Get NIS2-ready with Tresorit. Meet the highest security standards. Learn more

Tresorit vs Dropbox - Cloud Storage Security Comparison

A Switzerland-based Dropbox alternative, Tresorit is the ultra-secure solution for businesses and individuals looking to store, sync and share files with peace of mind in the cloud.
Try for free
14 days without limitations

Trusted by 12,000+ organizations worldwide

Schenker
Toyota
Deutsches Rotes Kreuz
Konica Minolta
NotCo
Trade Republic
Northwave

Why security conscious companies choose Tresorit over Dropbox

Mainstream cloud storage providers, like Dropbox, encrypt data on their servers that they control. This alone is not enough to protect you – for true security in the cloud, you need more. Try Tresorit, the secure Dropbox alternative!

  • Dropbox

    Tresorit

  • Dropbox

    Only encrypted on the server side.

    Dropbox decrypts your files when they reach their servers, making your content vulnerable to hacker attacks and data leaks. Since they store your encryption keys to do this, they and anyone who breaches their servers can view your files.

    Tresorit

    Fully end-to-end encrypted.

    Your files are encrypted on your device and never decrypted until they reach your intended recipient - only you and anyone you authorize can decrypt the files. Even if our servers were breached (which has never happened), your files would not be readable to hackers.

  • Dropbox

    Can theoretically access and view your content anytime.

    Dropbox can and does access your content on occasion for different reasons, such as, when they deem it necessary to ensure their systems and features are working as designed. This creates opportunities for your data to be misused or lost in the process.

    Tresorit

    Cannot access your content due to our Zero-Knowledge protocol.

    Zero-knowledge means that nobody besides you holds the keys to your data, not even us, your service provider. Even if we wanted to, it would be impossible for us to decrypt and view your file content.

  • Dropbox

    Falls under US CLOUD Act.

    This legislation grants US government agencies and law enforcement full access to cloud data hosted by US companies, like Dropbox, regardless of the location of the data server. They can also legally prohibit Dropbox from informing you of their access request with a gag order.

    Tresorit

    Protected by Swiss privacy laws.

    Tresorit is headquartered in Switzerland and therefore your data is protected by some of the strongest privacy laws in the world. As a Swiss company, Tresorit cannot be compelled to participate in mass surveillance by US or EU intelligence agencies.

  • Dropbox

    Data residency only at the organization level

    Dropbox offers storage of file blocks in regions outside the United States in Germany, Australia, Japan and the United Kingdom. File metadata is stored in the United States on Dropbox’s proprietary servers. The server location selected applies at the organizational level.

    Tresorit

    12 data center locations worldwide at the organization and user level

    Available regions are Ireland, UK, USA East, USA West, Canada, Germany, Switzerland, France, Singapore, Netherlands, UAE – Dubai, Brazil.

    Users can be assigned to data centers, guaranteeing that their data will reside in the designated location even if the rest of the organizational data resides in a different location.

Discover the ROI associated with Tresorit

Rebuilding trust in the cloud after a breach

Little Venice Partners decided they were in need of a secure cloud storage solution, after a data breach revealed a partner’s private documents where being shared with a client via Dropbox.

Ready to start working securely?

Sign up and include your collaborators right away.

Try for free
Start a 14-day free trial

Compare more features

Dropbox
Tresorit
  • Encryption & security

    • Encryption at rest and in transit
    • End-to-end encrypted storage
    • End-to-end encrypted sharing
    • Zero-knowledge authentication
    • 2-Step Verification
    • HIPAA compliance
    • Data residency options
      5 options at the organizational level
      12 options at the organizational and user level
  • Mobility

    • Edit files on mobile devices
    • Automatic camera upload
    • Remote wipe of mobile devices
    • Passcode lock on mobile devices
    • Cross-device support
    • Zero-knowledge access from browsers
    • End-to-end encrypted document scanning
  • Collaboration

    • Unlimited file versioning and history
    • Deleted file recovery
    • Live, in-app collaboration
    • Subfolder-level sharing
    • Internal file paths
  • File-sharing

    • Granular permission level for collaborators
    • File requests
    • Password protection for links
    • Expiration date for links
    • Require email verification
    • Link tracking
    • End-to-end encrypted emails for Microsoft Outlook
    • Electronic signatures
    • Swiss qualified signatures
    • Qualified electronic signatures
    • Document analytics
  • Administration

    • Admin center
    • Company-managed groups
    • Device-restriction policies
    • IP-restriction policies
    • Active Directory integration
    • Sharing policies – share only within subscription
    • Link settings policy
    • SIEM integrations
    • Admin control over all user’s email preference settings
    • SSO
    • Sharing policies
  • Deployment

    • Support center
    • Live chat Support
    • Deployment
      Cloud
      Cloud
    • Custom branding

Our Ratings

Tresorit’s rating on App Store
App Store
4.5
Tresorit’s rating on Google Play
Google Play
4.9
Tresorit’s rating on Capterra
Capterra
4.9
Tresorit’s rating on Gartner
Gartner Peer insights
4.7
Tresorit’s rating on G2 Crowd
G2 Crowd
4.5
Tresorit’s rating on App Store
App Store
4.5
Tresorit’s rating on Google Play
Google Play
4.9
Tresorit’s rating on Capterra
Capterra
4.9
Tresorit’s rating on Gartner
Gartner Peer insights
4.7

Read our eBook to learn more about:

  • The fundamentals of encryption
  • The strengths and weaknesses of different encryption forms
  • And why you should encrypt information in the first place

To learn more about how we handle your data, please read our Privacy Policy.

Resources

Take action now

Try for free
14 days without limitations