Secure & private content collaboration, by design
Store, sync, and share your most sensitive documents with peace of mind - Tresorit provides the highest level of data security in the cloud.
Store, sync, and share your most sensitive documents with peace of mind - Tresorit provides the highest level of data security in the cloud.
Tresorit eSign is a digital signature solution that lets you sign and share your sensitive documents worry-free. Requesting signatures and signing documents is a secure, simple, and intuitive process, protected by end-to-end encryption.
Simplify the signing process and reduce turnaround times by eliminating time-consuming ink-on-paper signatures and execute documents digitally without compromising data security and privacy.
Assign and modify basic fillable fields for your signer(s): Name, Signature, Initial, Email, Date and Checkbox. Choose from handwritten-like signatures, as a signer.
Manage which users or user groups can create eSign requests via the eSign policy. When enabled, users will be able to create electronic signature requests.
Track everything you need to know about eSign requests in the eSign reports, including who created requests and when, as well as signers and signature dates.
Long Term Validation helps to know that your digital signature will be technically valid for 5, 10, or more years. LTV is available for documents signed after 02/12/2022 with Tresorit eSign.
With the Tresorit Email encryption add-on, sending and receiving encrypted emails is simple and hassle-free. Recipients don't need to have a Tresorit account to read and reply to encrypted emails – even replies are encrypted by default.
Access encrypted email content easily with a Microsoft or Google account.
Gain more visibility on encrypted email communication in your subscription. In the Sent encrypted emails report you'll find information like who sent the email, when, who were the recipients, and what access control features were used. The Encrypted email access report contains information about who accessed the email data and when.
Add custom branding to your encrypted emails to make them your own. Recipients will see your branding when they open encrypted emails in their browser.
Easily encrypt email content and attachments. Receive end-to-end encrypted replies even if the recipient doesn't have a Tresorit account.
Tresorit Email encryption is available in Outlook for Windows and more is coming soon.
Require email to view and disable forwarding to ensure only the intended recipient can access the content of your email.
Bypass file size limits set through the email provider and send large email attachments (5GB, depending on Tresorit plan and browser)
Revoke the access easily to the content for all recipients in case an email is sent to a wrong recipient by mistake.
Administrators can set up rules to enforce email encryption based on whether the recipient is trusted or the email contains an attachment. They can set rules to automatically encrypt the whole email, or just the attachments - and apply different sets of rules to different Tresorit user groups.
Leave no room for error – safeguard your files in every scenario. Learn more
Never leave your documents without protection in the cloud – Tresorit encrypts and decrypts files and their relevant metadata on the client-side. Learn more
Keep everything between you and your recipient. Tresorit never transmits or stores files, encryption keys, and user passwords in an unencrypted or unhashed form. Learn more
Data kept in Tresorit is mirrored to multiple storage nodes in a datacenter. This mitigates the risk of data loss and ensures high availability at the same time.
Tresorit uses Microsoft Azure data centers in Ireland and the Netherlands. They are heavily guarded and constructed to protect against environmental threats.
Users can perform a remote wipe on their linked devices. This action removes all synced files, serving as a great damage-control when a device is lost or stolen. Learn more
Automatically delete all synced folders from the device when you sign out from Tresorit. This way, you can make sure all documents remain in the cloud. Learn more
Tresorit applies patches of third-party system components continuously, and updates server and client software regularly to provide the latest versions.
Create secure collaboration hubs where your team can easily work together no matter where they are. Learn more
Connect multiple devices to your Tresorit account to enable syncing files and folders between them. This way files can be accessed from anywhere. Learn more
Keep all your work in the cloud: all Tresorit plans come with huge storage. Depending on the selected plan, each user gets from 1TB up to 4TB.
Integrate Tresorit to your local file manager on Mac or Windows to upload and access files more easily and faster without storing them on your computer. Learn more
With version history, Tresorit tracks all file changes and it can restore previous versions to correct mistakes or revert changes. Learn more
Keep your files in sync between your local computer and the cloud. Files in a synced folder are automatically updated in Tresorit for you and other collaborators.
You can also select which files and subfolders you want to sync to your computer and prevent unused documents from cluttering your hard drive. Learn more
Access your cloud documents from your phone or tablet without compromising security. Tresort provides the same level of security on Windows, Mac OS, Linux, iOS and Android. Learn more
Perform bulk actions and automate reports with simple commands on a headless Linux machine. CLI is supported by detailed documentation for all available tasks. Learn more
Access, preview, download or share documents stored in Tresorit from any browser in an secure end-to-end encrypted zero-knowledge environment.
