With all of the data leaks being announced on a daily basis, many people have decided that they would rather host their own data in order to maintain control. While there are many options, such as NAS devices, sometimes you may want access to your files anywhere you are, regardless of an Internet connection, so a portable storage device is something to consider. But once the device leaves the house, what happens if you accidentally lose it or your laptop bag is stolen?
Back in 2018, I took a look at the iStorage diskAshur PRO2, a secure portable hard drive that encrypted all data on the device. Today, I'll take a look at the iStorage datAshur PRO2, a device that provides similar functionality to the diskAshur PRO2, only in a small USB thumbdrive form factor that you can easily put in your pocket and carry with you.
The datAshur PRO2 comes in different capacities, from 4GB (priced at 49/$59) all the way up to 512GB (priced at 369/$468). Our review unit, provided by iStorage, was the 256GB model, priced at 279/$358.
3.7V Li-Polymer Rechargeable Battery
USB 3.2 Gen 2 SuperSpeed USB
The device's housing is made of a rugged anodized aluminum, and the case that goes over it has a rubber gasket to make the datAshur PRO2 waterproof, giving it an IP58 certification.
The USB drive contains a rechargeable battery. This lets you type in the PIN and unlock the device before connecting the datAshur PRO2 to a USB port on your computer. Since all of the encryption and decryption is done on the thumb drive itself, the datAshur PRO2 can be used on Windows, Mac, and Linux without the need to install any drivers. If the battery dies from lack of use, you can still plug it into a computer and unlock the drive while it's charging.
If you're paying for an encrypted drive, part of the cost is related to obtaining security certifications, and the datAshur PRO2 has a lot of them. Or rather, is in the process of obtaining a lot of them. Unfortunately it's hard to tell which ones have been completed and which ones are currently in process. Let's explore those certifications in the next section.
The buttons on the device are the main interface, and they have a polymer coating to prevent the keys from smudging, which would tip off an attacker as to what keys are frequently pressed to unlock it.
If you're looking for cheap and portable storage, but don't care about security, then there are far better solutions in the market for you that come in at much cheaper price points. If you require your data to be secure, then the datAshur PRO2 shines.
The website lists the following certiifcations/validations for the datAshur PRO2: FIPS 140-2 Level 3, NCSC CPA, NLNCSA BSPA & NATO Restricted Level. However it's hard to tell which of these the product has completed, and which are still pending review by the official agencies. For example, the device does not yet have FIPS 140-2 Level 3 validation, although the design itself is compliant. If this distinction is important to you for purchasing, you'll want to wait a little longer for NIST to complete its review. The company has other products that have been approved, so I suspect it's only a matter of time before the datAshur PRO2 is validated as well.
One of the main physical features that will allow iStorage to obtain FIPS 140-2 Level 3 validation on the datAshur PRO2 is the fact that the components within the device are covered in an epoxy resin. This makes physical attacks against the hardware nearly impossible without damaging the components, and is also used as evidence that the device has been tampered with.
The datAshur PRO2 is a great solution for enterprise environments due to the ability to whitelist the device. This allows a company to lockdown what external storage devices are allowed to connect to the corporate network and prevent someone from, for example, connecting a rogue USB thumbdrive that may have malware on it, while allowing approved devices. Unfortunately, my test lab does not have the ability to test this functionality.
The device has a concept of both an admin and a regular user account. The admin account allows you to setup features on the datAshur PRO2, such as password complexity, create a one-time recovery PIN, set the device as bootable, or make the device read-only to users. The user account only allows someone to read/write data stored on the device, and of course, only the admin can create users.
Another interesting feature of the datAshur PRO2 is the concept of a "self-destruct" PIN. If configured, you can simply type in the code to automatically delete the encryption keys and the data from the device. While this feels very spy-like, it's better to have the feature and not need it than need it and not have it.
While the datAshur PRO2 has a lot of features available, you will probably want to keep the manual nearby because memorizing all of the keypresses required to set things up or check the status is pretty much impossible. However, the PDF, which is included on the drive itself when you first get buy it, is very informative and has clear instructions on what to do and how the device will respond, as shown in the example above. In addition, unlocking the device is what you'll be doing the most, and that's a simple process to perform.
Since the datAshur PRO2 supports a USB 3.2 Gen 2 SuperSpeed connection, I expected the performance to be great and I was not disappointed.
