{"id":40,"date":"2020-02-10T22:38:31","date_gmt":"2020-02-10T22:38:31","guid":{"rendered":"http:\/\/zikzag.wgl-demo.net\/?page_id=40"},"modified":"2021-07-08T05:49:49","modified_gmt":"2021-07-08T05:49:49","slug":"faq","status":"publish","type":"page","link":"https:\/\/stash.global\/faq\/","title":{"rendered":"Frequently Asked Questions"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Looking for more information?\nContact us here<\/a><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Why do I need STASH\u00ae? <\/span><\/i><\/h4>

There are thousands of cyber security options to choose from in an attempt to solve what is the most pervasive and damaging business problem of our time: the compromise of valuable data. On average, large companies are utilizing 156 different tools to try and keep cybercriminals out. Smaller companies 72 tools. A costly, time intensive and for the most part, futile exercise in frustration.<\/p>

The accelerating cost of cybercrime is costing organizations, on average, US$10.0 million annually. Whether managing incidents themselves or spending to recover from the disruption to the business and customers, organizations are investing on an unprecedented scale\u2014 but current spending priorities show that much of this is misdirected toward security capabilities that fail to deliver the greatest efficiency and effectiveness.<\/p>

STASH\u00ae was developed specifically to solve this presumed failure, by directly protecting the most valuable common denominator in the cyber security equation: the content of every kind of file format.<\/span><\/p><\/div><\/div><\/div><\/div>

What products does STASH\u00ae offer? <\/span><\/i><\/h4>

STASH\u00ae Proactive Secure Data Governance<\/em><\/strong>: Data privacy, security, integrity and resilience, on-cloud (private, public, hybrid) or off-cloud (company owned servers) anywhere in the world. Data is secure in-transit, when sharing, and at-rest. STASH\u00ae is data, network, and infrastructure agnostic. Data is always available in real time even if some storage locations are unavailable at any time. Our modular framework and automated implementation is non-disruptive, and works in the background with Keys-on-the-Fly\u00ae \u2013 proprietary technology activated when files are needed then destroyed after use for a trackless digital footprint. Even if breached, the statistical probability of data access is nil. No costly & time intensive integration needed. Simple and autonomous, completely supported, maintained, and upgraded by Stash.<\/p>

Digital Rights Management (DRM):<\/strong><\/em> keeps access permissions in the hands of the authorized administrator \u2013 never the users, so data is protected in whose ever hands it is in, whether inside or outside of the organization, anywhere it is, anywhere it goes. Even if files are accessed by nefarious actors, competitors,
unauthorized entities or individuals, the content is completely private and secure. Not only can the files not be opened, the data inside the file is encrypted, parsed, scattered. The data protection version of the scientific phenomena, double protection<\/a><\/span>.<\/span><\/p>

STASH\u00ae 1-Click Ransomware Recovery<\/em><\/strong>: When your network, infrastructure, and data is held for ransom, the fastest growing and most costly breach of all, the typical reaction is panic. With 1-Click Ransomware Recovery, you will avoid days, weeks, even months of downtime. And the ransom? Forget about it. Simply go to the STASH\u00ae Administrator Dashboard, choose the data you want to restore by version and time, or the entire system and click the button. Your data is out of ransomware clutches, ransomware is foiled and one of the most damaging breach events is just another business problem solved.\u00a0<\/p>

STASH\u00ae Flex: <\/strong><\/em>Know where your data is anywhere in the world in real time. Map-based locational protocols show the exact locations of where your data is, on cloud or off.<\/p>

STASH\u00ae Dash:<\/strong><\/em> Share any kind of unstructured data file, particularly Media & Entertainment files, privately and securely. Choose who can
view, for how long, how many times \u2013 no screenshots, downloads, or copying allowed.<\/p>

STASH\u00ae Hibernate<\/em><\/strong>\u00a0is the right choice for long to very long data protection requirements. It includes all the features of STASH\u00ae Secure Data. Plus, it maintains data in an accessible, readable format ensuring it can be retrieved and is usable now and for 100 years from now no matter how technology changes over time. Hibernate was developed and architected for all\u00a0 industries and especially those such as Financial & Life Sciences that are required to store data for decades.\u00a0<\/p><\/div><\/div>

What is DigitalConfetti\u00ae? <\/span><\/i><\/h4>

DigitalConfetti\u00ae is an array of bits of unstructured data. Our security solution encrypts files using AES 256-bit technology, the strongest available, then parses it into many multiples of small pieces.<\/span><\/p><\/div><\/div>

Do other companies have this technology? <\/span><\/i><\/h4>

No, the STASH\u00ae solution is unique & patented. Our entire focus is on data privacy, security, integrity, and resilience.<\/span><\/p><\/div><\/div>

How does my data become useless to malicious actors? <\/span><\/i><\/h4>

This is a proprietary part of the solution; please contact us for more information.<\/span><\/p><\/div><\/div>