Restore deleted files with just a click of a button when you accidentally delete a file or folder or when you need to deal with a ransomware attack. Learn more
Take documents wherever you go and access them even when you’re offline. Learn more
Access, preview, download or share documents wherever you go from your iPhone, iPad, Android or Windows mobile device. Learn more
Encrypt and upload your mobile phone’s camera photos automatically with the Tresorit application and store or share them.
Whenever you want to save mobile data or when you have no internet available, you can still access the synced files on your device.
Use your phone’s camera to scan important documents directly to the cloud. Tresorit encrypts and uploads your files, without saving copies on your device. Learn more
Remotely delete all synced files and the Tresorit app in case of lost or theft. In this case you can eliminate all confidential documents from any device.
Secure file sharing with anyone inside and outside your organization. Learn more
Create end-to-end encrypted links to collect files from external partners in Tresorit folders. This feature comes in handy, when you need to collect sensitive files in a secure environment, even if the external party does not own a Tresorit subscription. Learn more
Share files, folders and subfolders with links in a secure, end-to-end encrypted way with anyone, even without a Tresorit account. Further improve security with password, expiry date, open limit and email verification. Enable email notifications to be informed as soon as someone accesses your shared file. Learn more
Invite Tresorit users to access and collaborate in subfolders. Stay in control of your data and make sure that the right team members have access to the right level of information.
Boost your team’s productivity by letting them track – without ever compromising security – how recipients engage with shared documents. Collect insights on document downloads, time spent on files, and the best performing pages. Finally, refine your follow-up by applying your informed understanding of your prospects’ interests.
Advanced link tracking lets Enterprise users check how link visitors engage with their content, granting them greater control over their documents' lifecycle. Detailed insights then show the number of times a file was viewed, downloaded or saved to a Tresorit account.
With this feature, you can keep important information within a circle of specific email addresses and domains. In the event that public links are shared outside of this circle, this helps you make internal and external collaboration secure by removing the risk of unauthorized access to your digital valuables. Learn more
Revoke shared links immediately in case of wrong recipient or any other reason. It makes the file download page unavailable for everyone. Access logs for shared links can be accessed even after they have been revoked, no matter how many links are created for the same file. What’s more, admins can enforce a 90-day retention period of the access logs for all revoked shared links. Learn more
Users can invite new members to collaborate by adding them to a tresor. You can set up permissions for each member, like owner, manager, editor and viewer.
Enable Access Logs to track shared files and see the open date the email, IP address and platform used to open the links you shared – even once they’ve expired or been revoked. What’s more, admins can enforce a 90-day retention period of the access logs for all expired or revoked shared links. Learn more
List and follow your own and other collaborators’ activities in the tresors you have access to, such as editing, creating, deleting and more.
Oversee and manage all Shared links you created. Reuse links, review activities such as opens and failed opens or revoke access if needed.
With the Tresorit Email encryption add-on, sending and receiving encrypted emails is simple and hassle-free. There’s no need for recipients to have a Tresorit account to read and reply to encrypted emails – even replies are encrypted by default.
Tresorit’s add-in for Outlook integrates seamlessly into your email composer, allowing you to transform attachments into ultra-secure links at the click of a button. Our advanced security features also let you stay in control of your files long after they’ve left your inbox. Learn more
Tresorit’s add-in for Gmail integrates seamlessly into your email composer, allowing you to transform attachments into ultra-secure links at the click of a button. Our advanced security features also let you stay in control of your files long after they’ve left your inbox.
Eliminate version trees and collaborate on the same document with other team members in a secure, zero-knowledge environment. Learn more
Avoid conflicts by adding an editing badge to documents so your colleagues know you’re currently working on them. Learn more
Increase transparency and make teamwork smoother. When enabled, users can see parent folders’ names when they’re members of a subfolder.
Add a watermark to shared videos to avoid unauthorized re-sharing, preview videos in the browser, and disable download to ensure the security of shared videos.
Secure your organization's data by setting up user policies, tracking activities, and managing users and devices. Get started
Prevent data loss when deleting user accounts. The folder takeover feature lets you transfer the ownership of a user’s folders and content before deleting user accounts.
Monitor employee activity and fulfill compliance and compliance needs with SIEM (Security Information and Event Management) and send activity events from Tresorit to your selected service provider.
You can help shape Tresorit's future by sharing your ideas, providing feedback, and taking part in research initiatives. Browse what's coming up, and vote for your preferred features.
Select what type of email communications (App notifications, product updates, promotions, etc.) your users can receive from us. They'll still have the option to opt out individually.
Simplify and automate user management, provisioning, and de-provisioning within your organization when you connect all your apps to Azure AD or Okta.
New email address? No problem. Once you set up a new Tresorit account with a new email address, the account transfer feature helps you transfer your old account to the new one.
