Cloud Storage Security Comparison

Every cloud storage service claims that keeping your data and documents safe is their top priority. But can you trust them?

Tresorit
Dropbox
Box
OneDrive
Google Drive
SugarSync
SpiderOak
Wuala
Encryption & security
Encryption at rest and in transit
End-to-end encrypted storage
End-to-end encrypted sharing
Zero-knowledge authentication
2-Step Verification
HIPAA Compliance
Server location
EU
US + EU
US + EU
US
US
US
US
EU
Storage & file management
Sync any folders
Desktop sync app
Linux sync app
Network Drive
Selective Synchronization
Mobility
Edit files on mobile devices
Automatic Camera Upload
Remote wipe of mobile devices
Passcode Lock on mobile devices
Cross-Device Support
Android & iOS only
Mobile App Rating
4.3
4.4
4.2
4.4
4.3
4.1
3.7
3.8
Zero-knowledge access from browsers
Collaboration
Unlimited file versioning
120 days only
5 versions only
Deleted file recovery
Coming in 2017
120 days only
30 days only
Outlook integration
Live, in-app collaboration
Controlled sharing
Granular permission levels for collaborators
Password protection for links
Expiration date for links
Download limits for links
Digital Rights Management
Administration
Admin console
Company-managed groups
Device restriction policies
IP-restrictions policies
Active directory integration
Deployment
Support center
Live chat support
Deployment support for SMBs
On-premises deployment
Custom branding

Based on publicly available information. If you have an update or suggestion for the comparison table, please let us know at support@tresorit.com.

Protect confidential files in the cloud with end-to-end encryption

There are plenty of people who are both willing and able to steal your data for their own benefit. Hackers, scammers, negligent or malicious employees, unethical cloud service staff and snooping government agents have all compromised cloud data in the past.

Dropbox, Box, Google Drive others claim that your data is safe but they don't protect your files the way we do. They may encrypt your data but they also have the decryption key. This means files are decrypted on their server every time they're accessed. Both the Administrators and anyone else with access to their servers can view your data.

Tresorit's end-to-end encryption technology secures your files on your device with some of the highest-grade encryption methods available. Your files can't be decrypted in the cloud. This makes them much safer. As you control the encryption key, no else can access it, not even Tresorit administrators. Only you and the people you choose can access your files.

Decide how much security you need

Is your cloud storage secure? Is your cloud storage secure?

Is your cloud storage secure?

For all the advantages of the cloud, there are some security vulnerabilities too what you have to be aware of.

Cybercrime is on the rise. Government surveillance programs feature regularly in the headlines. There are now more ways to leak business data accidentally than ever bore. Despite all this, not all employees take the necessary steps to protect corporate data. Small businesses are most at risk, as they lack sophisticated protection and rarely implement measures to prevent a breach. According to research conducted by the Ponemon Institute, only 36% of small business owners have data security policies in place.

All major cloud storage providers claim to be secure. However they don't explain the huge range of differences between one security method and another. One excellent case in point is the recent data breach suffered by Dropbox, where details of millions of accounts were leaked through the software's integration with third party apps. Google Drive has also had trouble ensuring user privacy. Google's privacy policy states that the company may "use, host, store, reproduce, modify, create derivative works, communicate, publish, publicly perform, publicly display and distribute (your) content".

When do you need security in the cloud?

  • If you store strategic documents and/or high-value intellectual property.
  • If you store information which, if leaked, could affect your reputation.
  • If you handle sensitive client data such as health records or credit card information.
  • If you work in an industry which regulates how data should be managed.
  • If you work in an industry frequently targeted by cyber criminals.
  • If you feel government agencies should not be able to access your data.

Protect your files with encryption

Use end-to-end encryption

Use end-to-end encryption

Unlike other services, Tresorit never stores unencrypted files or unhashed passwords.

Tresorit provides a novel approach to secure cloud storage by using end-to-end encryption. We believe you should never have to "trust" a cloud storage provider. With Tresorit you don’t have to.

Tresorit encrypts files and their metadata (such as the filename) on your devices with unique, randomly generated encryption keys. These keys are never sent to our servers unencrypted. Files can only be accessed with the user's unique, private decryption key.

Unlike other services, Tresorit never transmits or stores files, encryption keys and user passwords in unencrypted or unhashed form. Due to the strength of Tresorit's end to end encryption and security, breaking this protection would take hundreds of years. This means we cannot recover forgotten passwords, nor hand over data to a third party without your consent.

  • Strong encryption at rest and in transit

    Most data management regulations specify a minimum "key strength" for encryption while stored on a provider's servers and while in transit. However, neither of these will guarantee your provider can keep your data safe in the event of a bug, subpoena or data interception by a government agency.

  • End to end encryption at all times

    Encrypting data before it leaves your device prevents your provider - or anyone with access to their systems - from viewing the files you store or share. It is the only known protection against your own service provider, ensuring they cannot comply with subpoenas or government surveillance.

