Log In
Request a demo
Why Tresorit?
Products
Tresorit SecureCloud
Work together in an end-to-end encrypted workspace - anywhere, anytime
Tresorit FileSharing
Share files with permission control, revoke access anytime
Tresorit eSign
Get business done faster with our digital signature solution
Tresorit EmailEncryption
Email security that protects against data loss and puts you in control
Tresorit with Microsoft
Tresorit for Gmail
New features
Basic Tresorit Plan
Use the most essential Tresorit features for free
Tresorit Send
Send confidential files securely
Solutions
Business File Sharing & Storage
Enable Secure File Sharing & Storage for your business
Client Data Room
Collaborate efficiently & securely
Partner Data Room
Collaborate & grow together
Personal Vault
Safeguard your personal documents
Automotive
Finance
Healthcare
Human resources
IT Services
Legal
Nonprofit
CCPA
CJIS
DORA
FINRA
GDPR
HIPAA
ITAR
NIS2
TISAX
Resources
Blog
Customer Stories
Events & Webinars
Podcast
Resource Library
Download
Tresorit apps and integrations for desktop and mobile
Knowledge Base
Full comparison
Box
Boxcryptor
Dropbox
Google Drive
Nextcloud
ownCloud
Data Residency
Data Security
Whistleblower Act
Pricing
Log In
Request a demo
Try for free
Try for free
This page contains JavaScript. Please enable JavaScript in your browser to access all functions.
News
Security
Compliance
Product
Company Announcements
Resources
Podcast
security
security
Independent security test: ETH Zurich puts Tresorit’s E2EE cloud solution to the test
compliance
Virtual data rooms: protecting data with ease
end-to-end encryption
How to encrypt files: a step-by-step guide for Windows, Mac, and Linux users
cyber threats
Cybersecurity monitoring: top threat monitoring tools and tactics to keep you safe
governance
NIS2 implementation: who’s affected and how to prepare
security
What is an EDMS, why should you care and how to choose one? Here’s your 2024 guide
security
"NIS2 will keep businesses busy for years" - Interview with IT security expert Manuel Atug
security
Social engineering: meaning, methods, and how not to become a cybercrime statistic
More Articles