Automatically delete sensitive files that were intended to only be shared (and not stored) once the shared link is revoked or expires. This removes the need for constant monitoring of your shared document's lifecycle both for your workspace admins and your employees.
Custom branding allows you to add your company's logo and brand color to Shared Links Download pages to match the look and feel with your brand's visuals. Learn more
Select the data centers where you want to keep data and satisfy company policy or industry and jurisdiction-specific regulations. Learn more
Claim ownership of your domain to simplify user management in Tresorit. With our domain management tool, Tresorit admins can easily verify domains, and choose to automatically migrate employees to the team’s subscription.
The dashboard gives an overview of what’s happening in the company’s account. Export activity data and oversee the most important statistics.
One single interface to overview the account and manage users. Onboard and offboard users, setup policies and review user activities easily.
Perform bulk actions and automate reports with commands on a headless Linux machine. CLI is supported by documentation for all available tasks. Learn more
Get a trustworthy overview on the organization’s Tresorit account and export operational data as a .csv file from the Admin Center for further analysis.
In link activity report, admins can oversee all shared links and file names within the organization – even once they’ve expired, been revoked. The report includes info on who accessed the shared content, and from where and when it was accessed. What’s more, admins can enforce a 90-day retention period of the access logs for all expired or revoked shared links.
Set up limitations for selected user groups and define which operating systems or mobile platforms they can use to access Tresorit.
Increase security by limiting the IP addresses from where selected user groups can login to Tresorit. This way access can be limited to one place only.
Set up user group policies and prohibit or limit sharing rights. Features forced like password protection or expiration date and open limit can be maximized.
Thanks to zero-knowledge, Tresorit cannot see user passwords, but admins can recover them and they can even revoke access from devices.
Set up policies for different user groups, such as mandatory 2-Step Verification, IP filtering, device and feature limitations, sharing policies, and more. Learn more
Users can perform a remote wipe on their own devices to minimize damage in case of loss or theft. This will remove all files synced on the selected device.
Speed up admin tasks and synchronize users, tresors and tresor memberships from your own Microsoft Active Directory service.
Make 2-Step Verification mandatory for selected user groups and secure their devices with fingerprint, passcode or email verification.
Get a detailed report on basic user information and export data as a .csv from the Admin Center for easier user data reporting.
Customize links to comply with your external partners’ firewall settings to allow sharing without compromising on security. The new, customized link format will be visible at the creation of links and will be displayed in the URL when recipient opens the link.
Make document storing and sharing compliant with the relevant regulations. Get started
Tresorit’s security compliance was audited by an independent TÜV Rheinland member and recognized with the ISO 27001 information security standard.
Implement data protection measures while collaborating on files: control who has access to data, log file activities and set up internal security policies. Learn more
Keep sensitive and patient data safe with the HIPAA compliant Tresorit. End-to-end encrypt data storage and file sharing with clients. Learn more
Select the data centers where you want to keep data and satisfy company policy or industry and jurisdiction-specific regulations. Learn more
Get even more from Tresorit by connecting it with other apps. Get started
Integrate Tresorit directly into Microsoft Teams and store, share, and sign your most confidential documents in the Teams application without disrupting your workflow.
Monitor employee activity and fulfill compliance and compliance needs with SIEM (Security Information and Event Management) and send activity events from Tresorit to your selected service provider.
Tresorit's add-in for Outlook integrates seamlessly into your email composer, allowing you to transform attachments into ultra-secure links at the click of a button. Our advanced security features also let you stay in control of your files long after they’ve left your inbox.
Tresorit's add-in for Gmail integrates seamlessly into your email composer, allowing you to transform attachments into ultra-secure links at the click of a button. Our advanced security features also let you stay in control of your files long after they’ve left your inbox.
Active Directory integration is an administrative tool, which lets you synchronize users, Tresors and Tresor memberships from your own directory service.
Execute and speed up admin related tasks like adding or removing users and assigning memberships through an API.
The SSO integration with Azure AD, Okta and Google Workspace allows one-step sign-in to Tresorit for your employees and a streamlined administration for your admins.
Enhance your Tresorit experience with our support and deployment services. Get started
Contact Tresorit support via live chat between Monday and Friday 9 AM-12 AM and on Saturday, Sunday 9 AM-6 PM CET.
Tresorit users can turn to our support team for help any time via email and receive answers 6 days a week from Monday to Friday and on Sunday.
Business and Enterprise users enjoy the special attention of our support team and receive answers faster via email.
Schedule a call with a support team member and get answers to Tresorit related questions in a shared screen session.
As an enterprise user, you can get immediate help via phone support from Monday to Friday between 9AM-6PM CET.
Get your team up to speed with your new Tresorit account with personalized onboarding and staff training.
Customize the Tresorit offer according to your company’s needs and change the size of the storage/user, select servers and more.