Feeds
80%
Iocell NetDisk 351UNE

Iocell NetDisk

Fast, secure and versatile, apparently

  • alert
  • submit to reddit

The Power of One Brief: Top reasons to choose HP BladeSystem

Review Offered either as a shell or in capacities up to 2TB and designed with small businesses in mind, Iocell Networks utilises Network Direct Attached Storage (NDAS) to pitch its drives above and beyond other comparable single-disk Nas solutions. With claims of ultra-tight security, Raid configurability with multiple drives and blazing fast transfer speeds, can the NetDisk 351UNE really live up to its billing?

Iocell NetDisk 351UNE

Fast and flexible: Iocell's NetDisk 351UNE

Measuring up at 161.3 x 213.5 x 48mm and weighing in at 567.5g the NetDisk is light, but sturdy. The case features some intriguing orange vents and two simple LEDs, one for power, the other for disk activity. It should be noted that there are no fans or heat sinks, so the device does run warm, but not hot by any means. If that makes you a tad nervous, Iocell does offer a two-year warranty as standard in the UK.

The NetDisk features Ethernet, USB and eSata interfacing. The implementations of USB and eSATA are standard, with the exception in that the drive appears to the host as being internally mounted rather than as a removable disk. This feature Iocell refers to as ‘File System Tolerance’. LAN connectivity is another story.

Apparently, security is what the NetDisk is all about. Iocell has implemented a system of hardware unique registration codes, which must be used with the NDAS Device Management software on the host computer in order to access a remote NetDisk on a network. This involves entering a 20-character serial number and a 5-character write key to mount the NetDisk in read/write mode. The registration processes must be completed on each computer requiring access to the drive.

Yet during installation, it appeared that the NetDisk was a bit too secure, as we experienced extreme difficulty accessing the drive. The ensuing frustration eventually led to NetDisk’s dissection and the discovery that the hard drive had shifted during transit due to unsecured mounting screws and simply needed re-seating. At this point, the included screwdriver proved very handy indeed.

Iocell NetDisk 351UNE

Multiple interfacing options plus drivers for Mac, Windows and Linux

In addition to the registration codes, another security feature is that the NetDisk doesn’t require any TCP/IP settings and, according to Iocell, the unit is “invisible and safe from hackers.” Given this locked-down approach to security, the NetDisk does not offer remote access beyond the local network.

Application security programs and practises

More from The Register

next story
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
BEST BATTERY EVER: All lithium, all the time, plus a dash of carbon nano-stuff
We have found the Holy Grail (of batteries) - boffins
Microsoft confirms secret Surface will never see the light of day
Microsoft's form 8-K records decision 'not to ship a new form factor'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.