2026 Best Software Awards are here!See the list

Compare Tor and Tresorit

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Tor
Tor
Star Rating
(43)4.4 out of 5
Market Segments
Small-Business (52.4% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Tor
Tresorit
Tresorit
Star Rating
(251)4.5 out of 5
Market Segments
Small-Business (86.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Starting at $4.75 1 user / month
Browse all 12 pricing plans

Tor vs Tresorit

  • Tor and Tresorit both meet the requirements of our reviewers at a comparable rate.
  • When comparing quality of ongoing product support, reviewers felt that Tresorit is the preferred option.
  • For feature updates and roadmaps, our reviewers preferred the direction of Tor over Tresorit.
Pricing
Entry-Level Pricing
Tor
No pricing available
Tresorit
Personal Lite
Starting at $4.75
1 user / month
Browse all 12 pricing plans
Free Trial
Tor
No trial information available
Tresorit
Free Trial is available
Ratings
Meets Requirements
9.0
39
9.0
164
Ease of Use
8.5
39
9.0
167
Ease of Setup
9.3
5
9.1
76
Ease of Admin
10.0
5
8.8
64
Quality of Support
7.3
31
8.7
119
Has the product been a good partner in doing business?
Not enough data
8.9
62
Product Direction (% positive)
8.5
40
8.1
148
Features by Category
Not enough data
Not enough data
Signature Process
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - E-Signature
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Security and Scalability
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Platform
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Cloud Content CollaborationHide 22 FeaturesShow 22 Features
Not enough data
8.8
99
File Management
Not enough data
8.9
71
Not enough data
8.8
78
Not enough data
9.1
72
Not enough data
8.4
66
Not enough data
8.5
59
Agentic AI - Cloud Content Collaboration
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Collaboration
Not enough data
Feature Not Available
Not enough data
9.0
83
Not enough data
Feature Not Available
Not enough data
8.6
58
Administration
Not enough data
8.9
63
Not enough data
8.8
52
Not enough data
8.7
55
Not enough data
Feature Not Available
Not enough data
8.7
45
Not enough data
9.4
77
Platform
Not enough data
9.0
39
Not enough data
8.1
30
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Not enough data
Compatibility
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Online Backup
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Virtual Data Room (VDR)Hide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Platform Additional Functionality
Not enough data
Feature Not Available
Not enough data
Not enough data
Platform Basics
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Platform Content
Not enough data
Not enough data
Platform Data
Not enough data
Not enough data
Platform Performance
Not enough data
Not enough data
Not enough data
Feature Not Available
Not enough data
8.7
95
Security
Not enough data
9.6
85
Not enough data
8.6
48
Not enough data
9.2
68
Not enough data
8.8
60
Administration
Not enough data
8.6
58
Not enough data
7.8
44
Not enough data
8.5
47
Access Control
Not enough data
8.9
78
Not enough data
8.8
75
Not enough data
8.7
50
Not enough data
8.7
52
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Support
Not enough data
Not enough data
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Automation
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Not enough data
Encryption Techniques - Email Encryption
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Authentication, Verification, and Access Controls - Email Encryption
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Security Enhancements and Auditing - Email Encryption
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Integration, Compatibility, and Usability - Email Encryption
Not enough data
Not enough data
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Encryption
8.3
22
8.7
19
8.1
21
Feature Not Available
8.7
25
9.2
52
8.6
27
9.3
52
7.9
21
9.3
49
7.6
17
Feature Not Available
Compliance
8.6
19
9.1
42
8.7
21
8.8
31
9.3
20
8.9
38
Management
7.7
14
9.2
41
6.6
16
9.0
36
8.1
16
Feature Not Available
7.8
17
8.6
22
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reporting
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Tor
Tor
Tresorit
Tresorit
Tor and Tresorit are categorized as Encryption
Unique Categories
Tor
Tor has no unique categories
Reviews
Reviewers' Company Size
Tor
Tor
Small-Business(50 or fewer emp.)
52.4%
Mid-Market(51-1000 emp.)
26.2%
Enterprise(> 1000 emp.)
21.4%
Tresorit
Tresorit
Small-Business(50 or fewer emp.)
86.0%
Mid-Market(51-1000 emp.)
13.2%
Enterprise(> 1000 emp.)
0.8%
Reviewers' Industry
Tor
Tor
Computer Software
16.7%
Information Technology and Services
14.3%
Computer & Network Security
9.5%
Marketing and Advertising
4.8%
Internet
4.8%
Other
50.0%
Tresorit
Tresorit
Information Technology and Services
12.3%
Non-Profit Organization Management
7.0%
Computer Software
5.8%
Accounting
5.3%
Financial Services
4.1%
Other
65.4%
Alternatives
Tor
Tor Alternatives
Progress MOVEit
Progress MOVEit
Add Progress MOVEit
Keeper Password Manager
Keeper Password Manager
Add Keeper Password Manager
Signal
Signal
Add Signal
Virtru Email Encryption
Virtru Email Encryption
Add Virtru Email Encryption
Tresorit
Tresorit Alternatives
Box
Box
Add Box
Microsoft OneDrive for Business
Microsoft OneDrive
Add Microsoft OneDrive for Business
Egnyte
Egnyte
Add Egnyte
Progress ShareFile
Progress ShareFile
Add Progress ShareFile
Discussions
Tor
Tor Discussions
What is Tor used for?
1 Comment
Kerby R.
KR
To access the dark web, and remain anonymous.Read more
Monty the Mongoose crying
Tor has no more discussions with answers
Tresorit
Tresorit Discussions
What is end-to-end encryption?
2 Comments
Official Response from Tresorit
Using end-to-end encryption, Tresorit encrypts every file and relevant file metadata on your devices with unique, randomly generated encryption keys. These...Read more
What is Tresorit used for?
2 Comments
Josh P.
JP
Secure storage and sharing of filesRead more
Is Tresorit end-to-end encrypted?
2 Comments
jonas a.
JA
Yes, it is. That's why is safe.Read more