The cloud privacy solution we’ve all been waiting for
SMiD PRO is a small, plug and play hardware device that deeply encrypts your cloud-bound data, ensuring it remains 100% secure and confidential, round-the-clock. It supports the most popular cloud storage service providers, and adding more all the time. It has been designed to be an extremely user friendly solution that complies with the strictest international data protection and privacy laws, because we believe that everyone –not just big companies- should have the ability to use cloud storage with total privacy and security. Every single one of us. SMiD connects to your LAN and automatically encrypts all data right at the source.
Keep your data in the cloud for your eyes only
SMiD supports the most popular cloud storage service providers, and adding more all the time.
No one will ever see what you store in the cloud. You are the only one who holds your SMiD’s startup key- the physical key needed to activate your SMiD. It’s a completely useless device in anyone else’s hands.
SMiD is an easy-to-use hardware device that ensures automatic security of your data. It’s a much better option than other software-based encryption solutions, which are vulnerable to ransomware. SMiD keeps your system secure at all times. It reduces the attack surface, generates and manages unguessable encryption keys, and is ransomware resistant.
And the fact that SMiD is a hardware device gives it another clear advantage: simplicity. There is no software to install or configure.
We love the cloud… but we fear the cloud.
The cloud is flexible, affordable and intelligent, but in the end we have little control over who sees our data- or what they choose to do with it – when it’s stored in the cloud.
SMiD allows you to enjoy every benefit of cloud storage while keeping your data 100% secure and confidential.
Cloud flexibility. SMiD privacy. Absolute peace of mind.
All you have to do to get up and running with SMiD Pro is connect your device to your local network and set up your account through the SMiD web panel. That’s it! Once your SMiD is plugged in, everything you store in the cloud is automatically encrypted – with no risk of loss, theft, damage or intrusion.
SMiD is the first solution capable of removing all vulnerability from both cloud – and local – storage. Since no unencrypted files are ever permanently stored, you are covered against local theft or accidental loss or damage.
A new breed of cloud privacy
There’s nothing quite like SMiD on the market. It combines the best of both worlds: users get encryption as robust as enterprise-grade solutions, without the pricetag, plus the fast setup of encryption software, without having to install anything. The beauty of SMiD Pro is that it allows every cloud storage user to enjoy the full benefits of cloud, while staying in control of their data.
• SMiD Pro device
• Universal power supply with interchangeable heads
• Startup key
• Ethernet cable with RJ45 connector
• 2 SMiD safeguard keys
• Quick startup guide
• Raspberry Pi3, trademark of the Rapsberry Pi Foundation
• 64 GB storage capacity
• 10/100 Mbps Ethernet port
• 4 x USB 2.0
• Universal power supply with interchangeable heads
• FCC, CE, RoHS, WEEE compliance
• Dimensions: 90x70x25 mm
Interesting privacy facts
- In 2012, Google received 21,389 government requests for information – affecting 33,634 user accounts. Google responded by providing the requested in 66% of the cases.
- Fujitsu Institute Research has revealed that 88% of cloud customers are concerned with unauthorized access to their data.
- 72% of individual user loss of information is due to hardware failures.
- 3.1 million US consumers were victims of smartphone theft in 2013, and never recovered their data.
- 6% of all PCs suffer an episode of data loss in any given year, and 31% of PC users have lost all of their files due to events beyond their control.
Every week 140,000 hard drives crash in US!
Questions and Answers
1. PURCHASING and SETUP
2. BUYING AND SHIPPING
4. RECOVERY OPTIONS
5. PRIVACY and SECURITY
1. PURCHASING and SETUP
Q: Are there different SMiD versions?
Yes, there is a SMiD cloud security solution suitable for every kind of cloud storage user – from home-based professionals to high-security corporate departments with stringent data protection policies. But, in order to make cloud storage a viable option for everyone – we created SMiD Pro, a personal cloud storage device designed and priced for individuals or groups of up to 5 users who need to ensure that sensitive data stored both in the cloud and locally – personal information, client files, photos, legal documents, blueprints, contracts, court proceedings – is secured from prying eyes, theft, hacking or third-party misuse or mishandling.
