When deploying a cloud storage or file sharing service our first thought might be Dropbox or Google Drive.
If you search for “best cloud storage for small business”, you’ll find plenty of articles listing different cloud services you could take a look at. But what’s the best cloud storage for YOUR business and its unique set of needs? If you don't set a policy about document storage and sharing your staff may share sensitive information without control.
Deploying a cloud service is a significant undertaking. Files need to be transferred, users trained and adoption monitored. Just like choosing insurance providers or accounting software, you must think this one through as well.
If you're looking for information to help you choose the perfect solution, use the questionnaire below and download our detailed cloud storage comparison sheet for free!
Thank you for downloading
In this free Cloud Storage Comparison and Buyers Guide, you'll learn what are the main differences between the mainstream cloud storage services and how to decide which cloud storage you should choose.
In this free Cloud Storage Comparison and Buyers Guide, you'll learn what are the main differences between the mainstream cloud storage services and how to decide which cloud storage you should choose.
Cybercrime is on the rise. Government surveillance programs fill headlines. There are more ways to leak business data accidentally than ever before. All the while, your employees don’t take the necessary steps to protect company data.
Consider what you need cloud storage for
The need to access company files anywhere often motives a move to the cloud. Some businesses only need to backup their data and access it occasionally on the road. However if you're working on the same file with your colleagues, searching through dozens of e-mail attachments to find the latest version can be very tedious. It's entirely down to you to decide if you need to edit and collaborate on documents while traveling or if you're happy just using your office computer.
Keep in mind your organization’s demands
Some cloud services focus on large enterprises, while others target individual users. Now that you’ve figured out what exactly you need cloud storage for, it’s time to make sure the service you choose will meet your organization’s demands.
Ease of use varies wildly across cloud storage services. You need to make sure your end-users are comfortable working with the service you opt for.
Employees often put business data at risk by bringing their own file storage and sharing solutions to the workplace. Choosing the right cloud solution can re-establish your control over critical data.
Protect confidential files in the cloud with end-to-end encryption
There are plenty of people who are both willing and able to steal your data for their own benefit. Hackers, scammers, negligent or malicious employees, unethical cloud service staff and snooping government agents have all compromised cloud data in the past.
Dropbox, Box, Google Drive and others claim that your data is safe but they don't protect your files the way we do. They may encrypt your data but they also have the decryption key. This means files are decrypted on their server every time they're accessed. Both the administrators and anyone else with access to their servers can view your data.
Tresorit's end-to-end encryption technology secures your files on your device with some of the highest-grade encryption methods available. Your files can't be decrypted in the cloud. This makes them much safer. As you control the encryption key, no else can access it, not even Tresorit administrators. Only you and the people you choose can access your files.
Backup & Storage
Sharing & collaboration
Decide how much security you need
Is your cloud storage secure?
For all the advantages of the cloud, there are some security vulnerabilities too what you have to be aware of.
Cybercrime is on the rise. Government surveillance programs fill headlines. There are more ways to leak business data accidentally than ever before. All the while, your employees don’t take the necessary steps to protect company data. Small businesses face the biggest risk. They lack sophisticated protection, and rarely take necessary steps to prevent a breach. According to a Ponemon Research, only 36% of small business owners have data security policies in place.
When do you need security in the cloud?
If you store strategic documents and/or high-value intellectual property.
If you store information which, if leaked, could affect your reputation.
If you handle sensitive client data such as health records or credit card information.
If you work in an industry which regulates how data should be managed.
If you work in an industry frequently targeted by cyber criminals.
If you feel government agencies should not be able to access your data.
Protect your files with encryption
Use end-to-end encryption
Unlike other services, Tresorit never stores unencrypted files or unhashed passwords.
Tresorit provides a novel approach to secure cloud storage by using end-to-end encryption. We believe you should never have to "trust" a cloud storage provider. With Tresorit you don’t have to.
Tresorit encrypts files and their metadata (such as the filename) on your devices with unique, randomly generated encryption keys. These keys are never sent to our servers unencrypted. Files can only be accessed with the user's unique, private decryption key.
Unlike other services, Tresorit never transmits or stores files, encryption keys and user passwords in unencrypted or unhashed form. Due to the strength of Tresorit's end to end encryption and security, breaking this protection would take hundreds of years. This means we cannot recover forgotten passwords, nor hand over data to a third party without your consent.
