Last Update February 15, 2022

Categories

  • Electrical, Electronics & Electro-optics
  • IT, Computing and Software

ABOUT US
E-quipment BV specializes in the security of mobile, business data through certified storage products. These storage solutions are provided with PIN protection or authentication by means of a password and work with military encryption techniques. Your business data is thus protected against theft and loss and your company complies with the latest legislation and regulations regarding data security.

EXTENSIVE EXPERIENCE IN DATA SECURITY
E-quipment BV was founded in 2009 and has developed into a specialist in the field of business data security in 7 years. It is our goal to protect the business market against data loss and all the unpleasant inconveniences and risks that can accompany it. Ever since the tightened regulations regarding data security, every company needs to take data security very seriously.

OUR SECURE STORAGE PRODUCTS
Our secure storage solutions are characterized by high quality, military encryption techniques and reliable authentication through pin or password. Our range consists of flash drives, hard drives and solid state drives. In addition to safety, the ease of use is paramount for all our solutions. For you and your employees. Governments, insurance companies and the police already preceded you in their choice of our products.

SERVICE IS OUR PRIORITY
We use a method where service is of paramount importance. You will notice this by:

  • a competitive price evaluation 
  • possibility support where necessary consult possibly on location 
  • excellent warranty * (iStorage flash drives have 3 years and external hard drives have 2 years warranty) 
  • delivery of the best products in their class 
  • a clear quote in the mailbox the same day 
  • good accessibility

* E-quipment guarantees that the items to be delivered meet the usual requirements and standards that can be set for them and are free of any defects. Report a defective product via info@e-quipment.eu and mention a complaint description plus the serial number. We will contact you, but you can always call or email us for advice. Do you have questions or do you want a customized advice? Please contact us.

TRANSPORTERS
We usually ship your orders by PostNL, and can process orders until 11:30 PM. We strive to share your track and trace data with you as soon as possible. (PostNL also provides private individuals on Saturdays, and companies than on Monday!)
 

datAshur Pro

Federal Information Processing Standard (FIPS) Level 3
FIPS 140-2 is a critical and globally recognised metric that demonstrates that the technology device has passed a stringent set of rigorous testing procedures and meets the highest standard set for encryption
algorithms and data protections.

FIPS PUB 197 validated encryption algorithm
Employing AES-XTS 256-bit full disk hardware encryption, the datAshur PRO seamlessly encrypts all data on the drive whilst at rest, keeping your data safe even if the flash drive falls into the wrong hands.

NLNCSA DEP-V certified
The ‘Departmentaal Vetroujwelijk restricted accreditation considers the processing of sensitive information within the Dutch Government, with regards to the information security code “special information” meaning that employees from all kinds of Government departments can now choose the datAshur PRO off a standard approved list.

Performance
Up to 139 MB/s read speed and Up to 43 MB/s write speed.

cloudAshur

The future of cloud data security
cloudAshur is the perfect solution for anyone wanting to securely store, share, manage and monitor data in the cloud. cloudAshur eliminates the security vulnerabilities that exist with cloud platforms, such as lack of control and unauthorised access. Hackers are devising many sophisticated methods to target innocent and vulnerable users. Human error is also prevalent amongst data leakage incidents.
The consequences of a cloud account being hacked can bring about theft and leakage of confidential data, leading to potential job losses, adverse publicity, hefty fines and the downfall of a business.
  
On-device Crypto-chip
Offering 100% real-time military grade AES-XTS or AES-ECB 256-bit Hardware Encryption with FIPS PUB 197 certified USB 3.0 encryption controller.

Uniquely incorporates Common Criteria EAL4+ ready secure microprocessor
Which offers ultimate security against hackers, detecting and responding to tampering with features such as:
• Dedicated hardware for protection against SPA/DPA/SEMA, DEMA attacks
• Advanced protection against physical attacks, including Active Shield, Enhance Protection Object, CStack checker, Slope Detector and Parity Errors
• Environmental Protection Systems protecting against voltage monitor, frequency monitor, temperature monitor and light protection
• Secure Memory Management/Access Protection

Five factor authentication
SOMETHING YOU HAVE
• The cloudAshur hardware security module
SOMETHING YOU KNOW
• 7-15 digit Admin/User configurable PIN
• Username and password for the iStorage cloudAshur Windows or macOS client app
• Where the data is stored, which cloud provider
• Username and password for the cloud account

BRUTE FORCE HACK DEFENCE MECHANISM
Intelligently programmed to protect against all forms of brute force attacks.
If the User PIN is entered incorrectly 10 consecutive times, the User PIN will be deleted and the drive can only be accessed by entering the Admin PIN in order to reset the User PIN. (Admin can change this from the default 10 incorrect PIN entries, to 1-9, for the User only)
If the Admin PIN is entered incorrectly 10 consecutive times, all PINs and the encrypted encryption key will be lost forever.