Q: Can anyone set up SMiD Pro?
Absolutely! SMiD Pro has been designed to comply not only with the strictest international data protection and privacy laws but also to be extremely user friendly.
Q: How many SMiD devices do I need?
SMiD Pro is up to 5 users. Information encrypted by one SMiD device can only be decrypted by the same SMiD device. Use more than one SMiD to keep the privacy between departments or groups, you can share the same storage provider account for all your SMiDs. Files will be in the same storage unit but visible only to the right SMiD users.
Q: How do I set up SMiD?
SMiD comes in a small and compact box with a power cord, an Ethernet cable and a pen drive. Set up is quick and easy: Connect the device to your local network, access the SMiD web panel to set up your account and SMiD will automatically generate exclusive cryptographic keys that are simply uncrackable.
1. Set up your SMiD account and connect to selected cloud providers in the administration panel (simple type smid in your browser address bar to access it).
2. Safeguard a copy of your cryptographic keys in two USB keys (which we recommend you to store in two separate places). These keys allow you (and only you) to recover your SMiD status in case of damage to the device. That’s it. You’re up and automatically encrypting everything you store in the cloud – with no risk of loss, theft, damage or intrusion.
Q: What is the difference between SMiD and a NAS?
Working with SMiD is like working with a NAS, but with SMiD your information is automatically and strongly encrypted and stored in the cloud. It’s like making every cloud your own private cloud. SMiD also covers you against local theft, accidental loss or damage, since no unencrypted files are ever permanently stored locally.
Q: SMiD General terms and conditions?
The document containing the General Terms and Conditions applicable to the purchasing and provision of the corresponding services related to the device called SMID is available here: https://smidcloud.com/en/legal/
2. BUYING AND SHIPPING
Q: What are the shipping costs?
There are additional shipping costs. Shipment does not include extra fees from customs, or additional costs associated with your country. Also, there is no guarantee that this will work in your country (e.g. unknown power & connectivity issues) – there are many hurdles we need to go over until we have a complete picture on the international market. If it turns out that shipment to your country proves impossible, we will reimburse your order.
Q: Why don’t I have to pay some monthly fee?
Our goal is to make cloud storage a viable option for everyone. SMiD Pro is so simple that no maintenance is required. You will have automatic updates and you will be able to use our forum for any question and… enjoy the cloud without risks!
Q: How do I see SMiD on the user side and how can I protect my files? What kind of data can my SMiD process?
SMiD will appear in your computer as a network unit called “SMiD” (you will be able to change this name if you want in the administration panel). To protect your files you only have to drop your files into your SMiD unit.
SMiD can encrypt and store any kind of digital files, wherever you want.
Q: Where is my data stored?
You have total freedom to choose where you keep your data, so you can regularly optimize your cloud usage and costs. SMiD lets you enjoy all the advantages of cloud storage, while simplifying information security tasks and keeping your reputation, credibility and integrity intact. If you prefer not to use cloud storage, you can choose any local or private server as a provider.
Q: Can I share my information through my SMiD?
Absolutely not. Sharing encrypted information with others implies that you send them the cryptographic keys too. SMiD is completely secure, cryptographic material is always inside it. SMiD is exactly like a vault. If you want to share any document, you have to take it out from the vault and then send it.
Q: Does SMiD work if I don’t have internet connection?
Yes. With SMiD you can choose what secured files will be available even when you’re not connected to the internet. Also, you will always be able to work with providers located on your LAN.
Q: Will SMiD work with Android, Windows, Mac?
SMiD works with any type of IT infrastructure or operating system (Windows, Mac OS, Linux, iOS, Android, etc.)
Q: Do I have to install something in my computer?
Nothing at all. SMiD is a dedicated equipment that manages the encryption process. You don’t have to install any client software.
Q: What if I want to access my cloud data when I’m not at home/office?
SMiD only allows local access through the SMB protocol. Of course, you can access your SMiD from outside your LAN through a VPN connection.