Strong encryption at rest and in transit
Most data management regulations specify a minimum "key strength" for encryption while stored on a provider's servers and while in transit. However, neither of these will guarantee your provider can keep your data safe in the event of a bug, subpoena or data interception by a government agency.
End to end encryption at all times
Encrypting data before it leaves your device prevents your provider - or anyone with access to their systems - from viewing the files you store or share. It is the only known protection against your own service provider, ensuring they cannot comply with subpoenas or government surveillance.
Data storage outside the USA
Edward Snowden's revelations of government spying showed that storing data with US providers means your data can be accessed without your consent or knowledge. Strict privacy laws in the EU and Switzerland guarantee you much better legal protection. Tresorit's data centers are also disaster proof and are protected 24/7 by physical security. They're compliant with HIPAA, ISO27001:2013 and a number of other certifications.
Work from anywhere and edit files on the go
Access files anywhere securely
Tresorit's mobile apps come with built-in end-to-end encryption and additional control features.
The need to access company files anywhere often motives a move to the cloud. It's entirely down to you to decide if you need to edit and collaborate on documents while traveling or if you're happy just using your office computer.
With Tresorit, you can enjoy enterprise-level data security from any mobile device or browser. Use Tresorit's browser and mobile applications to access and edit files offsite, when no company computers are available.
This allows you to implement a BYOD (Bring Your Own Device) policy, allowing access to devices that aren't owned by your company. The remote wipe feature allows you to take the risk of losing devices containing important data as you can simply remove access to confidential files remotely.
Tresorit mobile apps are available for iOS, Android, Windows Phone and Blackberry. They all have a high user rating which demonstrates their advanced security and ease of use. Some of the advantages of using Tresorit's mobile apps are:
Applications available for all platforms you use
With Tresorit, you can work securely from anywhere: across offices and on the road. Upload and access your files with zero-knowledge encryption from any desktop and mobile device using Windows, macOS, Linux, Android, iOS, Blackberry and Windows Phone.
Edit and sync files from mobile apps
While some providers don’t allow you to edit files on mobile devices, with Tresorit does allow this on your phone or tablet.
Account security for mobile devices
Additional layers of security are added to all Tresorit accounts to prevent unauthorized access in case a device is lost or stolen. This includes 2-Step Verification, a passcode lock and the ability to wipe data remotely.
Why to use Tresorit mobile apps?
Access all your Tresorit data on the go.
Browse folders and view files directly from Tresorit.
Save photos and videos automatically to Tresorit, using your device's built-in camera
Star your favorite files for offline access. Starred files always be available.
Share folders or files. Send file links using email, text messaging or other channels.
Share files and collaborate with others
Share files securely
Tresorit makes secure file sharing easy with anyone inside and outside your company
Some businesses only need to backup their data and access it occasionally on the road. However if you're working on the same file with your colleagues, searching through dozens of e-mail attachments to find the latest version can be very tedious. Tresorit's patented end to end encryption technology protects your files whenever they leave your device. Only you and the those with whom you share content have access.
Granting limited access to a certain number of collaborators can make all the difference between a data breach and simply working with colleagues on a file.
As you can modify or revoke permissions at a moment's notice, you can quickly react to changing circumstances. User roles define the permissions granted by the tresor owner to people with whom files have been shared.
Each invitee can be assigned the role of a manager, editor or reader. These roles determine what actions users can perform with a shared tresor, so you must consider these carefully. User roles can be changed by the tresor owner at any time.
Collaborate using encrypted team folders
Set up shared team folders and decide who can manage, add to, edit or view your data. Your team can securely access up-to-date files via their browser on any desktop or mobile device - no matter where they are.
Share easily with clients, partners and other teams
Create download links to share files or folders with people outside your company. Maintain control through download limits, expiration dates and password protection. Replace email attachments with secure tresorit links, so you can undo mistakes and revoke access by removing the link itself.
Check activity feeds and version history
When collaborating with others, seeing who’s doing what at a glance is useful, especially for larger teams. Services often couple this activity history with version history, so you can roll back easily to a previous version of a file.
Control your whole organization in the cloud
Keep control of your files
With Tresorit, you can define when, where, and by whom your business data can be accessed.
