

A vendor with zero knowledge will store encrypted data but can never decrypt it or access user passwords in a readable format. E2EE uses public-key cryptography to prevent any server or eavesdropper between the source and destination from seeing anything other than the encrypted data.Ī zero-knowledge service, maintains the data encrypted at all times and without ever learning the password that secures it. An end-to-end encryption approach means that data is encrypted at the point of origin and only decrypted again by the recipient.

Tresorit deploys end-to-end encryption using the AES-256 standard and zero-knowledge architecture. And as an organization grows, this kind of control is an absolute must.” “You don’t have to make compromises to get ease-of-use for your colleagues and your organization. “You’re getting control over your information,” Peter said. These tools to manage sharing and audit access are a core part of a robust security profile. The audit trail even includes the IP address and browser client of those who click on a link, regardless of whether they had to specify an email address. Administrators can check the activities performed by other administrators, review recent file edits, track activity within a folder, and view logs of who accessed links. Tresorit keeps detailed audit records, especially needed by enterprise users. Sharing works on a per-person or per-link model, with built-in options to have the link expire after a set number of days, password-protect the link, limit the number of times the link can be used, disable downloads, require an email address to view the document, or add other control features such as dynamic watermark that is coming soon. With a single click, those with access to an account can see shared links and revoke them from one list, rather than search through folders looking for things they may have errantly shared. Tresorit offers an intuitive control panel for sharing and auditing. “You can synchronize documents and create links to share or set up file request links where you ask others, for example clients or partners, to upload their files for you.” You can access it through a web interface or through desktop and mobile apps,” Peter said. “Our service works like any other cloud storage in terms of features and ease of use, but everything is designed with privacy in mind, and I’m proud of that. That approach differs from cloud solutions that rely on a single master directory tree to organize data or in-house partitioning that separates volumes on a file server. A user could have access to a personal tresor plus the shared tresors for finance and human resources, but not those for marketing and IT. Think of a tresor as a drive-within-a-drive each tresor contains data and uses its own security and sharing settings.įor example, a small business might use one enterprise account that segregates data by department. Tresorit’s model relies on tresors, which are isolated spaces within an encrypted drive. And many of the late adopters are companies in regulated industries that require special protections for data security. Peter said that enterprise cloud adoption remains slow, but the pace has picked up since the pandemic.

Each plan comes with a free trial period, and Tresorit offers a free file-sending tool called Tresorit Send for one-off transfers.Īlthough cloud adoption accelerated as the 2010s wore on, the COVID-19 pandemic led to a spike as many companies shifted their operational models to accommodate remote work. It delivers products to both the individual and corporate markets, with a range of feature sets and storage space. The company expanded offerings to business customers in 2014. Tresorit started as a middleware encryption layer for other cloud storages and later expanded to provide file storage for individuals and solopreneurs in 2013. The cloud provider’s servers only see the encrypted data in an encrypted format they are unable to read, thus offering the best of both worlds. “Everything you upload is encrypted before it’s uploaded, and only the uploader can access the documents.” “The business was built on end-to-end encryption,” Peter said.

They saw that safeguarding data before it went to the cloud was the key to maintaining security. The three founders realized that where clients stored data was less important than how they stored it. “You don’t really have control where your data is stored.” “Tresorit was founded by three university students who were privacy-conscious and didn’t want to store their data somewhere in the cloud,” he said. Tresorit helps businesses keep their data safe through end-to-end encryption.
