2026 Best Software Awards are here!See the list
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at Dasera, reclaim access to make changes.
Dasera

By Dasera

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at Dasera, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.5 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Dasera?

It's been two months since this profile received a new review
Leave a Review

Dasera Reviews & Product Details

Dasera Media

Dasera Demo - Single CONTROL PLANE for cloud & on-prem data, structured & unstructured
Dasera Demo - Automated DISCOVERY of data stores
Dasera Demo - Out-of-box Classification with Tagging for compliance, sensitivity, classifier confidence & usage frequency
Product Avatar Image

Have you used Dasera before?

Answer a few questions to help the Dasera community

Dasera Reviews (1)

Reviews

Dasera Reviews (1)

4.5
1 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Paul R.
PR
Data Analyst at MarketingSecom
Market Research
Mid-Market (51-1000 emp.)
"A great cybersecurity tool"
What do you like best about Dasera?

What I like about this tool is its ability to automate data policies and maintain data securely. It also works as an excellent barrier against unauthorized access so that professionals can control their security system at all times, the The tool is much more recommended for those who already work with this type of system, but in terms of efficiency and integration the tool works well. Review collected by and hosted on G2.com.

What do you dislike about Dasera?

It is a somewhat complicated tool for those who have not worked with this type of systems, but for those who already know a risk control tool, it can be quite complete and functional. Review collected by and hosted on G2.com.

