How It Works
Set up is quick and easy

Just 3 steps

The super-easy three steps set up of SMiD

Fast and easy

1. Connect your SMiD

Insert your startup key into SMiD and connect it to your local network.

2. Add your providers

Type “smid” in your web browser and follow the wizard to set up user accounts and cloud providers*.

3. Save your settings

Perform a SMiD Safeguard to be able to regenerate your SMiD in the case of damage to the device.

* We currently support DropBox, Amazon S3, Google Drive, Box, Microsoft Azure, FTP, WebDAV and we’re working hard to include even more!

That’s it.

You’re up and automatically encrypting and protecting everything you store in the cloud – with no risk of data loss, theft, damage or intrusion.

With any device

Monitoring and administration

Simple | Flexible | Secure

Stay in control of your data

Simple

Small, lightweight plug and play device

No client software installation or maintenance required

Zero friction – nothing to configure

Compatible with any infrastructure or IT environment

Connects right to LAN with RJ45 Ethernet cable

Web-based account administration

Flexible

Protect your data anywhere in the world

Works with all major cloud storage providers

Microsoft SMB/CIFS file transfer protocol

Active Directory compatible

Deduplicated files for optimized bandwidth and file integrity

Secure

AES 256-bit encryption protects your files 24/7

Strongest, certified cryptographic device-generated keys

Security is not dependent upon passwords or key phrases generated by users

Unique startup key required to activate your SMiD

No unencrypted files stored locally

Meets stringent international data protection and privacy laws

Integrity checks using SHA-256 hash function

Absolute peace of mind

For every single one of us

q

Robust Cloud Encryption

AES 256-bit encryption is immediate, automatic and round the clock. No cleartext copies ever stored permanently. You set timers to control how long local files stay unencrypted. You decide when you want them to disappear.

~

Strongest Access Protection

No other solution safeguards your data with long, internally-generated, random cryptographic keys and is bootable only with a unique startup key – that’s in your hands only. No amount of external guesswork can crack your SMiD.

i

Legal Compliance

SMiD complies with the most stringent privacy regulations in all sectors. Even the most sensitive data – legal files, confidential communications, patient profiles – is 100% protected with SMiD encryption and free of penalty risk.

1

Provider Independence

SMiD is not provider-bound. It gives you complete freedom to select the best combination of cloud providers for your business or personal information security needs.

Easy Setup - No Installation

SMiD is a plug and play data protection device. No client software installation is required. It’s as simple as working with a network-attached storage (NAS) server, but with vastly more advantages.

Data Loss Prevention

SMiD also eliminates any local risk of unwanted access, theft, loss or disaster, since there are no files stored locally.

Any System. Any Infrastructure.

Works with any type of IT infrastructure or operating system (Windows, Mac OS, Linux, iOS, Android).

Flexible Cost Savings

Switch providers as often as you like. Benefit from the lowest cloud storage prices available while optimizing storage space.

Get your
SMiD device now!

Share This