Secure & private content collaboration, by design

Store, sync, and share your most sensitive documents with peace of mind - Tresorit provides the highest level of data security in the cloud.

Tresorit eSign

Tresorit eSign

Tresorit eSign is a digital signature solution that lets you sign and share your sensitive documents worry-free. Requesting signatures and signing documents is a secure, simple, and intuitive process, protected by end-to-end encryption.

  • Simple electronic signatures

    Simplify the signing process and reduce turnaround times by eliminating time-consuming ink-on-paper signatures and execute documents digitally without compromising data security and privacy.

  • Basic fillable fields

    Assign and modify basic fillable fields for your signer(s): Name, Signature, Initial, Email, Date and Checkbox. Choose from handwritten-like signatures, as a signer.

  • Policy template

    Manage which users or user groups can create eSign requests via the eSign policy. When enabled, users will be able to create electronic signature requests.

  • eSign Reports

    Track everything you need to know about eSign requests in the eSign reports, including who created requests and when, as well as signers and signature dates.

  • Long Term Validation support

    Long Term Validation helps to know that your digital signature will be technically valid for 5, 10, or more years. LTV is available for documents signed after 02/12/2022 with Tresorit eSign.

Tresorit Email encryption

Tresorit Email encryption

With the Tresorit Email encryption add-on, sending and receiving encrypted emails is simple and hassle-free. Recipients don't need to have a Tresorit account to read and reply to encrypted emails – even replies are encrypted by default.

  • Fast-track access for recipients

    Access encrypted email content easily with a Microsoft or Google account.

  • Detailed reports

    Gain more visibility on encrypted email communication in your subscription. In the Sent encrypted emails report you'll find information like who sent the email, when, who were the recipients, and what access control features were used. The Encrypted email access report contains information about who accessed the email data and when.

  • Customization

    Add custom branding to your encrypted emails to make them your own. Recipients will see your branding when they open encrypted emails in their browser.

  • Encrypted emails and replies

    Easily encrypt email content and attachments. Receive end-to-end encrypted replies even if the recipient doesn't have a Tresorit account.

  • Platform availability

    Tresorit Email encryption is available in Outlook for Windows and more is coming soon.

  • Email security settings

    Require email to view and disable forwarding to ensure only the intended recipient can access the content of your email.

  • Handling large attachments

    Bypass file size limits set through the email provider and send large email attachments (5GB, depending on Tresorit plan and browser)

  • Revoke emails

    Revoke the access easily to the content for all recipients in case an email is sent to a wrong recipient by mistake.

  • Email encryption rules

    Administrators can set up rules to enforce email encryption based on whether the recipient is trusted or the email contains an attachment. They can set rules to automatically encrypt the whole email, or just the attachments - and apply different sets of rules to different Tresorit user groups.

Security & Privacy

Security & Privacy

Leave no room for error – safeguard your files in every scenario. Learn more

  • End-to-end encryption

    Never leave your documents without protection in the cloud – Tresorit encrypts and decrypts files and their relevant metadata on the client-side. Learn more

  • Zero-knowledge system

    Keep everything between you and your recipient. Tresorit never transmits or stores files, encryption keys, and user passwords in an unencrypted or unhashed form. Learn more

  • Redundant storage

    Data kept in Tresorit is mirrored to multiple storage nodes in a datacenter. This mitigates the risk of data loss and ensures high availability at the same time.

  • 24/7 monitoring and physical security

    Tresorit uses Microsoft Azure data centers. They are heavily guarded and constructed to protect against environmental threats.

  • Remote wipe

    Users can perform a remote wipe on their linked devices. This action removes all synced files, serving as a great damage-control when a device is lost or stolen. Learn more

  • Local wipe

    Automatically delete all synced folders from the device when you sign out from Tresorit. This way, you can make sure all documents remain in the cloud. Learn more

  • Continuous patching

    Tresorit applies patches of third-party system components continuously, and updates server and client software regularly to provide the latest versions.

Document Access & Management

Document Access & Management

Create secure collaboration hubs where your team can easily work together no matter where they are. Learn more

  • Multiple devices

    Connect multiple devices to your Tresorit account to enable syncing files and folders between them. This way files can be accessed from anywhere. Learn more

  • Storage space/user

    Keep all your work in the cloud: all Tresorit plans come with huge storage. Depending on the selected plan, each user gets from 1TB up to 4TB.