How does STASH\u00ae help with GDPR compliance?<\/span><\/i><\/h4>

Cybercriminals attack valuable data from many different angles. Their motivation is not always theft. In addition, data manipulation, destruction, and ransomware have become formidably adversarial in the last few years and show no sign of abating.<\/span> <\/span> <\/span>GDPR has laid down the gauntlet. Any company anywhere in the world that compromises the personal identifiable information or PII of any European citizen will be subject to fines of as much as 4% of revenue for each occurrence.<\/span> <\/span> <\/span>Hence, only a security solution that actually stays with the data, protecting it even when it is accessed by a malicious actor, will solve this problem.<\/span> <\/span>That\u2019s what STASH\u00ae delivers.<\/span><\/p><\/div><\/div>

What is the \u2018digital footprint\u2019?<\/span><\/i><\/h4>

It means that once the application is signed off, the path to and from your data for that time period of use is erased \u2013 it is as if you were never there. Another layer of security to ensure an attacker doesn\u2019t follow in your footsteps and get closer to your data than is optimum.<\/span><\/p><\/div><\/div>

How do I keep track of where my data is?<\/span><\/i><\/h4>

STASH\u00ae delivers real time viewing of your data at all times, in all the locations it resides.<\/span><\/p><\/div><\/div>

Can I save Database or office automation files?<\/span><\/i><\/h4>

This is an unstructured data security solution \u2013 anything you can create and put in a folder. Audio files, visual files, spreadsheets, documents and the like. There are no restrictions on file types. There is a maximum single file size of 4TB, though you can upload as many 4TB files as you wish.<\/span>

<\/span> <\/span> <\/span>STASH\u00ae protects the data that comprises 80% of business data today, rising to 95% in the next 5 years.<\/span> <\/span> <\/span>

<\/span>STASH\u00ae works with Exchange and Oracle databases \u2013 but only archive or backup copies of the files themselves, which then can be secured and stored. We do not interact with data in databases directly.<\/span><\/p>

For example, if you create an archive or export copy of an Exchange\/Oracle\/Microsoft SQL\/MySQL database, that file can be uploaded and kept private and secure.<\/span><\/p><\/div><\/div>

How do I pay for the service?<\/span><\/i><\/h4>

The fee for the STASH\u00ae services of your choice is paid on a monthly, annual, or multi-year basis.<\/p><\/div><\/div>

Does STASH\u00ae support Data Residency, Sovereignty, and Localization?<\/span><\/i><\/h4>

Yes \u2013 you can choose to have your data stored in a specified country, geographic location, or with specific cloud storage providers, and\/or on specific servers.<\/span><\/p><\/div><\/div>

Do I have to download or run any special software on my PC or MAC?<\/span><\/i><\/h4>

No \u2013 all the transformative routines, AES encryption\/decryption, slicing\/gluing, and the decision- making around storage locations is done on the gateway server.<\/span> <\/span>Entirely web-based; we do not have any end user software requirements other than a standard web browser. The Solution also protects data in environments that are not connected to the Internet. (ask us how)<\/a>.<\/span><\/p><\/div><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t

How does STASH\u00ae ensure that my data is always available? <\/span><\/i><\/h4>

There are at minimum 3 accessible copies of your data available at any given time, saved in DigitalConfetti\u00ae format at the on-cloud storage providers of your choice, or off cloud, on-site in company owned servers. If any location becomes unavailable, one of the other accessible copies will be retrieved from different cloud storage providers or locations.<\/p><\/div><\/div>

Why is this solution secure? <\/span><\/i><\/h4>

Only customers have access to their data through unique patented encryption keys that are destroyed after each use. Keys are not held by STASH\u00ae, and are not saved to networks, files, or infrastructures. <\/span>Data cannot be accessed by anyone, including anyone at STASH\u00ae. Only you (or your authorized parties) can do so. We cannot recreate or replicate your data. STASH\u00ae uses an authentication method that doesn\u2019t rely on complicated schemes, insecure SMS messages, or one-time codes that are easy to socially engineer.<\/span><\/p>


Pieces of data are stored in multiples, in multiple venues. An adversary would have to find all the pieces, put them back together in order, and unencrypt them all to have access \u2013 <\/span>though we never say never, this is a statistical and technological improbability of practically impossible proportion<\/i><\/b>. <\/span>There is NOTHING that makes data more private and secure.<\/i><\/b><\/p><\/div><\/div><\/div><\/div>

Isn\u2019t this just another security product? <\/span><\/i><\/h4>

STASH\u00ae is DSECaaS\u2122 \u2013 Data Security as a Service \u2013 a genuine solution to one of the costliest business problems of all time. Other security vendors sell \u2018tools\u2019 that are used to build fences and walls, and to predict aberrant behavior in order to attempt to defend against or to react after an intrusion. They were not built to protect data. STASH\u00ae works with your existing security infrastructure to protect data at the data byte level. It stays with the data itself wherever it is, wherever it goes. Best of all, STASH\u00ae is automated and cost effective. No expensive integration and training are required, no additional personnel are needed to manage the solution. STASH\u00ae takes care of it all.<\/span><\/p><\/div><\/div>

