SMiD Cloud launches SMiD Pro cloud privacy solution

SMiD Cloud, the makers of cloud privacy device SMiD Pro are bringing the market the first, plug & play solution that gives users total control over the privacy of their cloud-stored files, photos, videos, legal documents, blueprints, contracts and anything else they entrust to cloud providers.

The team behind SMiD Pro believes that everyone should be able to benefit from the availability and cost-savings of cloud storage, without having to give up any of their privacy or peace of mind. They are making SMID Pro available to the public for the first time on February 1, through an Indiegogo campaign that offers discounted prices to supporters. The campaign is pivotal to the company’s go-to-market strategy.

Given its flexibility and affordability, cloud storage is the most popular option for the masses, with our growing needs for digital information storage. But 88% of cloud storage customers express concern with the possibility of unauthorised access to their data. The size of cloud environments makes them easy targets for hacking attacks. How can customers be sure their cloud storage provider is capable of keeping their data 100% secure and private?

SMiD Pro works with the most popular cloud providers (Azure, Amazon S3, Dropbox, etc.) and is adding more to its provider list all the time. The device enables global cloud storage users – everyone from particulars, health care professionals, lawyers, celebrities to leaders of large organisations to heads of multinationals – to keep their cloud-stored information absolutely confidential and invulnerable to intrusion, theft, accidental loss or damage.

SMiD Pro was designed to be easy to use for everyone. It is the first solution to make total cloud privacy available to everyone. The device is small, lightweight, portable, and there’s nothing to configure or install. It connects to the local network and automatically protects all data right at the source – before it heads to the cloud. Any outside attempts to view or access the data while in the cloud are in vain, since SMiD renders data unreadable by anyone but the SMiD user.

How does SMiD Pro work?

SMiD Pro gives users the freedom to choose their cloud providers and change them over time. It turns every cloud into the user’s own private cloud. Users can take their SMiD devices with them wherever they go. The device only turns on with a physical startup key, so it is rendered completely useless in anyone else’s hands.SMiD Pro working home

SMiD Pro uses encryption technology, which is typically used by organisations with the greatest needs for data security and prevention of unauthorised access. Encryption is complex, and normally requires expertise to run and manage, but SMiD Pro makes encryption technology available to everyone.

There are other encryption solutions on the market, but SMiD is unique in that it gives users exclusive control over the device’s encryption keys, and it performs all its operations in a way that is transparent for the user. There are no passwords or key phrases that attackers might be able to guess. SMiD Pro uses AES-256 encryption algorithm and unguessable cryptographic keys to make it compliant with strict international data protection and privacy laws. No unencrypted files are ever stored locally, so there is also zero threat of local intrusion.

Users plug the device in, set up a SMiD account and connect to their cloud providers from the administration panel. Each SMiD Pro’s exclusive cryptographic keys are automatically generated inside the device. To protect and store their files, they just need to drag and drop them to their SMiD folder.

SMiD Pro seeks support on Indiegogo

The company is launching the product through an Indiegogo campaign, which goes live on February 1. It aims to produce the first batch of SMiD Pro and deliver the product to market. SMiD Pro is available in this campaign to all kinds of users, with up to 50% off.

Comment on this article below or via Twitter: @IoTNow_ OR @jcIoTnow

FEATURED IoT STORIES

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, iot home automation is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more
RECENT ARTICLES

Actility and Helium Network announce roaming integration to scale IoT coverage

Posted on: October 18, 2021

Actility, the provider of IoT connectivity solutions and LPWA technology, and Helium have launched a roaming integration partnership, unlocking affordable and ubiquitous coverage for millions of IoT devices.

Read more

Future of data integration: 2022 and beyond

Posted on: October 18, 2021

Traditional methods including manual creation of scripts, scrubbing the data, and later loading it into a data warehouse or ETL, (extract-transform-load) was used to integrate data from different sources. These methods were adopted in the era of resource constraints and have now become very time-intensive, expensive, and error-prone, says Yash Mehta, an IoT and big

Read more