1. LED lights
   Red – standby state
   Green – User mode
   Blue – Admin mode
2. Polymer coated, wear resistant, alphanumeric keypad
3. Common Criteria EAL4+ ready secure microprocessor
4. Epoxy coating
5. Hard anodized and ruggedized extruded aluminium housing
6. Key button
7. SHIFT button
8. Zinc alloy (can be attached to keyring)
9. Rubber gasket (Making the module waterproof when sleeve is fitted)

FIPS Level 3 compliant tamper proof & evident design
All critical components within the cloudAshur enclosure are covered by a layer of super tough epoxy resin, which is virtually impossible to remove without causing permanent damage to the critical components.
If breached, the cloudAshur modules tamper evident design will provide visible evidence that tampering has occurred.

User PIN enrolment
The Admin can set a restriction policy for the user PIN. This includes setting the minimum length of the PIN, as well as requiring the input of one or more ‘Special Character’ if needed.
The ‘Special Character’ functions as ‘SHIFT + digit’

One-time User recovery PIN
The Admin can program the cloudAshur with a one-time recovery PIN. This is extremely useful in situations where a User has forgotten the PIN to authenticate the cloudAshur.
This feature allows the User to enter the Recovery PIN and configure a new User PIN.

Whitelisting on networks
Configured with a unique VID/PID and internal/external serial number with barcode, allowing easy integration into standard end-point management software (white-listing), to meet internal corporate requirements.

cloudAshur KeyWriter
cloudAshur KeyWriter (patent pending) makes sharing of data in the cloud, via email and file transfer services (e.g. WeTransfer) between authorised users a breeze with ultimate security and peace of mind, allowing users to securely share data with one another, in real-time, regardless of their location.

Key features
cloudAshur KeyWriter copies all critical security parameters including the randomly generated encryption key and all PINs between the Master cloudAshur module and as many secondary cloudAshur modules as required using any off the shelf USB hub, allowing authorised users to securely share data with one another, in real-time, regardless of their location.
The critical security parameters never leave the cloudAshur module and are stored in the Common Criteria EAL4+ ready secure microprocessor.
The process of copying the encrypted encryption key and all critical credentials between the Master cloudAshur module and the Secondary cloudAshur modules is protected by a secure protocol incorporated within the iStorage cloudAshur secure microcontroller. The protocol is implemented using cryptographic algorithms, all of which are FIPS certified. Every cloudAshur has a unique certificate issued by a root of trust, which ensures that only iStorage cloudAshur modules can be used during the key exchange process.
The cloudAshur modules never output the established session key when running the secure protocol and the sensitive data being copied is only decrypted in the validated recipient cloudAshur module. The iStorage KeyWriter software running on the PC coordinates the operations required by the secure protocol, however the software has zero visibility of both the session key and decrypted data, making it impossible for a hacker to access or retrieve any critical security parameters stored within the cloudAshur module.

cloudAshur Remote Management
Gives you full control of all cloudAshur hardware security modules deployed within your organisation offering a wide range of features to manage all users.

Key features
iStorage Remote Management Console provides the Administrator full visibility and control over the following:
Temporarily disable or reset (remote kill) Users cloudAshur modules - in the event of suspicious activity or an employee leaving the organisation without returning their cloudAshur encryption module.
Restrict file types – control what file types are being uploaded and shared in the cloud (EXE, PNG, PDF, etc…) View User’s log files – full visibility over what each User is doing in the cloud, such as, what files they are uploading, downloading, modifying, etc…
Display User’s location – You can view the location of User’s cloudAshur modules via an on-screen map.
Geofencing and Time fencing - restrict the time and location of where and when the cloudAshur encryption module can be used by each individual User.
iStorage Remote Management Console is compatible with Windows 

Product informational files

datAshur Pro2

ISTORAGE DATASHUR PRO2 USB-FLASHDRIVE
Government validations
FIPS 140-2 Level 3, NCSC CPA, NLNCSA BSPA & NATO Restricted validations (pending Q3 2019)

FIPS 140-2 LEVEL 3 COMPLIANT TAMPER PROOF & EVIDENT DESIGN
All critical components are covered by a layer of super tough epoxy resin, which is virtually impossible to remove without causing permanent damage to the critical components. If breached, the tamper evident design of the datAshur PRO² will provide visible evidence that tampering has occurred.

PERFORMANCE
130MB/sec 116MB/sec
read speed. write speed.

INDEPENDENT USER & ADMIN PIN
Which makes it perfect for corporate and government deployment. If the user forgets their PIN, the drive can be unlocked by the admin PIN, the admin can then allow the user to set a new PIN.

BOOTABLE FEATURE
Install an OS on the datAshur PRO² and boot directly from it.

OS & PLATFORM INDEPENDENT
No software required.
Works on any device with a USB port!
compatible with: MS Windows, macOS, Linux, Android, Chrome, Thin Clients, Zero Clients, Embedded Systems, Citrix and VMware

Product informational files

E-Quipment B.V.

  • Fashion Dôme/MyOffice, Veluwezoom 5, 1327AA, Almere, The Netherlands
  • +31 (0) 36-5250024
Add to favorites