Log In
Request a demo
Why Tresorit?
Products
Tresorit SecureCloud
Work together in an end-to-end encrypted workspace - anywhere, anytime
Tresorit FileSharing
Share files with permission control, revoke access anytime
Tresorit eSign
Get business done faster with our digital signature solution
Tresorit EmailEncryption
Email security that protects against data loss and puts you in control
Tresorit with Microsoft
Tresorit for Gmail
New features
Basic Tresorit Plan
Use the most essential Tresorit features for free
Tresorit Send
Send confidential files securely
Solutions
Business File Sharing & Storage
Enable Secure File Sharing & Storage for your business
Client Data Room
Collaborate efficiently & securely
Partner Data Room
Collaborate & grow together
Personal Vault
Safeguard your personal documents
Automotive
Finance
Healthcare
Human resources
IT Services
Legal
Nonprofit
CCPA
CJIS
DORA
FINRA
GDPR
HIPAA
ITAR
NIS2
TISAX
Resources
Blog
Customer Stories
Events & Webinars
Podcast
Resource Library
Download
Tresorit apps and integrations for desktop and mobile
Knowledge Base
Full comparison
Box
Boxcryptor
Dropbox
Google Drive
Nextcloud
ownCloud
Data Residency
Data Security
Digital Trust Label
Whistleblower Act
Pricing
Log In
Request a demo
Try for free
Try for free
This page contains JavaScript. Please enable JavaScript in your browser to access all functions.
News
Security
Compliance
Product
Company Announcements
Resources
Podcast
end-to-end encryption
NIS2
How the NIS2 Directive will impact UK businesses
Data segregation simplified: unlocking secure collaboration with data rooms
end-to-end encryption
How to encrypt files: a step-by-step guide for Windows, Mac, and Linux users
end-to-end encryption
Beyond Security: Elevating Office Efficiency with Encrypted Email Solutions
end-to-end encryption
Playing detective: everything you’ve ever wanted to know about email tracing
end-to-end encryption
Unveiling Security Vulnerabilities: Why secure enough is NOT an option
data protection
Tresorit gets Common Criteria EAL4+ certification
end-to-end encryption
Better safe than sorry: which files do you need to encrypt?
More Articles