  • Tresorit Drive

    Integrate Tresorit to your local file manager on Mac or Windows to upload and access files more easily and faster without storing them on your computer. Learn more

  • Version history

    With version history, Tresorit tracks all file changes and it can restore previous versions to correct mistakes or revert changes. Learn more

  • Sync

    Keep your files in sync between your local computer and the cloud. Files in a synced folder are automatically updated in Tresorit for you and other collaborators.

  • Selective sync

    You can also select which files and subfolders you want to sync to your computer and prevent unused documents from cluttering your hard drive. Learn more

  • Multi-platform support

    Access your cloud documents from your phone or tablet without compromising security. Tresort provides the same level of security on Windows, Mac OS, Linux, iOS and Android. Learn more

  • Command Line Interface (CLI) for Linux

    Perform bulk actions and automate reports with simple commands on a headless Linux machine. CLI is supported by detailed documentation for all available tasks. Learn more

  • Browser access

    Access, preview, download or share documents stored in Tresorit from any browser in an secure end-to-end encrypted zero-knowledge environment.

  • Restore

    Restore deleted files with just a click of a button when you accidentally delete a file or folder or when you need to deal with a ransomware attack. Learn more

Mobile Access

Mobile Access

Take documents wherever you go and access them even when you’re offline. Learn more

  • Native mobile apps

    Access, preview, download or share documents wherever you go from your iPhone, iPad, Android or Windows mobile device. Learn more

  • Auto camera upload

    Encrypt and upload your mobile phone’s camera photos automatically with the Tresorit application and store or share them.

  • Offline access

    Whenever you want to save mobile data or when you have no internet available, you can still access the synced files on your device.

  • Document Scanner

    Use your phone’s camera to scan important documents directly to the cloud. Tresorit encrypts and uploads your files, without saving copies on your device. Learn more

  • Remote wipe mobile device

    Remotely delete all synced files and the Tresorit app in case of lost or theft. In this case you can eliminate all confidential documents from any device.

File Sharing & Collaboration

File Sharing & Collaboration

Secure file sharing with anyone inside and outside your organization. Learn more

  • File request link

    Create end-to-end encrypted links to collect files from external partners in Tresorit folders. This feature comes in handy, when you need to collect sensitive files in a secure environment, even if the external party does not own a Tresorit subscription. Learn more

  • Share with links

    Share files, folders and subfolders with links in a secure, end-to-end encrypted way with anyone, even without a Tresorit account. Further improve security with password, expiry date, open limit and email verification. Enable email notifications to be informed as soon as someone accesses your shared file. Learn more

  • Subfolder sharing

    Invite Tresorit users to access and collaborate in subfolders. Stay in control of your data and make sure that the right team members have access to the right level of information.

  • Document analytics

    Boost your team’s productivity by letting them track – without ever compromising security – how recipients engage with shared documents. Collect insights on document downloads, time spent on files, and the best performing pages. Finally, refine your follow-up by applying your informed understanding of your prospects’ interests.

  • Advanced link tracking

    Advanced link tracking lets Enterprise users check how link visitors engage with their content, granting them greater control over their documents' lifecycle. Detailed insights then show the number of times a file was viewed, downloaded or saved to a Tresorit account.

  • Allowed viewers

    With this feature, you can keep important information within a circle of specific email addresses and domains. In the event that public links are shared outside of this circle, this helps you make internal and external collaboration secure by removing the risk of unauthorized access to your digital valuables. Learn more

  • Revoke link

    Revoke shared links immediately in case of wrong recipient or any other reason. It makes the file download page unavailable for everyone. Access logs for shared links can be accessed even after they have been revoked, no matter how many links are created for the same file. What’s more, admins can enforce a 90-day retention period of the access logs for all revoked shared links. Learn more

  • Tresor permission

    Users can invite new members to collaborate by adding them to a tresor. You can set up permissions for each member, like owner, manager, editor and viewer.

  • Access logs

    Enable Access Logs to track shared files and see the open date the email, IP address and platform used to open the links you shared – even once they’ve expired or been revoked. What’s more, admins can enforce a 90-day retention period of the access logs for all expired or revoked shared links. Learn more

  • Recents

    List and follow your own and other collaborators’ activities in the tresors you have access to, such as editing, creating, deleting and more.