  • Data storage outside the USA

    Edward Snowden's revelations of government spying showed that storing data with US providers means your data can be accessed without your consent or knowledge. Strict privacy laws in the EU and Switzerland guarantee you much better legal protection. Tresorit's data centers are also disaster proof and are protected 24/7 by physical security. They're compliant with HIPAA, ISO27001:2013 and a number of other certifications.

Work from anywhere and edit files on the go

Access files anywhere securely Access files anywhere securely

Access files anywhere securely

Tresorit's mobile apps come with built-in end-to-end encryption and additional control features.

The need to access company files anywhere often motives a move to the cloud. It's entirely down to you to decide if you need to edit and collaborate on documents while traveling or if you're happy just using your office computer.

With Tresorit, you can enjoy enterprise-level data security from any mobile device or browser. Use Tresorit's browser and mobile applications to access and edit files offsite, when no company computers are available.

This allows you to implement a BYOD (Bring Your Own Device) policy, allowing access to devices that aren't owned by your company. The remote wipe feature allows you to take the risk of losing devices containing important data as you can simply remove access to confidential files remotely.

Tresorit mobile apps are available for iOS, Android, Windows Phone and Blackberry. They all have a high user rating which demonstrates their advanced security and ease of use. Some of the advantages of using Tresorit's mobile apps are:

  • Applications available for all platforms you use

    With Tresorit, you can work securely from anywhere: across offices and on the road. Upload and access your files with zero-knowledge encryption from any desktop and mobile device using Windows, macOS, Linux, Android, iOS, Blackberry and Windows Phone.

  • Edit and sync files from mobile apps

    While some providers don’t allow you to edit files on mobile devices, with Tresorit does allow this on your phone or tablet.

  • Account security for mobile devices

    Additional layers of security are added to all Tresorit accounts to prevent unauthorized access in case a device is lost or stolen. This includes 2-Step Verification, a passcode lock and the ability to wipe data remotely.

Why to use Tresorit mobile apps?

  • Access all your Tresorit data on the go.
  • Browse folders and view files directly from Tresorit.
  • Save photos and videos automatically to Tresorit, using your device's built-in camera
  • Star your favorite files for offline access. Starred files always be available.
  • Share folders or files. Send file links using email, text messaging or other channels.

Share files and collaborate with others

Share files securely Share files securely

Share files securely

Tresorit makes secure file sharing easy with anyone inside and outside your company

Some businesses only need to backup their data and access it occasionally on the road. However if you're working on the same file with your colleagues, searching through dozens of e-mail attachments to find the latest version can be very tedious. Tresorit's patented end to end encryption technology protects your files whenever they leave your device. Only you and the those with whom you share content have access.

Granting limited access to a certain number of collaborators can make all the difference between a data breach and simply working with colleagues on a file.

As you can modify or revoke permissions at a moment's notice, you can quickly react to changing circumstances. User roles define the permissions granted by the tresor owner to people with whom files have been shared.

Each invitee can be assigned the role of a manager, editor or reader. These roles determine what actions users can perform with a shared tresor, so you must consider these carefully. User roles can be changed by the tresor owner at any time.

  • Collaborate using encrypted team folders

    Set up shared team folders and decide who can manage, add to, edit or view your data. Your team can securely access up-to-date files via their browser on any desktop or mobile device - no matter where they are.

  • Share easily with clients, partners and other teams

    Create download links to share files or folders with people outside your company. Maintain control through download limits, expiration dates and password protection. Replace email attachments with secure tresorit links, so you can undo mistakes and revoke access by removing the link itself.

  • Check activity feeds and version history

    When collaborating with others, seeing who’s doing what at a glance is useful, especially for larger teams. Services often couple this activity history with version history, so you can roll back easily to a previous version of a file.

Pro Tip

Tresorit Digital Rights Management (DRM) adds an extra layer of protection to files. DRM enabled tresors prevent Editors and Readers from saving, printing, copying or taking screenshots of DRM protected files. DRM protected files attached to emails also cannot be opened.

Control your whole organization in the cloud

Keep control of your files Keep control of your files

Keep control of your files

With Tresorit, you can define when, where, and by whom your business data can be accessed.

Employees often put business data at risk by bringing their own file storage and sharing solutions to the workplace. Use Tresorit to help re-establish your control over critical & confidential files. Tresorit also maintains a data activity & audit trail which ensures you can comply with regulations and/or legal requests.

With Tresorit's administrative controls, you can limit access to business data to certain employees or teams in your company. This works even for team members who are in different locations and/or using multiple devices.

These access policies combined with granular sharing permissions ensure that data relating to staff salaries, for instance, can only be accessed by authorized parties such as HR, Accounts and Management departments.

  • Admin dashboard

    The dashboard is vital for users managing a team or business. It displays important stats such as recent logins, devices used and accessed documents at a glance.

  • User groups

    Assign users to different groups to help control access to business data across your organization.

  • Access policies

    Decide which devices should be used, and where users are allowed to log into the company account to safeguard business-critical documents.

  • 2-step verification

    2-step verification provides an additional, randomly generated passwords besides the one you normally use. If your password can be thought of as a key, then using 2-step verification adds an extra lock to your data. You can do this via a voice call, text message, e-mail or a dedicated authentication app. This extra layer of security makes life much harder for hackers.

