Now Reading
SMiD Cloud launches SMiD Pro cloud privacy solution

SMiD Cloud launches SMiD Pro cloud privacy solution

Posted by Zenobia HegdeFebruary 3, 2016

SMiD Cloud, the makers of cloud privacy device SMiD Pro are bringing the market the first, plug & play solution that gives users total control over the privacy of their cloud-stored files, photos, videos, legal documents, blueprints, contracts and anything else they entrust to cloud providers.

The team behind SMiD Pro believes that everyone should be able to benefit from the availability and cost-savings of cloud storage, without having to give up any of their privacy or peace of mind. They are making SMID Pro available to the public for the first time on February 1, through an Indiegogo campaign that offers discounted prices to supporters. The campaign is pivotal to the company’s go-to-market strategy.

Given its flexibility and affordability, cloud storage is the most popular option for the masses, with our growing needs for digital information storage. But 88% of cloud storage customers express concern with the possibility of unauthorised access to their data. The size of cloud environments makes them easy targets for hacking attacks. How can customers be sure their cloud storage provider is capable of keeping their data 100% secure and private?

SMiD Pro works with the most popular cloud providers (Azure, Amazon S3, Dropbox, etc.) and is adding more to its provider list all the time. The device enables global cloud storage users – everyone from particulars, health care professionals, lawyers, celebrities to leaders of large organisations to heads of multinationals – to keep their cloud-stored information absolutely confidential and invulnerable to intrusion, theft, accidental loss or damage.

SMiD Pro was designed to be easy to use for everyone. It is the first solution to make total cloud privacy available to everyone. The device is small, lightweight, portable, and there’s nothing to configure or install. It connects to the local network and automatically protects all data right at the source – before it heads to the cloud. Any outside attempts to view or access the data while in the cloud are in vain, since SMiD renders data unreadable by anyone but the SMiD user.

How does SMiD Pro work?

SMiD Pro gives users the freedom to choose their cloud providers and change them over time. It turns every cloud into the user’s own private cloud. Users can take their SMiD devices with them wherever they go. The device only turns on with a physical startup key, so it is rendered completely useless in anyone else’s hands.SMiD Pro working home

SMiD Pro uses encryption technology, which is typically used by organisations with the greatest needs for data security and prevention of unauthorised access. Encryption is complex, and normally requires expertise to run and manage, but SMiD Pro makes encryption technology available to everyone.

There are other encryption solutions on the market, but SMiD is unique in that it gives users exclusive control over the device’s encryption keys, and it performs all its operations in a way that is transparent for the user. There are no passwords or key phrases that attackers might be able to guess. SMiD Pro uses AES-256 encryption algorithm and unguessable cryptographic keys to make it compliant with strict international data protection and privacy laws. No unencrypted files are ever stored locally, so there is also zero threat of local intrusion.

Users plug the device in, set up a SMiD account and connect to their cloud providers from the administration panel. Each SMiD Pro’s exclusive cryptographic keys are automatically generated inside the device. To protect and store their files, they just need to drag and drop them to their SMiD folder.

SMiD Pro seeks support on Indiegogo

The company is launching the product through an Indiegogo campaign, which goes live on February 1. It aims to produce the first batch of SMiD Pro and deliver the product to market. SMiD Pro is available in this campaign to all kinds of users, with up to 50% off.

Comment on this article below or via Twitter: @IoTNow_ OR @jcIoTnow

About The Author
Zenobia Hegde

Leave a Response