While I normally test NAS systems using a RAM-disk in order to reduce latency, I went with a more "real-world" test here of simply copying files my Samsung 970 EVO Plus NVMe drive to the datAshur PRO2. Since the drive can read and write at over 3,300 MB/sec, we'll definitely only be limited by the USB bus and the USB drive itself.
According to the specs on the iStorage website, you can expect a maximum of 168 MB/sec when reading files from the device, and 116 MB/sec when writing files to to the device.
After doing my normal battery of tests - namely, copying a multi-gigabyte file to/from the device and copying hundreds of multi-megabyte files to/from the device, I was roughly hitting those numbers. When connected to a USB 3.0 or better port, a simple drag-and-drop copy would always consistently show 116 MB/sec when writing files to the datAshur PRO2 and 130 MB/sec when reading from the datAshur PRO2. When connected to an older USB 2.0 port, performance was consistently throttled at 40 MB/sec for all of the tests.
Running a benchmark in CrystalDiskMark provided even higher throughput values, with a consistent 140 MB/s sequential read and 128 MB/s sequential write speeds. As expected, random read/write speed was considerably slower, clocking in at only 17 MB/s read and a maximum of 12 MB/s write.
While it would've been nice to see the device take full advantage of the USB 3.2 performance, these speeds are still reasonable and iStorage delivers what it promises.
Unlike a regular flash drive, if you plug the datAshur PRO2 into a USB drive, nothing happens. In order to access the drive, you have to first unlock it. This process consists of holding the shift key down on the drive to wake it up, then pressing the unlock key, followed by your PIN code. The red light under the locked padlock lights up when the datAshur PRO2 is awake, and the unlocked padlock and letter A (administrator) start flashing after you press the unlock key. Once unlocked, you have 30 seconds to plug the device into a computer before it automatically locks itself again. Alternatively, you can plug the device in first and then unlock it.
The keys themselves are only slightly raised, but have a nice tactile response when pressed, making it easy to know you've successfully engaged it. In all of my testing, I never once accidentally pressed the wrong button.
When in the unlocked mode and connected to a computer, the datAshur PRO2 stays unlocked until it's removed from the USB port or the computer is rebooted. During this time, it acts just like a regular flash drive you'd connect to your PC.
The one minor quibble is that when you pull the flash drive from its protective sleeve, you have to make sure you don't misplace it. The datAshur PRO2 is only waterproof when in the sleeve, due to the rubber gasket, and the sleeve also protects against accidental button presses.
There's an old adage in technology: Good, Fast, Cheap, pick two. It's clear that iStorage went in with the strategy of creating a good and fast product, but as I noted earlier, that means the device is not cheap, especially at the larger capacities.
If you're just looking for a USB flash drive to store some generic data, then you probably won't be interested in the datAshur PRO2. It's a little bigger than a normal drive and a lot more expensive, especially as you look at the larger capacity drives. However if you're looking for a well designed, well performing, and very secure thumb drive to store sensitive data, you can't go wrong with the datAshur PRO2. In addition, if you're only looking to keep some sensitive documents that don't take up a lot of space, the four gigabyte version is only $59, which is a great price considering the level of security the device maintains.
Continue reading here:
Review of the iStorage datAshur Pro2, an encrypted thumbdrive for home and work - Neowin
- Regulated encryption isnt possible heres what is - POLITICO Europe - August 3rd, 2021
- Work from home and cloud are prompting hard looks at security - GCN.com - August 3rd, 2021
- Atakama and Spirion to announce their strategic partnership at Black Hat 2021 - PRNewswire - August 3rd, 2021
- Spirion and Atakama Join Forces at Black Hat 2021 Conference - MarTech Series - August 3rd, 2021
- Looking for ways to password protect a file or folder on Windows 11? Here's how you can do it - India Today - August 3rd, 2021
- XSOC CORP's SOCKET Receives UL- 2900 Certification for Securing Encrypted Workflows of Today's Enterprise and Industrial Connected Devices - Business... - August 3rd, 2021
