(SSD 2TB) £617
In a world of cyberattacks and data security concerns, protecting your files has never been more important. Therefore, having somewhere to store your work, personal or medical files is super important. This is where the diskAshur3 comes in: a state-of-the-art portable SSD designed to securely store your data, protected from cyberattacks, brute-force attacks, and malware.
The diskAshur3 is a portable and compact unit developed by iStorage, which has been designed for enhanced data security. The diskAshur3 features full disk security, thanks to its military-grade FIPS PUB 197 validated AEX-XTS 256-bit hardware encryption algorithm. This allows the diskAshur3 to store your files with comprehensive encryption protection to ensure no one can access the files on the device unless they have the PIN.
In fact, the unit offers complete firmware protection that complies with FIPS 140-3 Level 3 standards. Therefore, the unit offers a comprehensive approach to security, even preventing against quantum computing attacks due to its robust symmetric encryption system. This ensures that vulnerabilities in commonly used asymmetric algorithms are not present in the unit, offering an enhanced design that can ensure the protection of your data.
The device offers you three PINs, which do not come pre-set but have to be configured by the user. The three PINs include a user, an admin and a one-time recovery option. Each PIN can be between 8 and 64 digits long, offering you a completely personalised and private PIN that is only known by the intended user of the diskAshur3. Once the diskAshur3 is plugged into your computer or laptop, you enter the correct pin, and all the files and data on the device are decrypted, allowing you to access and edit the files on the storage device. Then you simply unplug the diskAshur3 from your computer, and all the files are instantly encrypted and can only be accessed with the correct PIN.
However, should someone try to access your files via a brute force attack, the diskAshur3 has been designed to automatically delete the PIN after 10 consecutive failed attempts. Then only the admin PIN can be used. If this is once again input incorrectly 10 consecutive times, the data on the diskAshur3 is deleted, and the device will need to be reconfigured before it can be used again. I like that through this system, you know that your files are always protected and cannot be accessed, even if someone tries to brute force their way inside.
Furthermore, the diskAshur3 is designed to be tamperproof, ensuring that even physical attacks are prevented. It achieves this thanks to the completely sealed unit, which means you would need to physically break the unit case to get to the components inside, and, in the process, highlight that it has been tampered with. However, should someone get inside the casing, the internal components are then covered in an epoxy resin layer to give them an extra layer of protection, making the entire unit super secure and tamperproof.
The diskAshur3 is compatible with most systems, including Windows, macOS, Linux and Android, to ensure it will work with whatever computing systems you already have in place. Then, to support quick file transfer, the diskAshur3 has been designed with advanced transfer, read and write speeds to support your tasks and data security with ease. This advanced speed builds on the previous models in the range to offer an enhanced system supporting your security.
Overall, the diskAshur3 reminds us once again why iStorage is a key player in the data security system market, offering an encrypted USB data storage device that will keep your files protected. The unit is perfect for personal use, or even for a small business to keep all your files and data stored securely and in one place, knowing your data is supported by high-quality encryption.
Pros:
- Portable device ideal for storing your files securely on the go
- Enhanced file encryption
- Comes with USBA and USB-C cables for easy use
- Tamper and brute force attack proof
- Wear resistant keys for added security
- Wide compatibility with computing systems
- Log in to post comments