  • Links tab

    Oversee and manage all Shared links you created. Reuse links, review activities such as opens and failed opens or revoke access if needed.

  • Tresorit Email encryption

    With the Tresorit Email encryption add-on, sending and receiving encrypted emails is simple and hassle-free. There’s no need for recipients to have a Tresorit account to read and reply to encrypted emails – even replies are encrypted by default.

  • Tresorit for Outlook

    Tresorit’s add-in for Outlook integrates seamlessly into your email composer, allowing you to transform attachments into ultra-secure links at the click of a button. Our advanced security features also let you stay in control of your files long after they’ve left your inbox. Learn more

  • Tresorit for Gmail

    Tresorit’s add-in for Gmail integrates seamlessly into your email composer, allowing you to transform attachments into ultra-secure links at the click of a button. Our advanced security features also let you stay in control of your files long after they’ve left your inbox.

  • Tresorit path

    Eliminate version trees and collaborate on the same document with other team members in a secure, zero-knowledge environment. Learn more

  • Editing badge

    Avoid conflicts by adding an editing badge to documents so your colleagues know you’re currently working on them. Learn more

  • Visible subfolder hierarchy

    Increase transparency and make teamwork smoother. When enabled, users can see parent folders’ names when they’re members of a subfolder.

  • Enhanced video sharing security new

    Add a watermark to shared videos to avoid unauthorized re-sharing, preview videos in the browser, and disable download to ensure the security of shared videos.

Admin Controls

Admin Controls

Secure your organization's data by setting up user policies, tracking activities, and managing users and devices. Get started

  • Folder takeover

    Prevent data loss when deleting user accounts. The folder takeover feature lets you transfer the ownership of a user’s folders and content before deleting user accounts.

  • SIEM integration enterprise

    Monitor employee activity and fulfill compliance and compliance needs with SIEM (Security Information and Event Management) and send activity events from Tresorit to your selected service provider.

  • Roadmap

    You can help shape Tresorit's future by sharing your ideas, providing feedback, and taking part in research initiatives. Browse what's coming up, and vote for your preferred features.

  • Email preference settings enterprise

    Select what type of email communications (App notifications, product updates, promotions, etc.) your users can receive from us. They'll still have the option to opt out individually.

  • Provisioning enterprise

    Simplify and automate user management, provisioning, and de-provisioning within your organization when you connect all your apps to Azure AD or Okta.

  • Account transfer

    New email address? No problem. Once you set up a new Tresorit account with a new email address, the account transfer feature helps you transfer your old account to the new one.

  • Auto-deletion policy for shared files

    Automatically delete sensitive files that were intended to only be shared (and not stored) once the shared link is revoked or expires. This removes the need for constant monitoring of your shared document's lifecycle both for your workspace admins and your employees.

  • Custom branding

    Custom branding allows you to add your company's logo and brand color to Shared Links Download pages to match the look and feel with your brand's visuals. Learn more

  • Data Residency Options

    Select the data centers where you want to keep data and satisfy company policy or industry and jurisdiction-specific regulations. Learn more

  • Domain verification business

    Claim ownership of your domain to simplify user management in Tresorit. With our domain management tool, Tresorit admins can easily verify domains, and choose to automatically migrate employees to the team’s subscription.

  • Admin Center Dashboard business

    The dashboard gives an overview of what’s happening in the company’s account. Export activity data and oversee the most important statistics.

  • User management business

    One single interface to overview the account and manage users. Onboard and offboard users, setup policies and review user activities easily.

  • Command Line Interface for Linux (CLI)

    Perform bulk actions and automate reports with commands on a headless Linux machine. CLI is supported by documentation for all available tasks. Learn more

  • Detailed reporting business

    Get a trustworthy overview on the organization’s Tresorit account and export operational data as a .csv file from the Admin Center for further analysis.

  • Link activity report enterprise

    In link activity report, admins can oversee all shared links and file names within the organization – even once they’ve expired, been revoked. The report includes info on who accessed the shared content, and from where and when it was accessed. What’s more, admins can enforce a 90-day retention period of the access logs for all expired or revoked shared links.

  • Device policies business

    Set up limitations for selected user groups and define which operating systems or mobile platforms they can use to access Tresorit.