- Apple @ Work: FileVault 2 is so good, theres no reason for IT departments not to use it - 9to5Mac - August 3rd, 2021
- The Future of Industrial Security - Security Today - August 3rd, 2021
- Global Encryption Software System Market Size And Forecast to 2021 2027 analysis with key players : IBM, Microsoft, Sophos ltd, Gemalto, Net App Inc,... - August 3rd, 2021
- Cloud Encryption Software Market Size 2021 Industry Demand, Share, Global Trend, Industry News, Business Growth, Top Key Players Update, Business... - August 3rd, 2021
- Global E-mail Encryption Market Dynamics Analysis, Production, Supply and Demand, Covered in the Latest Research 2021-2026 - Digital Journal - August 3rd, 2021
- Insights on the Optical Encryption Global Market to 2027 - Featuring Arista Networks, Broadcom and CenturyLink Among Others - ResearchAndMarkets.com -... - July 8th, 2021
- Jupiter Project Presents 'Metis Messenger', the Decentralized Chat Application That Syncs Across All Platforms - GlobeNewswire - July 8th, 2021
- If full encryption of police radios necessary? Berkeley may allow public to hear one of their channels - The Daily Post - July 2nd, 2021
- Leveraging Encryption Keys to Better Secure the Federal Cloud - Nextgov - July 2nd, 2021
- Benefits of Adopting Data Encryption in Businesses - CIOReview - July 2nd, 2021
- Encryption can be lucrative, but with environmental costs - Floridanewstimes.com - July 2nd, 2021
- UK Government has suggested messaging apps to avoid using end-to-end encryption on the accounts of children because that can be harmful to them -... - July 2nd, 2021
- Diavol ransomware linked to Trickbot botnet - IT PRO - July 2nd, 2021
- Got data? The biggest-ever portable encrypted SSD just came out - Cult of Mac - July 2nd, 2021
- Application-Level Encryption Market is expected to expand at a CAGR of 25% from 2020 to 2030 KSU | The Sentinel Newspaper - KSU | The Sentinel... - July 2nd, 2021
- Encryption Key Management Market to Eyewitness Massive Growth by 2028: Ciphercloud, Gemalto, Google The Manomet Current - The Manomet Current - July 2nd, 2021
- Data storage: the importance of protecting the device and not just the network - IT-Online - July 2nd, 2021
- Global E-mail Encryption Market 2021 Demands To Sustain in Future Industry Size, Growth, Revenue, Global Statistics and Forecast to 2030 The Manomet... - July 2nd, 2021
- Hardware Encryption Market 2021 Industry Analysis by Manufacturers, End-User, Type, Application, Regions and Forecast to 2027 The Manomet Current -... - July 2nd, 2021
- Former Anonymous and Lulzsec hacker discusses his criminal past and gives his top tips for avoiding ransomware - Texasnewstoday.com - July 2nd, 2021
- Why Inspecting Encrypted Traffic Is A Must - Security Boulevard - June 25th, 2021
- Researchers: 2G Connection Encryption Deliberately Weakened To Comply With Cryptowar Export Restrictions - Techdirt - June 25th, 2021
- The Ultimate Guide to Key Management Systems - Hashed Out by The SSL Store - Hashed Out by The SSL Store - June 25th, 2021
- Will regulation adapt to encryption, or will encryption adapt to regulation?Expert answers - QNT - June 25th, 2021
- China 'all in' on its own encryption brand - BollyInside - June 25th, 2021
- How the FBI Is Trying to Break Encryption Without Actually Breaking Encryption - Gizmodo - June 19th, 2021
- Vergecast: Windows 11 leaks, RCS encryption, and this week in antitrust - The Verge - June 19th, 2021
- WhatsApp vs govt: Can traceability and encryption co-exist? - Business Today - June 19th, 2021
- Finding the balance in encryption and crime-fighting Monash Lens - Monash Lens - June 19th, 2021
- Drug bust was a huge coup - but the surveillance should trouble free citizens - Stuff.co.nz - June 19th, 2021
- Google open-sources tools to bring fully homomorphic encryption into the mainstream - The Daily Swig - June 16th, 2021
- Google enables end-to-end encryption for Androids default SMS/RCS app - Ars Technica - June 16th, 2021
- Bitcoin and Encryption: A Race Between Criminals and the F.B.I. - The New York Times - June 16th, 2021
- We've been shown time and again that strong encryption puts crims behind bars, so why do politicos hate it? - The Register - June 16th, 2021
- How To Enable End-To-End Encryption In Zoom On Windows 10 - Wccftech - June 16th, 2021
- WhatsApp to Enable Multi-Device Support With End-to-End Encryption: Report - Gadgets 360 - June 16th, 2021