    As the administrator of your team's Tresorit account, you can make it mandatory for everyone in your team to set up 2-step verification when registering their Tresorit profile.

  • IP blocking

    As the administrator of your team's Tresorit account, you can whitelist the IP addresses of your company premises, to make sure, that files in your Tresorit account can't be accessed outside your office.

    Your system administrators can use IP filtering to block access to business data from undesirable locations. For instance, IP filtering can be used to limit access to devices connected to your office Wifi network or block IP addresses from foreign countries.

    This can help ensure staff don't try to access their work accounts via insecure Wifi connections and can also prevent malicious access from stolen devices.

  • Unlink devices

    If you can't find a device but are unable to wipe it remotely, you can unlink it from your business and social media accounts. Unlinking a device means that whoever has it has no further access to your accounts. You can usually access this feature in the security management section of your online account.

    As the administrator of your team's Tresorit account, you can unlink devices. This will remotely log the user out of their Tresorit account meaning whoever has the device will not be able to access it.

The main benefit of seeing all users listed in your Admin Center is that you can monitor their activity as well as control what they can and can't do. For example, you can use "GROUPS" and "POLICIES" to restrict which devices can access Tresorit, enforce 2-Step Verification and set up IP filters.

You can also set up policies to create encrypting links, disable the "Remember Me" feature, turn off file sharing altogether, prevent creation of new tresors, deactivate syncing and enforce Timeout policies.

Make sure you take the time to familiarize yourself with this aspect of Tresorit.

Once a policy is created under GROUPS and POLICIES you can assign it to individuals in your account under USERS and DEVICES. Each user can have their own policy. The rules set up under GROUPS and POLICIES can be changed at any time.

You can also use the Admin Center to remove and add users as required in a matter of seconds. If, for instance, a user loses their device you can remove their account by unlinking it. Their account will log out automatically. For mobile devices, removing a user also activates a remote wipe which deletes all locally stored files.

How does Tresorit compare to other cloud storage & sharing services?

Switch to end-to-end encryption

How does Tresorit compare to other cloud storage & sharing services?

Tresorit makes it physically impossible to access your files without your authorization.

Don't let Dropbox and others decide who can see your files. With end-to-end encryption you don't need to blindly trust your cloud provider. It would take over 1000 years to break Tresorit's encryption.

Dropbox, Box, Google Drive and others claim that your data is “safe”, but they don’t protect your files the way Tresorit does. They may encrypt your data but they have the encryption key and the files get decrypted on their servers every time they're accessed.

Tresorit's zero-knowledge end-to-end encryption technology affords maximum protection while still allowing you to comfortably share, collaborate, and stay productive. Without this technology, security is a real problem. Use Tresorit's unbeatable security to remain safe.

Tresorit is more secure than other cloud storage providers

Dropbox, Box, Google Drive etc. became popular years ago, when data security threats were not as prevalent as they are today. They claim that your data is safe, but don’t protect your files the way we do. They may encrypt your data but they have the encryption key and the files get decrypted on their servers every time they're accessed.

The administrators of other cloud services can see your files as can anyone who manages to gain access to their systems.

Use Tresorit to ensure your files are completely secure. End-to-end encryption means you hold the keys to your data. You also will have complete control over shared documents.

Another key difference between Tresorit and cloud storage providers like Dropbox is that it can turn any folder on your device into a secure "tresor". This means you don't have to drag and drop files into a special sync folder. Instead, just drag any folder from its existing location into the Tresor app to "tresor" it.

This is especially useful if you keep your digital files in various locations around your machine and don't want to arrange them into a single folder.

Tresorit is easier to use than other encrypted cloud services

Only a few providers offer client-side file encryption. The most popular is SpiderOak. SpiderOak, however, has two main flaws:

  • It is universally hard to use. This is acknowledged by reviewers on major tech sites and in app stores.
  • It cuts corners when it comes to security.

Additionally, SpiderOak is not zero-knowledge when accessed via mobile devices or a web-browser. By using so-called convergent cryptography, the company sacrifices confidentiality to save storage space.

Convergent algorithms enable SpiderOak to determine when your content matches the content of others in the cloud. This can leak valuable information about your data. Read more about how Tresorit compares to SpiderOak.

Tresorit provides you with built-in protection

Services like Sookasa, Viivo, BoxCryptor and Ncrypted cloud have three main disadvantages when compared to Tresorit:

  • Users need to use two different services for adequate security, which often leads to accidental mix-ups that reveal sensitive data. For example, a user may accidentally copy documents into the basic cloud storage folder instead of an encrypted one.
  • As complete encrypted folders need to be downloaded before a single file can be accessed, there’s no way to share securely with someone who doesn’t have exactly the same bolt-on encryption setup. For example, you can’t share a Viivo encrypted folder with someone using Boxcryptor, even if you both use Dropbox for storage, so in order to share data securely, you must all be using the same cloud encryption software.
  • You must pay for, and maintain, two services instead of one.

Tresorit encryption runs in the background. There’s no margin of error, as users don’t have to lift a finger. It’s also easy to share files securely with others, even if they don’t use Tresorit.