The iStorage patented* cloudAshur KeyWriter application enables the required number of cloudAshur modules to be cloned with the same encrypted encryption key allowing real-time, ultra-secure collaboration with authorised users regardless of location.
Setting the standard for secure collaboration Sharing encrypted data securely allows for instant collaboration in the cloud, granting flexibility of working across departments, countries or organisations and saving time in what would be days of posting encrypted USB flash drives to and from colleagues.
With the cloudAshur, only authorised users with a cloned cloudAshur encryption module can decrypt and view data. cloudAshur KeyWriter copies all critical security parameters including the randomly generated encrypted encryption key and all PINs between the Master cloudAshur module and as many Secondary cloudAshur modules as required using any off the shelf USB hub. This allows secure and instant collaboration in the cloud between authorised users, as well securely sharing encrypted files on a local network drive, portable data storage device or via email and file transfer services.
Cloning process The process of copying the encrypted encryption module key and all critical credentials between the Master cloudAshur module and Secondary cloudAshur modules is protected by a secure protocol incorporated within the iStorage cloudAshur secure microcontroller. The protocol is implemented using cryptographic algorithms, all of which are FIPS certified. Every cloudAshur has a unique certificate issued by a root of trust, which ensures that only iStorage cloudAshur modules can be used during the key exchange process.
You can't hack what you can't see The KeyWriter software has zero visibility of both the session key and decrypted data. This makes it impossible for a hacker to access or retrieve any critical security parameters stored within the cloudAshur module. More information: License | Software type | License | | License level purchase required | 10-49 license(s) |
|