- How to Encrypt Files, Folders and Drives on Windows 10 ... - June 12th, 2021
- Device encryption in Windows 10 - support.microsoft.com - June 12th, 2021
- Countering disinformation and protecting democratic communication on encrypted messaging applications - Brookings Institution - June 12th, 2021
- 2021 Hong Kong Encryption Trends: As cyber threats grow, Hong Kong outpaces the world in enterprise encrypt... - Security Boulevard - June 12th, 2021
- FBI, Australian Police Ran A Backdoored Encrypted Chat Service For Three Years - Techdirt - June 12th, 2021
- New beta reveals more info about upcoming end-to-end encrypted backups in WhatsApp - TechRadar - June 12th, 2021
- Hacking, encryption and threat of attack: What the dead Israeli intel officer did before he was drafted - Haaretz - June 12th, 2021
- Fitting Into IoT Security with a New Open-Source Encryption Standard - IoT For All - June 12th, 2021
- Raids worldwide as police reveal vast hack of criminal encryption platform - FRANCE 24 - June 12th, 2021
- Social applications are the next big trend in encryption - QNT - June 6th, 2021
- Microsoft Teams: Here's when your calls will get end-to-end encryption - TechRepublic - June 4th, 2021
- Survey reveals how businesses have gotten more serious towards encrypting their data - Digital Information World - June 4th, 2021
- Microsoft Teams calls are getting end-to-end encryption in July - BleepingComputer - June 4th, 2021
- Data encryption cyber security software company DAtAnchor, Inc. offers affordable CMMC v1.02 compliance for Office, CAD, video, and audio files. Ohio... - June 4th, 2021
- Only 17% of organizations encrypt at least half of their sensitive cloud data - SC Magazine - June 4th, 2021
- Database Encryption Market 2021 Present Scenario on Growth Analysis and High Demand to 2030 KSU | The Sentinel Newspaper - KSU | The Sentinel... - June 4th, 2021
- Cloud Encryption Gateways Market is Booming Worldwide | Global Analysis and Forecasts 2020-2026 | Key Players are Google, Ciphercloud, Perspecsys,... - June 4th, 2021
- End-to-End Encryption: Important Pros and Cons - CIO Insight - June 2nd, 2021
- 5 Trends Shaping the Future of Encryption - Cyber Security Hub - June 2nd, 2021
- Duality Technologies and Intel Collaborate to Deliver Optimized Homomorphic Encryption Applications - PRNewswire - June 2nd, 2021
- Top Benefits that Help in Boosting the Growth of the Email Encryption Market - TechBullion - June 2nd, 2021
- Baffle Brings the Holy Grail of Encryption to Amazon RDS - Yahoo Finance - June 2nd, 2021
- Why Indian Courts Should Reject Traceability Obligations - EFF - June 2nd, 2021
- Ending encryption: On enforcing traceability on popular messaging apps - The Hindu - June 2nd, 2021
- E-mail Encryption Market is Anticipated to Gain Moderate CAGR by 2027 The Manomet Current - The Manomet Current - June 2nd, 2021
- Expert Stakeholder Consultation Report on the Indian Encryption Debate - Business Wire India - June 2nd, 2021
- Homomorphic Encryption Market Proceeds To Witness Huge Upswing Over Assessment Period by 2030 | Microsoft (US), IBM Corporation (US), Galois Inc (US) ... - June 2nd, 2021
- Rings 1080p Video Doorbell Pro with end-to-end encryption requires no batteries at a low of $120 - 9to5Toys - June 2nd, 2021
- More Businesses Adopting Encryption in the Last Year - Softpedia News - June 2nd, 2021
- Quantum computers have the potential to crack todays encrypted messages.Its a problem - Illinoisnewstoday.com - May 30th, 2021
- Ravi Shankar Prasad: Govt not in favour of breaking WhatsApps encryption, users have full right to it - The Indian Express - May 30th, 2021
- Data Encryption, Zero Trust A Practical Review of Bidens Executive Order on Improving the Nations Cybersecurity - Security Boulevard - May 30th, 2021
- WhatsApp challenges govt: Breaking end-to-end encryption will lead to security issues but timing of petition circumspect - Free Press Journal - May 30th, 2021
- The Indian Government Wants to Break Messaging Encryption, WhatsApp's Suing - Gizmodo - May 30th, 2021
- Klever integrates Jumio on its encrypted exchange service for user authentication - QNT - May 30th, 2021
- IoT Security Solution for Encryption Market Size and Share 2021 | Global Industry Analysis By Trends, Future Demands, Growth Factors 2027 Brockville... - May 30th, 2021
- WhatsApp Sues The Indian Government Over New Laws That Would Force It To Break Encryption - Techdirt - May 28th, 2021
- More and more companies are encrypting their devices - ITProPortal - May 28th, 2021