Employees often put business data at risk by bringing their own file storage and sharing solutions to the workplace. Use Tresorit to help re-establish your control over critical & confidential files. Tresorit also maintains a data activity & audit trail which ensures you can comply with regulations and/or legal requests.
With Tresorit's administrative controls, you can limit access to business data to certain employees or teams in your company. This works even for team members who are in different locations and/or using multiple devices.
These access policies combined with granular sharing permissions ensure that data relating to staff salaries, for instance, can only be accessed by authorized parties such as HR, Accounts and Management departments.
The dashboard is vital for users managing a team or business. It displays important stats such as recent logins, devices used and accessed documents at a glance.
Assign users to different groups to help control access to business data across your organization.
Decide which devices should be used, and where users are allowed to log into the company account to safeguard business-critical documents.
2-step verification provides an additional, randomly generated passwords besides the one you normally use. If your password can be thought of as a key, then using 2-step verification adds an extra lock to your data. You can do this via a voice call, text message, e-mail or a dedicated authentication app. This extra layer of security makes life much harder for hackers.
As the administrator of your team's Tresorit account, you can make it mandatory for everyone in your team to set up 2-step verification when registering their Tresorit profile.
As the administrator of your team's Tresorit account, you can whitelist the IP addresses of your company premises, to make sure, that files in your Tresorit account can't be accessed outside your office.
Your system administrators can use IP filtering to block access to business data from undesirable locations. For instance, IP filtering can be used to limit access to devices connected to your office Wifi network or block IP addresses from foreign countries.
This can help ensure staff don't try to access their work accounts via insecure Wifi connections and can also prevent malicious access from stolen devices.
If you can't find a device but are unable to wipe it remotely, you can unlink it from your business and social media accounts. Unlinking a device means that whoever has it has no further access to your accounts. You can usually access this feature in the security management section of your online account.
As the administrator of your team's Tresorit account, you can unlink devices. This will remotely log the user out of their Tresorit account meaning whoever has the device will not be able to access it.
The main benefit of seeing all users listed in your Admin Center is that you can monitor their activity as well as control what they can and can't do. For example, you can use "GROUPS" and "POLICIES" to restrict which devices can access Tresorit, enforce 2-Step Verification and set up IP filters.
You can also set up policies to create encrypting links, disable the "Remember Me" feature, turn off file sharing altogether, prevent creation of new tresors, deactivate syncing and enforce Timeout policies.
Make sure you take the time to familiarize yourself with this aspect of Tresorit.
Once a policy is created under GROUPS and POLICIES you can assign it to individuals in your account under USERS and DEVICES. Each user can have their own policy. The rules set up under GROUPS and POLICIES can be changed at any time.
You can also use the Admin Center to remove and add users as required in a matter of seconds. If, for instance, a user loses their device you can remove their account by unlinking it. Their account will log out automatically. For mobile devices, removing a user also activates a remote wipe which deletes all locally stored files.
How does Tresorit compare to other cloud storage & sharing services?
Switch to end-to-end encryption
Tresorit makes it physically impossible to access your files without your authorization.
Dropbox, Box, Google Drive and others became popular years ago, when data security threats were not as prevalent as they are today. They claim that data is “safe” with them, but they don’t protect your files the way we do. They may encrypt your data but they have the encryption key and the files get decrypted on their servers every time they are accessed. Their administrators can see your files, and so can anyone who manages to gain access to their systems.
Using Tresorit your files will be completely secure. End-to-end encryption means you hold the keys to your data. You have total control over shared documents.
Tresorit’s main difference compared to Dropbox, and other mainstream cloud storage services, is the ability to turn any folder on your device into a secure “tresor.” What this means is that you do not have to drag and drop files into a special sync folder. Instead, you can drag any folder from its existing location on your computer into the Tresorit app to “tresor it.” This is especially convenient if you’re digitally organized and you’d prefer not to rearrange your files into one sync-able folder.
Tresorit is more secure than Dropbox, Google Drive, OneDrive and others
Dropbox, Box, Google Drive etc. became popular years ago, when data security threats were not as prevalent as they are today. They claim that your data is safe, but don’t protect your files the way we do. They may encrypt your data but they have the encryption key and the files get decrypted on their servers every time they're accessed.
The administrators of other cloud services can see your files as can anyone who manages to gain access to their systems.
