Ratings and Reviews 9 Ratings

Total
ease
features
design
support

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Proton Drive Reviews & Ratings
    3,602 Ratings
    Company Website
  • Files.com Reviews & Ratings
    278 Ratings
    Company Website
  • Air Reviews & Ratings
    735 Ratings
    Company Website
  • LogicalDOC Reviews & Ratings
    121 Ratings
    Company Website
  • QuantaStor Reviews & Ratings
    6 Ratings
    Company Website
  • Proton Mail Reviews & Ratings
    108,627 Ratings
    Company Website
  • CLEAR Reviews & Ratings
    1 Rating
    Company Website
  • DriveStrike Reviews & Ratings
    23 Ratings
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    2,088 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website

What is Tresorit?

Tresorit offers a highly secure solution for file sharing and synchronization, enabling users to store, sync, and share their documents from any location at any time. Utilizing end-to-end encryption, Tresorit safeguards your files against potential threats from hackers and internal data breaches. All information is stored in compliance with GDPR regulations within Microsoft Azure Data Centers located in Europe. Users have the ability to control who can edit, add, or view the files they share, and can securely access updated documents through their web browser, desktop, or mobile device. Additionally, files can be shared securely beyond your organization, allowing for a safer alternative to sending unsecured email attachments. With end-to-end encryption, your files remain encrypted until they reach the intended recipient, ensuring that only you and the recipient have access. To facilitate collaboration with external partners, Tresorit provides Content Shield features that further protect your business assets. For more information on these features, visit the Tresorit website. This robust approach not only enhances security but also fosters a collaborative environment while maintaining data integrity.

What is BestCrypt?

The frequency of serious data breaches is surging at an alarming rate, leading to the unauthorized exposure, loss, and theft of sensitive personal information. To effectively shield your data from both digital and physical risks, it is crucial to incorporate data encryption into your security measures. A robust information security strategy will fall short if it does not guarantee the protection of data from the moment it is stored. By utilizing data encryption, the privacy of sensitive information can be maintained, significantly reducing the risks of data leaks and theft, while also satisfying compliance obligations. BestCrypt volume encryption 5 significantly bolsters defenses against brute-force attacks, which are among the simplest yet most effective tactics employed by hackers to compromise systems. Users are now empowered to customize the parameters of the scrypt key derivation algorithm, offering enhanced protection against password-iterating threats. Additionally, our cutting-edge tool, Data Shelter, provides yet another crucial layer of security for data-in-use, ensuring that files remain protected during both viewing and editing activities. This comprehensive strategy for data protection is essential in navigating the increasingly precarious digital environment we face today, where the stakes have never been higher. As cyber threats evolve, the importance of multi-layered security measures cannot be overstated.

Media

Media

Integrations Supported

Active Directory
Dropbox
Microsoft Outlook

Integrations Supported

Active Directory
Dropbox
Microsoft Outlook

API Availability

Has API

API Availability

Has API

Pricing Information

$10.42/month
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Tresorit

Date Founded

2011

Company Location

Hungary

Company Website

tresorit.com

Company Facts

Organization Name

Jetico

Date Founded

1995

Company Location

Finland

Company Website

www.jetico.com/data-encryption

Categories and Features

Cloud Storage

Access Control
Archiving & Retention
Backup
Data Migration
Data Synchronization
Encryption
File Sharing
Version Control

Collaboration

Brainstorming
Calendar Management
Chat / Messaging
Contact Management
Content Management
Document Management
Project Management
Real Time Editing
Task Management
Version Control
Video Conferencing

Content Collaboration

Client Portal
Cloud Storage
Digital Asset Management
Document Creation / Editing
Document Management
Electronic Signature
Feedback Management
File Sharing
Messaging / Discussion
Real-Time / Interactive Editing
Roles / Permissions
Search
Version Control
Video / Image Editing
Workflow / Approval Process

Document Management

Access Controls
Archiving & Retention
Collaboration Tools
Compliance Tracking
Document Archiving
Document Assembly
Document Capture
Document Conversion
Document Delivery
Document Indexing
Document Retention
Electronic Signature
Email Management
File Recovery
File Type Conversion
Forms Management
Full Text Search
Offline Access
Optical Character Recognition
Print Management
Version Control

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

File Sharing

Audit Trail
Chat / Messaging
Collaboration
Document Management
Drag & Drop
Electronic Signature
Encryption
File Synchronization
Search
User Management
Version Control
Workflow Management

Categories and Features

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Popular Alternatives

Proton Drive Reviews & Ratings

Proton Drive

Proton AG

Popular Alternatives

CLEAR Reviews & Ratings

CLEAR

Quantum Knight
GhostVolt Reviews & Ratings

GhostVolt

GhostVolt Ltd
AcceleWeb Files Reviews & Ratings

AcceleWeb Files

AcceleWeb
Proton Mail Reviews & Ratings

Proton Mail

Proton AG