Log In
Request a demo
Why Tresorit?
Products
Tresorit SecureCloud
Work together in an end-to-end encrypted workspace - anywhere, anytime
Tresorit FileSharing
Share files with permission control, revoke access anytime
Tresorit eSign
Get business done faster with our digital signature solution
Tresorit EmailEncryption
Email security that protects against data loss and puts you in control
Tresorit with Microsoft
Tresorit for Gmail
New features
Basic Tresorit Plan
Use the most essential Tresorit features for free
Tresorit Send
Send confidential files securely
Solutions
Business File Sharing & Storage
Enable Secure File Sharing & Storage for your business
Client Data Room
Collaborate efficiently & securely
Partner Data Room
Collaborate & grow together
Personal Vault
Safeguard your personal documents
Automotive
Finance
Healthcare
Human resources
IT Services
Legal
Nonprofit
CCPA
CJIS
DORA
FINRA
GDPR
HIPAA
ITAR
NIS2
TISAX
Resources
Blog
Customer Stories
Events & Webinars
Podcast
Resource Library
Download
Tresorit apps and integrations for desktop and mobile
Knowledge Base
Full comparison
Box
Boxcryptor
Dropbox
Google Drive
Nextcloud
ownCloud
Data Residency
Data Security
Digital Trust Label
Whistleblower Act
Pricing
Log In
Request a demo
Try for free
Try for free
This page contains JavaScript. Please enable JavaScript in your browser to access all functions.
News
Security
Compliance
Product
Company Announcements
Resources
Podcast
Tresorit Team
product
19 best practices to boost Microsoft 365 security in 2023
19 bewährte Verfahren zur Stärkung von Microsoft -365-Sicherheit im Jahr 2023
data protection
Up close and personnel: a beginner’s guide to personnel record keeping
awards
Tresorit Wins at the Global InfoSec Awards at the RSA Conference
SaaS-Sicherheitscheckliste: 6 Schritte für Produktivität und Sicherheit in der Cloud
security
SaaS security checklist: 6 steps to stay productive and safe in the cloud
Whistleblower-Richtlinie: Daten- und Hinweisgeberschutz sauber umsetzen
data protection
Whistleblower Directive: Clean implementation of data and Whistleblower Protection
More Articles