Use Tresorit to ensure your files are completely secure. End-to-end encryption means you hold the keys to your data. You also will have complete control over shared documents.
Another key difference between Tresorit and cloud storage providers like Dropbox is that it can turn any folder on your device into a secure "tresor". This means you don't have to drag and drop files into a special sync folder. Instead, just drag any folder from its existing location into the Tresor app to "tresor" it.
This is especially useful if you keep your digital files in various locations around your machine and don't want to arrange them into a single folder.
Tresorit is easier to use than other encrypted cloud services
Only a few providers offer client-side file encryption. The most popular is SpiderOak. But, SpiderOak has two main flaws:
It is universally hard to use. This is attested to by reviewers on major tech sites and app store reviews.
It doesn't allow collaboration in shared folders, sharing is one-direction only.
Additionally, SpiderOak is not zero-knowledge when used on a mobile device or a web-browser.
Services like Sookasa, Viivo, BoxCryptor and Ncrypted cloud have three main disadvantages when compared to Tresorit:
Your users need to use two different services for adequate security, which often leads to accidental mix-ups that reveal sensitive data – e.g. copying documents in or to the basic cloud storage folder instead of the encrypted one;
As complete encrypted folders need to be downloaded before a single file can be accessed, there’s no way to share securely with someone who doesn’t have exactly the same bolt-on encryption setup. For example, you can’t share a Viivo encrypted folder with someone using Boxcryptor, even if you both use Dropbox for storage, so someone will need to change providers if you want to share securely;
You need to pay for, and maintain, two services instead of one.
Tresorit encryption takes place in the background. There’s no margin of error, as users don’t have to lift a finger. It’s also easy to share files securely with others, even if they don’t use Tresorit.
Compare File Server to Cloud Storages. 10 business benefits of Tresorit's cloud storage vs. file servers.
As technology has matured, more and more businesses started leveraging the benefits of the cloud. Contrary to file servers, the cloud allows enhanced mobility with access to files from any device, anywhere, facilitates collaboration between offices, helps to save storage space and can increase control over company files. However, many companies still have security concerns when it comes to moving data to the cloud and the proliferation of data breaches shows that hackers are increasingly after information stored in the cloud. With Tresorit, these security concerns can be minimized as Tresorit offers a highly secure yet easy-to-use way to store, sync and share files in the cloud. Here you can read 10 business benefits of Tresorit's cloud storage vs. file servers.
A comparison of cloud storage services with GDPR compliance in mind
Switch to GDPR-ready file management & collaboration
Tresorit helps you work with files that need protection under the new law easily and provides the strongest data protection measures to ensure compliance.
If your business uses cloud storage services for storing, syncing and sharing work files, you are most likely processing plenty of personal data in the cloud. Work documents such as business contracts, employee payrolls, or customer lists all contain personal data that you need to protect to comply with the GDPR. Besides, cloud storage services manage your business information for billing purposes, your team members’ personal data such as name and email address, and many other usage-related metadata such as IP addresses. As a consequence, it is crucial to make sure that the cloud storage service you choose meets the requirements of the GDPR. In case you are audited, you have to prove that you use data processors in line with the GDPR’s requirements. We have collected the most relevant information to help you understand how some of the most popular cloud storage services compare in the 5 key GDPR requirements we listed in this eBook.
Below you can manage your cookie preferences. You can choose not to allow some types of cookies. To apply changes and activate your cookie preferences, please refresh your browser after saving your settings. Please note that blocking some types of cookies may impact your experience and could impede full functionality of our website.
These cookies are essential for our website to function. They usually enable your movement around our website and services you have specifically asked for, such as setting privacy preferences, or filling in forms. This category of cookies cannot be disabled.
We use third party analytics tools to better understand how visitors use our website, so we can measure and improve the performance of our website. If you do not allow these cookies, we will not know when you have visited our site – which means we will not be able to monitor its performance.
These cookies are used in order to better understand user needs and interactions with our marketing communications, such as marketing emails and marketing-based landing pages on the website. If you decide to identify yourself - by filling out a form for example - these cookies may collect personal information about you.
These cookies may be set through our site by our advertising partners. They may be used to serve you with relevant advertisements on other web sites and services, and to measure the effectiveness of these advertisements. If you do not allow these cookies, you will experience less targeted advertising.