Log in
Request a demo
Products
Tresorit SecureCloud for Businesses
Work together in an end-to-end encrypted workspace - anywhere, anytime
Tresorit SecureCloud for Private Use
Store your personal files and memories in an encrypted vault
Tresorit Engage
New
Manage confidential projects and client interactions in secure data rooms
Tresorit FileSharing
Share files with permission control, revoke access anytime
Tresorit eSign
Get business done faster with our digital signature solution
Tresorit EmailEncryption
Email security that protects against data loss and puts you in control
Tresorit with Microsoft
Tresorit for Gmail
New Features
Basic Tresorit Plan
Use the most essential Tresorit features for free
Tresorit Send
Send confidential files securely
Solutions
Automotive
Finance
Healthcare
Human resources
IT Services
Legal
Nonprofit
CCPA
CJIS
DORA
FINRA
GDPR
HIPAA
ITAR
NIS2
TISAX
Resources
Blog
Customer Stories
Events & Webinars
Podcast
Resource Library
About us
Download
Tresorit apps and integrations for desktop and mobile
Knowledge Base
Data Residency
Data Security
Whistleblower Act
Full comparison
Box
Boxcryptor
Dropbox
Google Drive
Nextcloud
ownCloud
Pricing
Tresorit SecureCloud for Businesses
Tresorit SecureCloud for Private Use
Tresorit Engage
New
Log in
Request a demo
Try for free
Try for free
This page contains JavaScript. Please enable JavaScript in your browser to access all functions.
News
Security
Compliance
Product
Company Announcements
Resources
Podcast
compliance
compliance
Digital transformation in the legal sector: from paper files to legal tech platforms
Worauf es ankommt: Warum die ISO-Zertifizierung den Cloud-Anbieter ausmacht
compliance
Why ISO certification matters when choosing a cloud based collaboration platform
compliance
Secure data sharing: Protecting clinical data and Intellectual Property
compliance
NIS2 compliance made simple: Tools and tactics with Tresorit – Part 1
compliance
NIS2 compliance made simpler – Tools and tactics with Tresorit – Part 2
compliance
Compliance without limits: The business advantages of data protection regulations
DORA-Compliance Teil 2: Umgang mit IKT-bezogenen Vorfällen
More Articles