- Install up to five 3.5" SATA hard drives of any capacity (drives not included)
- Connect to system via eSATA port (connecting cable included)
- Drive level Encryption (DLE), one cipher key per drive
- AES 256-bit hardware encryption
- Built-in RAID accelerator for high performance
- Drives are installed onto drive enclosures that can be added or removed like tape cartridge from each drive bay
- Drives can be configured as RAID0 (Striping), RAID1 (Mirroring), RAID5 (Parity), RAID10 (Mirrored Striped)
- JBOD* (Concatenation), Clone Mode (N-Way Mirror) using built-in hardware RAID
- OS independent, can be used on any system when all drives are configured as a single RAID volume
- For Windows operating systems, configure RAID using RAID diagnostic software utility
- For Linux and Mac operating systems, configure RAID using onboard jumpers
- Optional USB 3.0 / 2.0 connection using USB 3.0 to eSATA adapter (ADU3ESA)
Components list made up this model:
Storage Tower V (ST5), 5X1 HPM-XA Enclosure Version (AD5HPMRXA-E), 5 units Diamond Cipher Drive Cartridge System with AES 256-bit encryption (DCDCS256S), 5 pairs of AES 256-bit Cipher keys (AAENKEY256-2), 3 feet eSATA cable (AAESATA100C)
Note: As a standard set up, all cipher keys are coded the same.
The Cipher RAID Tower is a perfect solution for application that requires reliable storage with redundancy and also the best data security protection. Build on the Addonics field proven Storage Tower and hardware encryption solution - CipherChain, Diamond Cipher and Ruby Cipher , the family of Cipher RAID Towers are designed to provide superior performance and bullet proof AES 256-bit full disk hardware encryption at less than half of the price of similar products in the market. Not only the data is highly secured by the strong AES 256-bit encryption, the Cipher RAID Tower is simple to use and easy to deploy. There is no software to install or special training required. The FIPS certified hardware crypto engine integrated inside the Cipher RAID Tower and the unique dual drive encryptions ensures maximum performance of the RAID system. The Cipher RAID Tower will out performs any similarly equipped RAID encryption solution available in the market. Other than the insertion of the encryption keys during the initial power up of the Cipher RAID Tower, it operates and performs just the same as an ordinary RAID system.
Similar to the RAID Tower, the Cipher RAID Tower comes with everything you need other than the hard drive. Designed for easy addition and removal of hard drives, you can add your choice of hard drive in any capacity. Depending on the model, the drives can be configured as RAID 0, 10 or 5. The data written to the RAID set will all be encrypted on the fly, securing all your data from unauthorized access should your RAID system been stolen. The The Cipher RAID Tower can be used with any computing platform and is totally independent of any Operating System. Comes standard with eSATA interface that supports up to the latest SATA III 6Gbps, the Cipher RAID Tower can also connected to the new Superspeed USB 3.0 port with an optional USB 3.0 - eSATA adapter.
Addonics RAID encryption architecture
Depending on the Cipher RAID Tower model, Addonics RAID encryption are implemented in one of the following two different architectures - Drive Level Encryption (DLE) and RAID Volume Encryption (RVE). Both DLE and RVE offers strong AES 256-bit encryption but at a different price performance.
Drive Level Encryption (DLE)
The DLV approach deploys one crypto engine per drive in the RAID set. It ensures maximum RAID performance but at a higher cost. Also the operation of the Cipher RAID Tower requires one Cipher key for each drive in the RAID group.
Below is a summary of the PROs and CONs for the two RAID architectures:
|
DLE
|
encryption architecture |
one crypto engine per drive |
Performance |
maximum 300 MB/sec depending on the speed of the SATA port |
Cost |
higher |
Operation |
requires multiple Cipher keys depending on the # of drives in the RAID set |
level of security |
AES 256-bit full disk encryption, each drive can be encrypted with different cipher key code |
recommended applications |
Video editing, high performance computing that require sustained throughput over 150 MB/sec |