations where a User has forgotten the PIN to authenticate the cloudAshur. This feature allows the User to enter the Recovery PIN and configure a new User PIN. Read more iStorage cloudAshur KeyWriter The iStorage Patented KeyWriter software makes sharing of data in the cloud, on your local network drive, via email and file transfer services (e.g. WeTransfer) between authorised users a breeze with ultimate security and peace of mind, allowing users to securely share data with one another, in real-time, regardless of their location. cloudAshur Remote Management Gives you full control of all cloudAshur hardware security modules deployed within your organisation offering a wide range of features to manage all users. iStorage Remote Management Console provides the Administrator full visibility and control over the following: Temporarily disable or reset (remote kill) Users cloudAshur modules Restrict file types – control what file types are being uploaded and shared in the cloud in the event of suspicious activity or an employee leaving the organisation View User’s log files – full visibility over what each User is doing in the cloud, such as, what files they are uploading, downloading, modifying, etc… Display User’s location – You can view the location of User’s cloudAshur modules via an on-screen map. Geofencing and Time fencing – restrict the time and location of where and when the cloudAshur encryption module can be used by each individual User.


Hard Drive: ‎ssd


Brand: ‎IStorage


Item model number: ‎IS-EM-CA-256


Hardware Platform: ‎PC


Item Weight: ‎3.2 ounces


Package Dimensions: ‎5.4 x 3 x 1.5 inches


Color: ‎Silver


Batteries: ‎1 Lithium ion batteries required. (included)


Manufacturer: ‎iStorage


Date First Available: ‎August 16, 2019


Frequently asked questions

If you place your order now, the estimated arrival date for this product is: May 27 – May 29

Yes, absolutely! You may return this product for a full refund within 30 days of receiving it.

To initiate a return, please visit our Returns Center.

View our full returns policy here.

  • Klarna Financing
  • Affirm Pay in 4
  • Affirm Financing
  • Afterpay Financing
  • PayTomorrow Financing
  • Financing through Apple Pay
Leasing options through Acima may also be available during checkout.

Learn more about financing & leasing here.

Top Amazon Reviews


  • Not ready and too late for prime time.
I was expecting this device to be more intuitive and streamlined, it just isn't. Just as the other person said, file names are not encrypted along with file type which is a big deal because it is counter intuitive to encryption; an option should have been given. 1. You unlock the device with a pin 2. Plug into usb 3. Log into cloudashur client program 4. Put your cloud folders from your desktop onto cloudashur program 5. Open your file directory folder and navigate to the cloudashur device. You will be able to see your cloud folder there, and that's where you transfer files you want to have encrypted into the cloud. Starting to see how cumbersome this is? You may be thinking to yourself that this sounds like a container and it is in a way just poorly implemented. This device would have made sense 5 years ago but now you options such as cryptomator and nord locker. ... show more
Reviewed in the United States on January 27, 2020 by Robert C

  • Essential for tech start-ups
This is a great product for small tech start-ups. We are using lots of outside contractors and CloudAshur helps us to compartmentalize risk with new contractors when sharing proprietary data. Combined with limited cloud folder access on Dropbox and others you can make a nice hybrid control system for sharing a subset of encrypted data without having to inherently trust your cloud services vendor not to peak in on your progress. ... show more
Reviewed in the United States on April 8, 2020 by Brian Bodemann

Can't find a product?

Find it on Amazon first, then paste the link below.