Introducing G2.ai, the future of software buying.Try now
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at StratoKey, reclaim access to make changes.
Tonic.ai
Sponsored
Tonic.ai
Visit Website
Product Avatar Image
StratoKey

By StratoKey

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at StratoKey, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.2 out of 5 stars
4 star
0%
2 star
0%
1 star
0%

How would you rate your experience with StratoKey?

Tonic.ai
Sponsored
Tonic.ai
Visit Website
It's been two months since this profile received a new review
Leave a Review

StratoKey Reviews & Product Details

Product Avatar Image

Have you used StratoKey before?

Answer a few questions to help the StratoKey community

StratoKey Reviews (3)

Reviews

StratoKey Reviews (3)

4.2
3 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
YL
Software Engineer
Mid-Market (51-1000 emp.)
"StratoKey- A Cloud security platform"
What do you like best about StratoKey?

Stratokey is a security and data de-identification platform that recognizes security concerns from the employees’ use of cloud apps and channels them to self-remediate, eventually freeing up the security department. The best part about StratoKey is its features like encryption & monitoring that repeatedly block illegal access to sensitive data. Review collected by and hosted on G2.com.

What do you dislike about StratoKey?

StratoKey is easy to use and works exactly how it should. I have no dislikes to mention. Review collected by and hosted on G2.com.

JP
Real Estate
Mid-Market (51-1000 emp.)
"A Robust cloud security and compliance solution"
What do you like best about StratoKey?

As a user of cloud and SaaS applications, I am concerned about the security and compliance of my data. StratoKey CASB gives me peace of mind by providing encryption, monitoring, and defense capabilities. StratoKey CASB enables me to abide by laws like HIPAA, GDPR, ITAR, CMMC, SOX, and NIST. Review collected by and hosted on G2.com.

What do you dislike about StratoKey?

The user interface that could be improved. The platform is feature-rich, but it take some time to get accustomed to the layout and navigation. Review collected by and hosted on G2.com.

Nico P.
NP
Founder
Small-Business (50 or fewer emp.)
"Solid SaaS Application Encryption Service"
What do you like best about StratoKey?

My team liked StratoKey's ability to implement HIPAA compliant encryption Review collected by and hosted on G2.com.

What do you dislike about StratoKey?

We wished they had a "low code" option for non developers Review collected by and hosted on G2.com.

There are not enough reviews of StratoKey for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Check Point Harmony Email & Collaboration Logo
Check Point Harmony Email & Collaboration
4.6
(512)
Check Point Harmony Email & Office, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.
2
Check Point Harmony SASE Logo
Check Point Harmony SASE
4.5
(195)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
3
Symantec Web Security Service Logo
Symantec Web Security Service
4.4
(120)
Symantec Web Security is a cloud based software that helps protect organization from compromised websites and malicious downloads and allows user to control, monitor and enforce Acceptable Use Policies for organizations users, whether on-premises or away from the office.
4
Forcepoint Data Security Cloud Logo
Forcepoint Data Security Cloud
4.2
(103)
Forcepoint Data Security Cloud is a unified cloud security platform that enables Zero Trust access to the web, SaaS and private applications with best-in-class data security and malware protection while delivering a great user experience. Gain the full visibility and control over web and application usage to mitigate digital risks and give your organization more freedom and flexibility. Key product capabilities include: • Visibility into web, SaaS and private application use • Distributed enforcement – endpoint enforcement, cloud enforcement via in-line proxy & API, and on-prem enforcement • Industry-leading data and threat protection capabilities to secure data everywhere, for people working anywhere • Seamless user experience from any location and any device "
5
Cloudflare SSE & SASE Platform Logo
Cloudflare SSE & SASE Platform
4.6
(103)
Cloudflare Area 1 Security identifies and prevents advanced socially engineered attacks before they impact your enterprise.
6
Privacy1 Logo
Privacy1
4.4
(91)
Privacy1's Zero Trust Data Protection solution offers a comprehensive approach to safeguarding personal data by applying privacy-aware security directly to the data assets. This method shifts the focus from traditional perimeter defenses to a data-centric strategy, ensuring that sensitive information remains protected regardless of its location within the system. By encrypting data and implementing purpose-specific access controls, Privacy1 enables organizations to manage data access based on legal purposes, approved systems, and authorized personnel. This approach not only enhances data security but also ensures compliance with privacy regulations and builds trust with customers. Key Features and Functionality: - Consistent Protection: Maintains a uniform level of data security as information moves across various systems, regardless of differing perimeter security measures. - Purpose Control: Allows access to sensitive personal data solely for specific legal purposes, ensuring that data usage aligns with organizational policies and regulatory requirements. - Privacy Awareness: Integrates privacy considerations into data protection, enabling control over data usage across the organization from a legal standpoint. - Data Encryption: Ensures that data is encrypted, making it accessible only to legitimate systems and users for authorized purposes, both at rest and during transit. - Automated Privacy Rights Management: Facilitates the automation of data subject rights requests, such as access, erasure, and consent management, reducing manual overhead and enhancing compliance. Primary Value and Problem Solved: Privacy1's Zero Trust Data Protection addresses the critical challenge of data breaches and unauthorized access by implementing a data-centric security model. By encrypting data and enforcing purpose-specific access controls, it ensures that even if perimeter defenses are compromised, the data remains unreadable and secure. This solution not only mitigates the risk of data misuse but also simplifies compliance with privacy regulations, reduces operational costs associated with manual data protection processes, and enhances customer trust by demonstrating a commitment to data privacy and security.
7
Cato SASE Cloud Logo
Cato SASE Cloud
4.5
(82)
Cato SASE Cloud delivers a global SD-WAN with built-in network security stack for all enterprise locations, cloud resources and mobile users
8
Prisma Access Logo
Prisma Access
4.3
(73)
Secure access service edge (SASE) for branch offices, retail locations and mobile users
9
Citrix Secure Private Access Logo
Citrix Secure Private Access
4.5
(69)
Citrix Secure Workspace Access provides a comprehensive, zero-trust approach to deliver secure and contextual access to the corporate internal web apps, SaaS, and virtual applications. It enables the consolidation of traditional security products like VPN, single sign-on, and browser isolation technologies and provides advanced security controls for managed, unmanaged, and BYO devices. Citrix Secure Workspace Access provides a holistic security approach based on zero-trust principles, protecting users, applications, and corporate data against internet web threats and data exfiltration.
10
Netskope One Platform Logo
Netskope One Platform
4.4
(66)
Netskope is a Cloud Access Security Broker (CASB)
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
StratoKey
View Alternatives