Is it difficult to implement? <\/span><\/i><\/h4>

No \u2013 we use a web browser-based interface that will be familiar to anyone that has ever saved a file. The difference is your data is a) encrypted and b) then dispersed at the time you save the file. We offer a SAAS version for easy implementation, ready to use in 5 minutes. API and Secure Backup implementations that operate in the background, with no impact on existing work practices, processes, or procedures are additional deployment methods for STASH\u00ae. <\/span><\/p><\/div><\/div><\/div><\/div>

What happens to the data \u2018at rest\u2019? <\/span><\/i><\/h4>

Your files remain encrypted and segmented for the entire time you choose to STASH\u00ae them. A malicious actor or algorithm that breaks into where the data is kept, will only find unrecognizable, unusable DigitalConfetti\u00ae. Only you will be able to access and decrypt your data.<\/span><\/p><\/div><\/div>

Does the data security slow down my sending and receiving of data? <\/span><\/i><\/h4>

There is a small overhead or latency, which equates to <10% of the time taken to currently save and retrieve unsecured data in your environment. It is virtually unnoticeable.<\/span><\/p><\/div><\/div>

Do I have to save my files in a specific data centre? <\/span><\/i><\/h4>
\n

No \u2013 your data can be saved to storage facilities of your choice anywhere in the world, or alternatively, we can install Gateway Servers on your network so your files are encrypted and dispersed within your infrastructure. <\/p>\n

\nCompanies with under 50 employees can sign up here<\/a> and begin to use STASH immediately and transparently.<\/p>\n

All of the features and functions of the solution are included either way. <\/span>\n<\/p>

STASH also writes to online cloud storage providers or local storage devices. Custom integrations are available for more complex requirements.<\/p>\n<\/div><\/div>

How long does data remain private and secure?<\/span><\/i><\/h4>

Data remains protected for as long as you maintain your account with us.<\/span><\/p><\/div><\/div><\/div><\/div>

Can I mandate that my data stay in a specific country? <\/span><\/i><\/h4>

Yes \u2013 you can choose to have your data stored in a specified country, geographic location, or with specific cloud storage providers, and\/or on specific servers.<\/p><\/div><\/div>

How do I keep track of where my data is? <\/span><\/i><\/h4>

STASH\u00ae delivers real time viewing of your data at all times, in all the locations it resides.<\/p><\/div><\/div><\/div><\/div>

What are \u2018Keys-on-the-Fly\u00ae\u2019?<\/span><\/i><\/h4>

When a user initiates the process of encrypting or decrypting files via SaaS, API, or Secure Backup, the file encryption and decryption keys are generated from multiple components when they are needed, and destroyed immediately after use. This means that the keys aren\u2019t sitting somewhere they can be compromised or stolen, unlike most other encryption systems, data storage facilities, or data management firms, even those using high security hardware modules. If STASH\u00ae were directed to access your data, we do not have the means to comply. It\u2019s part of our \u201cyour data is yours, period\u201d promise.<\/span><\/p><\/div><\/div>

Can I use this on my mobile phone or tablet?<\/span><\/i><\/h4>

Yes \u2013 through a mobile browser just like on desktop or laptops.<\/span><\/p><\/div><\/div>

What happens if I stop using STASH\u00ae?<\/span><\/i><\/h4>

No worries. If you ever want to stop using STASH\u00ae, you will have time to access and transfer your data out of protected status, before STASH securely destroys the data.<\/span><\/p><\/div><\/div>

I already use many security tools. Will STASH\u00ae work well with them? <\/span><\/i><\/h4>

STASH\u00ae is a modular solution. If your company or organization prefers to use your own proprietary encryption algorithms, or multi-factor authentication tools, or other legacy configurations, STASH\u00ae will snap on to the existing stack without disrupting it, adding the most impactful and important piece: data privacy, security, resilience, and integrity you can count on. The genius of STASH\u00ae is that it was developed to replace hundreds of other tools, or work seamlessly with any configuration of existing tools - it\u2019s your choice.<\/p><\/div><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"

Looking for more information? Contact us here Why do I need STASH\u00ae? There are thousands of cyber security options to choose from in an attempt to solve what is the most pervasive and damaging business problem of our time: the compromise of valuable data. On average, large companies are utilizing 156 different tools to try […]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"nf_dc_page":"","footnotes":""},"_links":{"self":[{"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/pages\/40"}],"collection":[{"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/comments?post=40"}],"version-history":[{"count":0,"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/pages\/40\/revisions"}],"wp:attachment":[{"href":"https:\/\/stash.global\/wp-json\/wp\/v2\/media?parent=40"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}