Tresorit vs Dropbox - Cloud Storage Security Comparison
Trusted by 12,000+ organizations worldwide
Why security conscious companies choose Tresorit over Dropbox
Mainstream cloud storage providers, like Dropbox, encrypt data on their servers that they control. This alone is not enough to protect you – for true security in the cloud, you need more. Try Tresorit, the secure Dropbox alternative!
Dropbox
Tresorit
Dropbox
Only encrypted on the server side.
Dropbox decrypts your files when they reach their servers, making your content vulnerable to hacker attacks and data leaks. Since they store your encryption keys to do this, they and anyone who breaches their servers can view your files.
Tresorit
Fully end-to-end encrypted.
Your files are encrypted on your device and never decrypted until they reach your intended recipient - only you and anyone you authorize can decrypt the files. Even if our servers were breached (which has never happened), your files would not be readable to hackers.
Dropbox
Can theoretically access and view your content anytime.
Dropbox can and does access your content on occasion for different reasons, such as, when they deem it necessary to ensure their systems and features are working as designed. This creates opportunities for your data to be misused or lost in the process.
Tresorit
Cannot access your content due to our Zero-Knowledge protocol.
Zero-knowledge means that nobody besides you holds the keys to your data, not even us, your service provider. Even if we wanted to, it would be impossible for us to decrypt and view your file content.
Dropbox
Falls under US CLOUD Act.
This legislation grants US government agencies and law enforcement full access to cloud data hosted by US companies, like Dropbox, regardless of the location of the data server. They can also legally prohibit Dropbox from informing you of their access request with a gag order.
Tresorit
Protected by Swiss privacy laws.
Tresorit is headquartered in Switzerland and therefore your data is protected by some of the strongest privacy laws in the world. As a Swiss company, Tresorit cannot be compelled to participate in mass surveillance by US or EU intelligence agencies.
Dropbox
Data residency only at the organization level
Dropbox offers storage of file blocks in regions outside the United States in Germany, Australia, Japan and the United Kingdom. File metadata is stored in the United States on Dropbox’s proprietary servers. The server location selected applies at the organizational level.
Tresorit
12 data center locations worldwide at the organization and user level
Available regions are Ireland, UK, USA East, USA West, Canada, Germany, Switzerland, France, Singapore, Netherlands, UAE – Dubai, Brazil.
Users can be assigned to data centers, guaranteeing that their data will reside in the designated location even if the rest of the organizational data resides in a different location.
Discover the ROI associated with Tresorit
Rebuilding trust in the cloud after a breach
Ready to start working securely?
Sign up and include your collaborators right away.
Compare more features
Encryption & security
- Encryption at rest and in transit
- End-to-end encrypted storage
- End-to-end encrypted sharing
- Zero-knowledge authentication
- 2-Step Verification
- HIPAA compliance
- Data residency options5 options at the organizational level12 options at the organizational and user level
Mobility
- Edit files on mobile devices
- Automatic camera upload
- Remote wipe of mobile devices
- Passcode lock on mobile devices
- Cross-device support
- Zero-knowledge access from browsers
- End-to-end encrypted document scanning
Collaboration
- Unlimited file versioning and history
- Deleted file recovery
- Live, in-app collaboration
- Subfolder-level sharing
- Internal file paths
File-sharing
- Granular permission level for collaborators
- File requests
- Password protection for links
- Expiration date for links
- Require email verification
- Link tracking
- End-to-end encrypted emails for Microsoft Outlook
- Electronic signatures
- Swiss qualified signatures
- Qualified electronic signatures
- Document analytics
Administration
- Admin center
- Company-managed groups
- Device-restriction policies
- IP-restriction policies
- Active Directory integration
- Sharing policies – share only within subscription
- Link settings policy
- SIEM integrations
- Admin control over all user’s email preference settings
- SSO
- Sharing policies
Deployment
- Support center
- Live chat Support
- DeploymentCloudCloud
- Custom branding
Our Ratings
Read our eBook to learn more about:
- The fundamentals of encryption
- The strengths and weaknesses of different encryption forms
- And why you should encrypt information in the first place