Tresorit believes that data privacy is a human right: that’s why we put it at the heart of everything we do.
Our products are created to make your online workplace more efficient and hassle-free. But they’re also made to be private by design — meaning that high-security data protection principles are hardwired into all of our tools and solutions from day one. It’s about giving IT admins the tools they need to empower users without having to jump through loops to meet your company's internal data security policies and industry regulations.
In our latest podcast episode, we’re discussing the role that Tresorit’s latest features can have in preserving your privacy, and how they can be used to deal with some of the most pressing issues in cybersecurity today.
Most companies are still adjusting to ‘the new normal'
The transition to post-pandemic working has dominated 2022, with companies adjusting their digital infrastructure to cope with more employees remotely.
That trend isn’t going anywhere in 2023, and plenty of organizations are still getting to grips with a host of new IT solutions, new vendors, and new cybersecurity risks.
In particular, many organizations report finding it difficult to get employees on board with new policies or processes they need to keep documents safe as they’re moved and shared off-site, whether internally or with external partners.
Building a strong cybersecurity environment takes time and investment. But it also shows the value of using secure and encrypted tools that can boost efficiency and make employees’ lives easier, rather than adding extra steps to workflows. It’s just one reason why seeing data privacy as an inherent design feature — rather than an afterthought or add-on — is so vital.
Making privacy personalized
Recent leaks at companies such as Dropbox and Uber prove that data breaches remain a very real threat, even for major multinationals. In many cases, such leaks can be attributed to authorization issues, where employees or contractors are mistakenly given access to sensitive documents.
As part of our secure file-sharing service, Tresorit gives admins the ability to create and manage custom policy templates, where default sharing settings can be adjusted depending on the level of security your company requires. It’s an ideal way to ensure high levels of cybersecurity are maintained as a constant, company-wide given. There are also tools to restrict which users can access files and folders on a more detailed level, including individual sub-folders.
After listening to customer feedback, we’ve also tweaked our policy templates so that admins can restrict which users receive promotional emails from Tresorit: ensuring that our best tips, guides, and deals go to the right people without cluttering inboxes.
More efficiency means more security
Many of our most recent roll-outs are dedicated to saving time for hard-working admins.
Introduced earlier this year, our domain verification feature allows you to link your Tresorit subscription with a specific domain name. It’s an easy way to ensure that all employees with a company email are a part of your subscription, giving you the tools you need to collect user data and monitor file access. It’s also a handy way to discourage shadow IT.
We’ve also given IT admins the option to link their company’s Tresorit subscription to identity providers Azure AD and Okta, allowing them to automatically create a Tresorit account whenever a new employee joins the company, and automatically disable them when they leave.
It’s just another way to ensure that your data will remain secure, without the need for constant chasing and follow-ups.
All Tresorit products are designed to provide data for detailed reports. Accessible via the Tresorit admin center, these reports can give admins insight into how teams operate within Tresorit and includes information on which users have accessed and shared files. We’ve also recently added reports which gather data on our new encrypted email tools.
To make it easier for admins to access these reports, users can now link Tresorit to their existing security information and event management system (SIEM). This new feature allows admins to monitor Tresorit use, set up alerts, and create automatic rules for Tresorit within the same SIEM used company-wide, saving valuable time for cybersecurity.
This Tresorit feature currently supports Microsoft Sentinel, although Splunk integration will also be making its way to users in the very near future.
Want to hear more? Click below to access the webinar in full via Spotify.