Ratings and Reviews 9 Ratings

Total
ease
features
design
support

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Proton Drive Reviews & Ratings
    3,602 Ratings
    Company Website
  • Files.com Reviews & Ratings
    330 Ratings
    Company Website
  • pCloud Business Reviews & Ratings
    183 Ratings
    Company Website
  • Diplomat Managed File Transfer Reviews & Ratings
    47 Ratings
    Company Website
  • MOVEit Reviews & Ratings
    622 Ratings
    Company Website
  • LogicalDOC Reviews & Ratings
    143 Ratings
    Company Website
  • Proton Mail Reviews & Ratings
    108,630 Ratings
    Company Website
  • Globalscape Enhanced File Transfer (EFT) Reviews & Ratings
    95 Ratings
    Company Website
  • Proton Pass Reviews & Ratings
    31,996 Ratings
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    2,305 Ratings
    Company Website

What is Tresorit?

Tresorit is a zero‑knowledge, end‑to‑end encrypted cloud collaboration platform built for organizations and individuals who need maximum control over sensitive data. It enables secure file storage, synchronization, and sharing while ensuring that only the data owner and explicitly authorized users can access content. Files are encrypted on the user’s device before upload, and encryption keys are never accessible to Tresorit, protecting data from internal access, breaches, and unauthorized disclosure. The platform supports secure internal collaboration through encrypted folders and workspaces with granular permission controls. Teams can define who may view, edit, or manage files, revoke access at any time, and track activity to maintain visibility and accountability. Tresorit also enables secure external sharing via encrypted links and protected email delivery, replacing risky attachments and unsecured file transfers with controlled, auditable exchanges. For client‑ and partner‑facing collaboration, Tresorit provides encrypted data rooms that centralize documents, tasks, and approvals in a single secure environment. These data rooms are designed for ongoing collaboration rather than one‑off transactions, allowing organizations to manage long‑term external projects while maintaining strict confidentiality. Integrated digital signatures make it possible to review and sign documents without leaving the encrypted workspace, preserving security throughout the entire document lifecycle. With advanced administrative controls, audit logs, and configurable data residency options, Tresorit is built to support compliance with strict data protection and regulatory requirements. By combining strong security with intuitive usability, Tresorit enables productive collaboration without compromising privacy, ownership, or trust.

What is SecureZIP?

The frequent incidents of major data breaches underscore the weaknesses inherent in traditional information security practices. Relying exclusively on network and device protections proves to be inadequate in the face of evolving threats. Solutions like full-disk or volume encryption only tackle specific situations, leaving core data susceptible to attacks. As a result, the adoption of persistent data-level encryption has become vital, especially for sectors that are subject to rigorous regulations. With PKWARE’s cutting-edge technology, file sizes can be reduced by up to 95%, which optimizes both storage and transmission efficiency. Authorized personnel can conveniently share and decrypt these secured files across various enterprise operating systems without hassle. To protect sensitive data, organizations can implement a range of strategies, including both password-based and certificate-based encryption methods. This strategy not only ensures comprehensive governance throughout the organization but also guarantees consistent application of security protocols, thereby bolstering overall data integrity. In the current digital milieu, embracing such strong security measures is essential for fostering trust and ensuring compliance with regulatory standards. As threats evolve, organizations must continuously adapt their security strategies to stay a step ahead.

Media

Media

Integrations Supported

AccessOwl
Active Directory
Amazon Cognito
Gmail
Microsoft 365
Microsoft Entra ID
Microsoft Outlook
Microsoft Sentinel
Microsoft Teams
Okta

Integrations Supported

AccessOwl
Active Directory
Amazon Cognito
Gmail
Microsoft 365
Microsoft Entra ID
Microsoft Outlook
Microsoft Sentinel
Microsoft Teams
Okta

API Availability

Has API

API Availability

Has API

Pricing Information

$4.75/month
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Tresorit

Date Founded

2011

Company Location

Hungary

Company Website

tresorit.com

Company Facts

Organization Name

PKWARE

Date Founded

1986

Company Location

United States

Company Website

www.pkware.com

Categories and Features

Cloud Storage

Access Control
Archiving & Retention
Backup
Data Migration
Data Synchronization
Encryption
File Sharing
Version Control

Collaboration

Brainstorming
Calendar Management
Chat / Messaging
Contact Management
Content Management
Document Management
Project Management
Real Time Editing
Task Management
Version Control
Video Conferencing

Content Collaboration

Client Portal
Cloud Storage
Digital Asset Management
Document Creation / Editing
Document Management
Electronic Signature
Feedback Management
File Sharing
Messaging / Discussion
Real-Time / Interactive Editing
Roles / Permissions
Search
Version Control
Video / Image Editing
Workflow / Approval Process

Document Management

Access Controls
Archiving & Retention
Collaboration Tools
Compliance Tracking
Document Archiving
Document Assembly
Document Capture
Document Conversion
Document Delivery
Document Indexing
Document Retention
Electronic Signature
Email Management
File Recovery
File Type Conversion
Forms Management
Full Text Search
Offline Access
Optical Character Recognition
Print Management
Version Control

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

File Sharing

Audit Trail
Chat / Messaging
Collaboration
Document Management
Drag & Drop
Electronic Signature
Encryption
File Synchronization
Search
User Management
Version Control
Workflow Management

Categories and Features

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Popular Alternatives

Proton Drive Reviews & Ratings

Proton Drive

Proton AG

Popular Alternatives

StealthDisk Mobile Reviews & Ratings

StealthDisk Mobile

Security Group Six
CLEAR Reviews & Ratings

CLEAR

Quantum Knight
Central Huddle Reviews & Ratings

Central Huddle

Classy Geeks
Folder Lock 10 Reviews & Ratings

Folder Lock 10

NewSoftwares