Vendor: iStorage Limited
Price: $129
Contact: istorage-uk.com

Quick Read

Strengths:
The various modules in iStorage cloudAshur combined result in a very robust and impressive multi-layer authentication approach to data security.
Weakness:
Weaknesses None that we found.
Verdict:
This is a very easy-to-use, highly customizable solution that eliminates security vulnerabilities by focusing on access control through a variety of means and authorizations.

Rating Breakdown

SC Labs Reviews

Reviews from our expert team

Features:
Rating: %s
Documentation:
Rating: %s
Value for Money:
Rating: %s
Performance:
Rating: %s
Support:
Rating: %s
Ease of Use:
Rating: %s
Rating: 4.75/5 4.75/5

Summary

IStorage cloudAshur eliminates security vulnerabilities within cloud platforms by providing more control of data through a variety of access authorizations. It can be used to securely encrypt and share email attachments and large files and to securely encrypt and store data on a PC or Mac. The solution provides security is through the cloudAshur PIN authenticated USB module, the iStorage KeyWriter software and the Remote Management Console.

We were intrigued by the cloudAshur PIN authenticated USB module, an impressive, easy-to-use, fully encrypted hardware device. It encrypts all data with a FIPS-certified, randomly generated AES 256-bit encryption key. Ready to go right out-of-the-box, this module can be used alongside iStorage KeyWriter and the Remote Management Console. To unlock it, end-users simply enter their unique, seven- to 15-digit PIN. Any device with a USB port can support this ultra-secure device that offers remarkably fast backwards-compatible data transfer speeds and the highest certifications.

The iStorage KeyWriter helps enable cloning of cloudAshur modules and their respective encryption keys for secure, real-time collaboration between authorized users, regardless of geolocation. iStorage Key Writer can securely copy an encryption key and all security parameters for up to nine other devices at a time.

The iStorage Remote Management Console ties the other modules together and gives full control of all deployed cloudAshur hardware security modules. The RMC can be used to disable or reset modules, view user logs, display user location, determine geofencing boundaries, geolocate devices, and even set geolocation restrictions for different times of the day. The dashboard has an intuitive layout and displays a comprehensive overview of high-level device information, including how many devices are online and how many are disabled. The RMC security settings, rules and policies are varied and flexible, resulting in a high degree of customizability.

The various modules in iStorage cloudAshur combine for a remarkable, multilayer authentication approach: a seven to 15-digit PIN as well as application, file location and cloudAshur account credentials. We were hard-pressed to find any other solution that even comes close to the layered protection iStorage cloudAshur offers.

Pricing for the cloudAshur encryption module starts at $129 and includes 8/5 phone, email and web support. Customers also have access to a FAQ list.

 Tested by Matthew Hreben