We are working to develop an easier to use system without compromising your security that will be implemented soon.
Q: Can I use SMiD Pro with multiple users and/or multiple cloud provider accounts?
Yes, SMiD Pro supports up to 5 users and it can be used from one to unlimited cloud provider accounts.
Q: How does SMiD work if I have more than one storage provider?
If you have more than one storage provider, SMiD Pro will randomly select one of them to store each file. SMiD automatically does this in order to unify the storage space and it is completely transparent for you.
4. RECOVERY OPTIONS – SMID SAFEGUARD
Q: What is the SMiD Safeguard process?
SMiD Safeguard process is crucial. It will allow you to rebuild your SMiD in a new hardware device in the future. It generates a copy of your cryptographic keys and you have to store them in a safe place.
Q: What if someone steals or smashes my SMiD?
Only you can switch on your SMiD with your unique startup key. To others, your SMiD has the same value as a brick. So don’t worry!
You can rebuild your SMiD in order to access your data again. You will need to order a new device and use your USB keys generated in the SMiD Safeguard process to do that.
Q: What if I lose my startup key?
If you performed a SMiD Safeguard process you can recover your files ordering a new SMiD. When you connect your new device, it will ask you if you want to restore a previous SMiD, you will need the two USB generated in the SMiD Safeguard process.
Q: What about backups?
SMiD does a continuous backup and offers fine grain recovery on demand. It is completely automatic and transparent for you.
5. SECURITY AND PRIVACY
Q: What are the main differences with other encryption solutions?
SMiD is a one in a kind product. It is the only one that allows the users to have exclusively under their control: a dedicated device, the auto-generated cryptographic keys and the single startup key. It allows you to turn every cloud into your own private cloud.
Q: Why a device and not software?
SMiD is a hardware device for security reasons. It’s the only reliable option to generate strong cryptographic keys. This also has another additional advantage: You have nothing to install or configure. Extra of simplicity.
Q: Why shouldn’t I trust and use any software with client-side encryption?
One of the main weaknesses of encryption software is that they run among thousands of other applications in the user’s systems and you know… they are easily infected by malware. Using a dedicated device, SMiD ensures it will remain uncompromised. Usually, these software solutions don’t have a strong key generation. They rely on a much weaker private password that needs to be remembered by a human being.
Q: Where are the cryptographic keys located? Where and when are they generated?
Your cryptographic keys are located inside your SMiD, they are generated during setup. There is absolutely no way for us –the makers of SMiD- to have access to your cryptographic keys. In order to rebuild your SMiD in a new hardware device, you have to do the SMiD Safeguard process as soon as your SMiD indicates. It generates a copy of your cryptographic keys in two USB and you have to store them in a safe place. You can do this process more times and you will get more copies of your SMiD to be store in different places.
Q: How strong is the SMiD encryption?
Really strong: Military-grade AES-256 encryption and NIST approved Random Number Generation.
Q: Is the communication between SMiD and the cloud providers secure?
Even though most cloud providers force the use of SSL as a transport security measure, in the exceptional cases where SSL is optional, SMiD forces its use.
Q: Can anybody else see my data?
Absolutely not! The information sent through SMiD to the cloud is fully encrypted. Only your SMiD with the correct credentials will be able to decrypt your data.
Q: Why does the use of SMiD remove local risks?
With SMiD only the files you are working on will be unencrypted. No unencrypted files will be permanently stored. If something happens to your office (fire, earthquake…) or someone steals your computer, or even your SMiD, you will not lose any data and your information will be safe.
Q: Why am I the only one with control over my data?
Encryption and decryption processes are always done inside the secure perimeter of the SMiD device. Nobody will have access to your cryptographic keys but you. In other solutions external encryption/decryption clients are required and they know the keys. This implies that they can access your data now and in the future.
Q: Does SMiD call home?
SMiD only connects to our own smidcloud servers through SSL to check for updates. The information sent is only the SMiD model, version and architecture, but no one will ever see what you store with cloud services, not even us.