  • IP filtering business

    Increase security by limiting the IP addresses from where selected user groups can login to Tresorit. This way access can be limited to one place only.

  • Storage and sharing policies business

    Set up user group policies and prohibit or limit sharing rights. Features forced like password protection or expiration date and open limit can be maximized.

  • Password recovery by admins business

    Thanks to zero-knowledge, Tresorit cannot see user passwords, but admins can recover them and they can even revoke access from devices.

  • Policy templates business

    Set up policies for different user groups, such as mandatory 2-Step Verification, IP filtering, device and feature limitations, sharing policies, and more. Learn more

  • Remote wipe

    Users can perform a remote wipe on their own devices to minimize damage in case of loss or theft. This will remove all files synced on the selected device.

  • Active Directory integration business

    Speed up admin tasks and synchronize users, tresors and tresor memberships from your own Microsoft Active Directory service.

  • 2-Step Verification business

    Make 2-Step Verification mandatory for selected user groups and secure their devices with fingerprint, passcode or email verification.

  • User Export business

    Get a detailed report on basic user information and export data as a .csv from the Admin Center for easier user data reporting.

  • Custom domain for links enterprise

    Customize links to comply with your external partners’ firewall settings to allow sharing without compromising on security. The new, customized link format will be visible at the creation of links and will be displayed in the URL when recipient opens the link.

Ready to take your company’s security to the next level?

tresorit app
Compliance

Compliance

Make document storing and sharing compliant with the relevant regulations. Get started

  • ISO 27001 Certified

    Tresorit’s security compliance was audited by an independent TÜV Rheinland member and recognized with the ISO 27001 information security standard.

  • GDPR Compliance

    Implement data protection measures while collaborating on files: control who has access to data, log file activities and set up internal security policies. Learn more

  • HIPAA Compliance business

    Keep sensitive and patient data safe with the HIPAA compliant Tresorit. End-to-end encrypt data storage and file sharing with clients. Learn more

  • Data Residency Options

    Select the data centers where you want to keep data and satisfy company policy or industry and jurisdiction-specific regulations. Learn more

Integrations

Integrations

Get even more from Tresorit by connecting it with other apps. Get started

  • Microsoft Teams

    Integrate Tresorit directly into Microsoft Teams and store, share, and sign your most confidential documents in the Teams application without disrupting your workflow.

  • SIEM integration enterprise

    Monitor employee activity and fulfill compliance and compliance needs with SIEM (Security Information and Event Management) and send activity events from Tresorit to your selected service provider.

  • Tresorit for Outlook

    Tresorit's add-in for Outlook integrates seamlessly into your email composer, allowing you to transform attachments into ultra-secure links at the click of a button. Our advanced security features also let you stay in control of your files long after they’ve left your inbox.

  • Tresorit for Gmail

    Tresorit's add-in for Gmail integrates seamlessly into your email composer, allowing you to transform attachments into ultra-secure links at the click of a button. Our advanced security features also let you stay in control of your files long after they’ve left your inbox.

  • Active Directory business

    Active Directory integration is an administrative tool, which lets you synchronize users, Tresors and Tresor memberships from your own directory service.

  • Single Sign-On business

    The SSO integration with Azure AD, Okta and Google Workspace allows one-step sign-in to Tresorit for your employees and a streamlined administration for your admins.

Services

Services

Enhance your Tresorit experience with our support and deployment services. Get started

  • Live chat support

    Contact Tresorit support via live chat between Monday and Friday 9 AM-12 AM and on Saturday, Sunday 9 AM-6 PM CET.

  • Email support

    Tresorit users can turn to our support team for help any time via email and receive answers 6 days a week from Monday to Friday and on Sunday.

  • Priority email support business

    Business and Enterprise users enjoy the special attention of our support team and receive answers faster via email.

  • Scheduled phone support business

    Schedule a call with a support team member and get answers to Tresorit related questions in a shared screen session.

  • Phone support enterprise

    As an enterprise user, you can get immediate help via phone support from Monday to Friday between 9AM-6PM CET.

  • Onboarding and training enterprise

    Get your team up to speed with your new Tresorit account with personalized onboarding and staff training.

  • Custom deployment enterprise

    Customize the Tresorit offer according to your company’s needs and change the size of the storage/user, select servers and more.