2026 Best Software Awards are here!See the list
Stash Global

By Stash Global

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at Stash Global, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.0 out of 5 stars
5 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Stash Global?

It's been two months since this profile received a new review
Leave a Review

Stash Global Reviews & Product Details

Product Avatar Image

Have you used Stash Global before?

Answer a few questions to help the Stash Global community

Stash Global Reviews (3)

Reviews

Stash Global Reviews (3)

4.0
3 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Sneha J.
SJ
Associate Consultant
Mid-Market (51-1000 emp.)
"Stash Global - Advanced Data Protection and cybersecurity"
What do you like best about Stash Global?

Stash global provides protection aganist cyber threats by focusing on data encryption,secure data storage and advanced threat detection.Here are some of the features that I like ,

* Advanced encryption that ensures that the data is safe both at rest and in transit.

* Secure storage which ensures that the data is secured and also is highly available thus ensuring that the data is available when in need.

* Real time threat detection and prevention measures are available making it more secured.

* User- friendly interface which makes it easy for users and to navigate.

* Customer support is commentable, they even provide video tutorials. Review collected by and hosted on G2.com.

What do you dislike about Stash Global?

Some of the points that I think can be improved are,

* It provides a vide range of features, bu for small businesses to access the pricing can be a concern.

* Integration with other third-party applications can be ehnaced.

* To improve the accessibility and usability a mobile application can be developed. Review collected by and hosted on G2.com.

SH
Advertising Manager
Financial Services
Enterprise (> 1000 emp.)
"Leak and regulatory compliance"
What do you like best about Stash Global?

Ironclad data security is another area where Stash Global has pledged to do a great job. This is also good for informing the team of a potential breach as it is in the process of becoming a significant problem. Review collected by and hosted on G2.com.

What do you dislike about Stash Global?

I have found it very difficult to integrate it with my other current Software as a Service or SaaS applications. This is inconvenient for me and negatively impacts my efficiency because it produces data silos between Stash and the other programs I use. Review collected by and hosted on G2.com.

WO
HR Analyst
Government Administration
Mid-Market (51-1000 emp.)
"Audit trails make it easy to track changes"
What do you like best about Stash Global?

Stash Global has been useful especially when it comes to file sharing within the team. The secure platform is very convenient as we are able to transfer a number of files between clients and partners and be assured our documentation is safe. Review collected by and hosted on G2.com.

What do you dislike about Stash Global?

I also finding offline functionality to be not very developed: So, while I am able to download specific documents for usage when offline, it is not ideal for working on multiple projects that reaid upon numerous folders and files. Review collected by and hosted on G2.com.

