The Cipher RAID Tower is a perfect solution for application that requires reliable storage with redundancy and also the best data security protection. Built on the Addonics field proven Storage Tower and hardware encryption solution (CipherChain, Diamond Cipher and Ruby Cipher) , the family of Cipher RAID Towers is designed to provide superior performance and bullet proof AES 256-bit full disk hardware encryption at less than half of the price of similar products in the market. Not only the data is highly secured by the strong AES 256-bit encryption, the Cipher RAID Tower is simple to use and easy to deploy. There is no software to install or special training required. The FIPS certified hardware crypto engine integrated inside the Cipher RAID Tower ensures the maximum performance of the RAID system. Other than the inestion of the encryption keys during the initial power up, the Cipher RAID Tower operates and performs just the same as an ordinary RAID system.
The Cipher RAID Tower comes with everything you need other than the hard drive. Designed for easy addition and removal of hard drives, you can add your choice of hard drive in any capacity. Depending on the model, the drives can be configured as RAID 0, 10 or 5. The data written to the RAID set will all be encrypted on the fly, securing all your data from unauthorized access should any drive in the RAID system is stolen. The Cipher RAID Tower can be used with any computing platform and is totally independent of any Operating System. The Cipher RAID Tower can also connected to the new Superspeed USB 3.0 port with an optional USB 3.0 - eSATA adapter.
Addonics Cipher RAID Tower comes in choice of two encryption architectures - Drive Level Encryption (DLE) and RAID Level Encryption (RVE). The DLE approach deploys one crypto engine per drive in the RAID set. It ensures maximum RAID performance but at a higher cost. Also the operation of the Cipher RAID Tower requires one Cipher key for each drive in the RAID group. RVE encrypts all the drives in the RAID volume with a single crypto engine. This approach costs less than the DLE approach. Performance of the RAID is limited to the maximum throughput of the crypto engine of 150 MB/sec. Operation is simpler as only one encryption key is required to activate the RAID when it is first powered on.
Below is a summary of the PROs and CONs for the two RAID architectures:
|encryption architecture||one crypto engine per drive||one crypto engine per RAID set|
|Performance||maximum 300 MB/sec depending on the speed of the SATA port||Maximum 150 MB/sec|
|Operation||requires multiple Cipher keys depending on the # of drives in the RAID set||one Cipher key to activate the Cipher RAID Tower|
|level of security||AES 256-bit full disk encryption, each drive can be encrypted with different cipher key code||AES 256-bit full disk encryption. Each drive uses the same Cipher key code|
|recommended applications||Video editing, high performance computing that require sustained throughput over 150 MB/sec||General office server application, file back up, database, web server, email server, video server and others|
RVE encrypts all the drives in the RAID volume with a single crypto engine. This approach costs less than the DLE approach. Performance of the RAID is limited to the maximum throughput of the crypto engine of 150 MB/sec. Operation is simpler as only one encryption key is required to activate the RAID when it is first powered on.