Product Support

Product Support Documentation


diskAshur2 Datasheet
diskAshur2 Quick Start Guide
diskAshur2 User Manual

diskAshur2 SSD

diskAshur2 SSD Datasheet
diskAshur2 SSD Quick Start Guide
diskAshur2 SSD User Manual

diskAshur PRO2

diskAshur PRO2 Datasheet
diskAshur PRO2 Quick Start Guide
diskAshur PRO2 User Manual

diskAshur PRO2 SSD

diskAshur PRO2 SSD Datasheet
diskAshur PRO2 SSD Quick Start Guide
diskAshur PRO2 SSD User Manual

diskAshur DT2

diskAshur DT2 Datasheet
diskAshur DT2 Quick Start Guide
diskAshur DT2 User Manual

datAshur Personal2

datashur Personal2 Datasheet
datAshur Personal2 Quick Start Guide
datashur Personal2 User Manual

datAshur PRO

datashur PRO Datasheet
datAshur Pro Quick Start Guide
datashur PRO User Manual

datAshur SSD

datashur SSD Datasheet
datAshur SSD Quick Start Guide
datashur SSD User Manual


datashur Datasheet
datAshur Quick Start Guide
datashur User Manual

datAshur Video tutorials

datAshur Personal

datashur Personal Datasheet
datAshur Personal Quick Start Guide
datashur Personal User Manual

diskAshur Pro

 diskAshur Pro Datasheet
diskAshur Pro Quick Start Guide
 diskAshur Pro User Manual

diskAshur Pro SSD

 diskAshur Pro SSD Datasheet
diskAshur Pro SSD Quick Start Guide
 diskAshur Pro SSD User Manual


 diskAshur Datasheet
diskAshur Quick Start Guide
 diskAshur User Manual

diskAshur SSD

 diskAshur SSD Datasheet
diskAshur SSD Quick Start Guide
 diskAshur SSD User Manual

diskAshur DT

diskAshurDT Datasheet
diskAshurDT Quick Start Guide
diskAshurDT User Manual


Contact us

For more information or if you have any queries regarding our products please contact our team.

DatAshur Review Video


Did you know...

Protecting itself against hacker attempts, the on-board secure microprocessor employs physical protection mechanisms to protect itself from any external tamper, bypass laser attacks and fault injections and incorporates active-shield violation technology.


Latest Case Study

Plymouth Hospitals NHS Trust

Jason Scott, ICT Security Coordinator

"Patient confidentiality is of upmost importance to us and the iStorage range is a crucial part of our security strategy."