There are not enough reviews of Stash Global for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Egnyte Logo
Egnyte
4.5
(1,132)
Egnyte delivers the only modern content platform that is purpose-built for businesses. Egnyte gives IT centralized control and protection over their files, and users fast access to their content, no matter how or where work happens.
2
Virtru Email Encryption Logo
Virtru Email Encryption
4.4
(404)
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
3
Kiteworks Logo
Kiteworks
4.4
(143)
The Kiteworks platform prevents data breaches and compliance violations from 3rd party communications. With Kiteworks, CIOs and CISOs gain complete visibility, compliance and control over IP, PII, PHI, and other sensitive content across all 3rd party communication channels, including email, file sharing, mobile, enterprise apps, web portals, SFTP, and MFT. When users click the Kiteworks button, they know it’s the safe, secure way to share sensitive information with the outside world. With on-premise, private cloud, hybrid and FedRAMP deployment options, the Kiteworks platform provides the security and governance CISOs need to protect their organizations, mitigate risk, and adhere to rigorous compliance regulations such as NIST 800-171, HIPAA, SOX, GDPR, GLBA, FISMA, and others.
4
Virtru Secure Share Logo
Virtru Secure Share
4.3
(100)
Virtru Secure Share is an end-to-end encrypted file-sharing solution designed to facilitate secure collaboration by enabling users to share sensitive data externally without compromising security. It allows individuals to maintain control over their shared files, ensuring that only authorized recipients can access the information. This platform is particularly beneficial for organizations that need to collect and exchange confidential data with clients, partners, or colleagues while adhering to strict compliance standards. Key Features and Functionality: - End-to-End Encryption: Ensures that files are encrypted before they are uploaded, providing robust protection against unauthorized access. - Granular Access Controls: Allows file owners to set specific permissions, including the ability to revoke access or set expiration dates for shared files. - Large File Support: Enables the sharing of files up to 15 GB, accommodating large documents, videos, and other sizable data sets. - Seamless Integration: Integrates with platforms like Google Drive and Microsoft OneDrive, allowing users to share files directly from their existing cloud storage without disrupting workflows. - User-Friendly Authentication: Recipients can access shared files without creating new accounts, using existing Google or Microsoft credentials or a one-time email verification. - Compliance Support: Helps organizations meet regulatory requirements such as HIPAA, FERPA, and GDPR by safeguarding sensitive data through encryption and access controls. Primary Value and Problem Solved: Virtru Secure Share addresses the critical need for secure external collaboration by providing a platform where sensitive information can be shared confidently. It mitigates the risks associated with data breaches and unauthorized access, ensuring that organizations can maintain compliance with data protection regulations. By offering user-friendly features like seamless integration with existing cloud services and straightforward recipient authentication, it streamlines the secure sharing process without imposing additional burdens on users. This empowers organizations to collaborate effectively while maintaining strict control over their sensitive data.
5
Satori Data Security Platform Logo
Satori Data Security Platform
4.7
(87)
The Satori Data Security Platform is a highly-available and transparent proxy service that sits in front of your data stores (databases, data warehouses and data lakes).
6
Securiti Logo
Securiti
4.7
(81)
Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls and orchestration across hybrid multicloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance. Securiti has been recognized as Gartner "Cool Vendor in Data Security", Forrester "Privacy Management Wave Leader", and RSA "Most Innovative Startup
7
Varonis Data Security Platform Logo
Varonis Data Security Platform
4.5
(69)
Data Security platform detects insider threats and cyberattacks by analyzing data, account activity, and user behavior; prevents and limits disaster by locking down sensitive and stale data; and efficiently sustains a secure state with automation.
8
Sophos Intercept X Logo
Sophos Intercept X
3.9
(33)
Sophos Intercept X is a comprehensive endpoint security solution designed to protect organizations from a wide range of cyber threats. Utilizing advanced technologies such as deep learning and anti-exploit measures, it effectively detects and prevents both known and unknown malware, ransomware, and zero-day exploits. Managed through the cloud-based Sophos Central platform, Intercept X offers streamlined deployment and management, ensuring robust protection with minimal system impact. Key Features and Functionality: - Deep Learning Technology: Employs advanced machine learning to identify and block new and previously unseen malware without relying on traditional signatures. - Anti-Ransomware with CryptoGuard: Detects and halts malicious encryption processes, automatically restoring affected files to their original state to mitigate ransomware attacks. - Exploit Prevention: Blocks over 60 exploit techniques used by attackers to compromise systems, steal credentials, and distribute malware. - Behavioral Analysis: Monitors system behavior to identify and stop malicious activities, including fileless attacks that operate directly from memory. - Managed Threat Response (MTR): Provides 24/7 threat hunting, detection, and response services delivered by a team of Sophos experts. - Centralized Management: Offers a unified management console via Sophos Central, simplifying policy configuration, reporting, and alert management. Primary Value and User Benefits: Sophos Intercept X delivers a multi-layered defense strategy that addresses the evolving landscape of cyber threats. By integrating deep learning and exploit prevention technologies, it proactively stops attacks before they can cause harm. The inclusion of CryptoGuard ensures that ransomware threats are neutralized, with automatic file restoration minimizing downtime and data loss. The MTR service adds an extra layer of security by providing continuous monitoring and expert intervention when necessary. With its centralized management through Sophos Central, organizations can efficiently oversee their security posture, ensuring comprehensive protection with reduced administrative overhead.
9
Microsoft Purview Information Protection Logo
Microsoft Purview Information Protection
4.4
(32)
Microsoft Purview Information Protection is a comprehensive solution designed to help organizations discover, classify, label, and protect sensitive data across their digital estate. By integrating seamlessly with Microsoft 365 applications and services, it ensures that sensitive information is safeguarded, whether it's stored on-premises, in the cloud, or shared externally. This unified approach enables businesses to maintain compliance with regulatory requirements and protect their critical data assets effectively. Key Features and Functionality: - Built-in Capabilities: Offers native labeling and protection within Microsoft 365 apps and services, facilitating easy adoption without additional installations. - Intelligent Classifiers: Utilizes AI-powered classifiers and exact data match techniques to accurately identify and categorize sensitive information. - Unified Admin Portal: Provides a centralized platform to configure policies, manage data protection strategies, and view analytics across various environments, including on-premises file shares, Microsoft 365 apps, and devices. - Extensible Platform: Extends protection capabilities to popular non-Microsoft applications and services through a Software Development Kit (SDK), ensuring consistent data security across diverse platforms. Primary Value and Solutions Provided: Microsoft Purview Information Protection addresses the critical need for organizations to secure sensitive data amidst evolving regulatory landscapes and increasing data breaches. By automating data discovery and classification, it reduces manual efforts and minimizes human errors. The solution's integration with existing Microsoft 365 environments ensures a seamless user experience, promoting compliance without hindering productivity. Ultimately, it empowers organizations to protect their data proactively, maintain regulatory compliance, and build trust with stakeholders by safeguarding confidential information.
10
Strac Logo
Strac
4.9
(27)
Strac is a 1-stop shop for all things PII (Personally Identifiable Information). Strac is a Data Loss Prevention software that protects businesses from security and compliance risks by a) automatically detecting and redacting sensitive data across all communication channels like email, slack, zendesk, google drive, one drive, intercom, etc. and b) protecting sensitive data on front end apps and backend servers such that sensitive data never touches servers. Integrate with your SaaS apps in minutes, eliminate data leaks and be compliant with PCI, SOC 2, HIPAA, GDPR, CCPA. Strac's accurate machine learning models, real time notifications, unique redaction experience saves employees time and very productive.
Show More

No Discussions for This Product Yet

Be the first to ask a question and get answers from real users and experts.

Start a discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Stash Global