There are not enough reviews of Dasera for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Egnyte Logo
Egnyte
4.5
(1,131)
Egnyte delivers the only modern content platform that is purpose-built for businesses. Egnyte gives IT centralized control and protection over their files, and users fast access to their content, no matter how or where work happens.
2
Virtru Email Encryption Logo
Virtru Email Encryption
4.4
(402)
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
3
Kiteworks Logo
Kiteworks
4.4
(144)
The Kiteworks platform prevents data breaches and compliance violations from 3rd party communications. With Kiteworks, CIOs and CISOs gain complete visibility, compliance and control over IP, PII, PHI, and other sensitive content across all 3rd party communication channels, including email, file sharing, mobile, enterprise apps, web portals, SFTP, and MFT. When users click the Kiteworks button, they know it’s the safe, secure way to share sensitive information with the outside world. With on-premise, private cloud, hybrid and FedRAMP deployment options, the Kiteworks platform provides the security and governance CISOs need to protect their organizations, mitigate risk, and adhere to rigorous compliance regulations such as NIST 800-171, HIPAA, SOX, GDPR, GLBA, FISMA, and others.
4
Virtru Secure Share Logo
Virtru Secure Share
4.3
(100)
Virtru Secure Share is an end-to-end encrypted file-sharing solution designed to facilitate secure collaboration by enabling users to share sensitive data externally without compromising security. It allows individuals to maintain control over their shared files, ensuring that only authorized recipients can access the information. This platform is particularly beneficial for organizations that need to collect and exchange confidential data with clients, partners, or colleagues while adhering to strict compliance standards. Key Features and Functionality: - End-to-End Encryption: Ensures that files are encrypted before they are uploaded, providing robust protection against unauthorized access. - Granular Access Controls: Allows file owners to set specific permissions, including the ability to revoke access or set expiration dates for shared files. - Large File Support: Enables the sharing of files up to 15 GB, accommodating large documents, videos, and other sizable data sets. - Seamless Integration: Integrates with platforms like Google Drive and Microsoft OneDrive, allowing users to share files directly from their existing cloud storage without disrupting workflows. - User-Friendly Authentication: Recipients can access shared files without creating new accounts, using existing Google or Microsoft credentials or a one-time email verification. - Compliance Support: Helps organizations meet regulatory requirements such as HIPAA, FERPA, and GDPR by safeguarding sensitive data through encryption and access controls. Primary Value and Problem Solved: Virtru Secure Share addresses the critical need for secure external collaboration by providing a platform where sensitive information can be shared confidently. It mitigates the risks associated with data breaches and unauthorized access, ensuring that organizations can maintain compliance with data protection regulations. By offering user-friendly features like seamless integration with existing cloud services and straightforward recipient authentication, it streamlines the secure sharing process without imposing additional burdens on users. This empowers organizations to collaborate effectively while maintaining strict control over their sensitive data.
5
Satori Data Security Platform Logo
Satori Data Security Platform
4.7
(87)
The Satori Data Security Platform is a highly-available and transparent proxy service that sits in front of your data stores (databases, data warehouses and data lakes).
6
Securiti Logo
Securiti
4.7
(81)
Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls and orchestration across hybrid multicloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance. Securiti has been recognized as Gartner "Cool Vendor in Data Security", Forrester "Privacy Management Wave Leader", and RSA "Most Innovative Startup
7
Varonis Data Security Platform Logo
Varonis Data Security Platform
4.5
(69)
Data Security platform detects insider threats and cyberattacks by analyzing data, account activity, and user behavior; prevents and limits disaster by locking down sensitive and stale data; and efficiently sustains a secure state with automation.
8
Sophos Intercept X Logo
Sophos Intercept X
3.9
(33)
Sophos Intercept X is a comprehensive endpoint security solution designed to protect organizations from a wide range of cyber threats. Utilizing advanced technologies such as deep learning and anti-exploit measures, it effectively detects and prevents both known and unknown malware, ransomware, and zero-day exploits. Managed through the cloud-based Sophos Central platform, Intercept X offers streamlined deployment and management, ensuring robust protection with minimal system impact. Key Features and Functionality: - Deep Learning Technology: Employs advanced machine learning to identify and block new and previously unseen malware without relying on traditional signatures. - Anti-Ransomware with CryptoGuard: Detects and halts malicious encryption processes, automatically restoring affected files to their original state to mitigate ransomware attacks. - Exploit Prevention: Blocks over 60 exploit techniques used by attackers to compromise systems, steal credentials, and distribute malware. - Behavioral Analysis: Monitors system behavior to identify and stop malicious activities, including fileless attacks that operate directly from memory. - Managed Threat Response (MTR): Provides 24/7 threat hunting, detection, and response services delivered by a team of Sophos experts. - Centralized Management: Offers a unified management console via Sophos Central, simplifying policy configuration, reporting, and alert management. Primary Value and User Benefits: Sophos Intercept X delivers a multi-layered defense strategy that addresses the evolving landscape of cyber threats. By integrating deep learning and exploit prevention technologies, it proactively stops attacks before they can cause harm. The inclusion of CryptoGuard ensures that ransomware threats are neutralized, with automatic file restoration minimizing downtime and data loss. The MTR service adds an extra layer of security by providing continuous monitoring and expert intervention when necessary. With its centralized management through Sophos Central, organizations can efficiently oversee their security posture, ensuring comprehensive protection with reduced administrative overhead.
9
Microsoft Purview Information Protection Logo
Microsoft Purview Information Protection
4.4
(32)
Microsoft Purview Information Protection is a comprehensive solution designed to help organizations discover, classify, label, and protect sensitive data across their digital estate. By integrating seamlessly with Microsoft 365 applications and services, it ensures that sensitive information is safeguarded, whether it's stored on-premises, in the cloud, or shared externally. This unified approach enables businesses to maintain compliance with regulatory requirements and protect their critical data assets effectively. Key Features and Functionality: - Built-in Capabilities: Offers native labeling and protection within Microsoft 365 apps and services, facilitating easy adoption without additional installations. - Intelligent Classifiers: Utilizes AI-powered classifiers and exact data match techniques to accurately identify and categorize sensitive information. - Unified Admin Portal: Provides a centralized platform to configure policies, manage data protection strategies, and view analytics across various environments, including on-premises file shares, Microsoft 365 apps, and devices. - Extensible Platform: Extends protection capabilities to popular non-Microsoft applications and services through a Software Development Kit (SDK), ensuring consistent data security across diverse platforms. Primary Value and Solutions Provided: Microsoft Purview Information Protection addresses the critical need for organizations to secure sensitive data amidst evolving regulatory landscapes and increasing data breaches. By automating data discovery and classification, it reduces manual efforts and minimizes human errors. The solution's integration with existing Microsoft 365 environments ensures a seamless user experience, promoting compliance without hindering productivity. Ultimately, it empowers organizations to protect their data proactively, maintain regulatory compliance, and build trust with stakeholders by safeguarding confidential information.
10
Cyera Logo
Cyera
4.5
(22)
Cyera is the world’s leading AI-native data security platform. Its platform gives organizations a complete view of where their data lives, how it’s used, and how to keep it safe, so they can reduce risk and unlock the full value of their data, wherever it is. Backed by more than $1.3 billion in funding from top-tier investors including Accel, Coatue, Cyberstarts, Georgian, Lightspeed, and Sequoia, Cyera’s unified data security platform helps businesses discover, secure, and leverage their most valuable asset - data - and eliminate blind spots, cut alert noise, and protect sensitive information across the cloud, SaaS, databases, AI ecosystems, and on-premise environments. Recent innovations like Cyera’s Omni DLP extend this platform with adaptive, AI-native data loss protection, bringing real-time intelligence and contextual understanding to how data moves and is used across the enterprise.
Show More

No Discussions for This Product Yet

Be the first to ask a question and get answers from real users and experts.

Start a discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.