Tresorit Features
Platform (6)
Custom Branding
Custom branding can be applied through signature process
User, Role, and Access Management
Grant access to select data, features, objects, etc. based on the users, user role, groups, etc.
Performance and Reliability
As reported in 39 Tresorit reviews.
Software is consistently available (up-time) and allows users to complete tasks quickly because they are not waiting for the software to respond to an action they took.
Reporting and Auditing
This feature was mentioned in 30 Tresorit reviews.
Access pre-built and custom reports to monitor user activity and storage
System of Record Integration
Integrates to systems other systems of record such as CRM, ERP, Outlook, Sharepoint
APIs
Enables custom integration to external systems
Signature Process (5)
Document Signing
Allows signor to easily and intuitively sign documents
Reminders and Expirations
Reminds signors of documents that are waiting to be signed and document expiration dates
Signature Workflow
Sendor/Adminstrators can easily set up and track documents through multiple signature steps
Reporting
Provides standard reports and easy creation of custom reports to manage signature process
Signature Document Creation
Easy to create signature blocks on all required electronic document types/formats
Security and Scalability (3)
Regulatory Compliance
Meets required regulartory compliances
Signature History and Audit
Tracks all document signing history to comply with required regulations
Enterprise Scalability
Provides features to allow scaling for large organizations
File Management (5)
Device Syncing
Based on 71 Tresorit reviews.
Provides functionality that manages file syncing between both PC and Mobile devices to ensure files are up to date no matter who or what device they are updated on
Web Interface
78 reviewers of Tresorit have provided feedback on this feature.
Ability to access documents via a web interface without a client being installed on a device
File Type Support
72 reviewers of Tresorit have provided feedback on this feature.
Supports all required file types including but not limited to: Google Docs, MS Office, images, videos, etc.
Search
Based on 66 Tresorit reviews.
Can easily find files via a simple and/or advanced search
Mobile Apps
Based on 59 Tresorit reviews.
iOS, Android and Windows phone apps provide functionality that enable user to perform same functions as they would on a PC
Collaboration (2)
File Sharing
This feature was mentioned in 84 Tresorit reviews.
Allows users to share individual files/folders to persons outside or inside organization. Ability to assign edit or view only privileges.
Change Tracking / Audit Logs
As reported in 58 Tresorit reviews.
Provides an audit log of changes and enables users to revert to a specific version
Administration (11)
User and Role Management
63 reviewers of Tresorit have provided feedback on this feature.
Enables administrator to provide segmented access to tool based on role. Easy to create new users and remove users.
Policies and Controls
As reported in 53 Tresorit reviews.
Ability to control by user/group file/folder access, external sharing permissions, editing policies, device location restrictions, sharing by device, etc.
Device Management
Based on 55 Tresorit reviews.
Admins can restrict access to files by device in the event of lost/stolen devices as well as users that no long work for organization. Also may provide ability to wipe files from devices remotely.
Storage Zones
46 reviewers of Tresorit have provided feedback on this feature.
Choose data center your files should be stored at
Security
78 reviewers of Tresorit have provided feedback on this feature.
Stores and transfers files in secure environment
Auditing
Documents access and alterations of the database for analytics and reporting.
Data Discovery
Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems.
Access Control
Supports LDAP Protocol to enable access control and governance.
Reporting and Monitoring
As reported in 58 Tresorit reviews.
Access pre-built and custom reports to monitor user activity and storage.
Breadth of Partner Applications
This feature was mentioned in 44 Tresorit reviews.
To what extent are there partner applications readily available for integrating into this product? Partner applications typically provide complementary, best of breed functionality not offered natively in this product.
Auditing
As reported in 47 Tresorit reviews.
Documents access and alterations of the database for analytics and reporting.
Encryption (4)
Email Encryption
As reported in 19 Tresorit reviews.
Encrypts the content of emails and their attachments.
File Transfer Encryption
Based on 52 Tresorit reviews.
Protects data with within or as it leaves your secure or local network.
Data Encryption
Based on 52 Tresorit reviews.
Provide a level of encryption of data in transit, protecting sensitive data while it lives in the backup application.
Document Encryption
As reported in 49 Tresorit reviews.
Provides a level of encryption for text documents.
Compliance (3)
Authentication
This feature was mentioned in 42 Tresorit reviews.
Allows administrators to set multi-factor authentication requirements including tokens, keys, or sms messaging
Policy Enforcement
As reported in 31 Tresorit reviews.
Abilities to set standards for database security and risk management.
Access Management
38 reviewers of Tresorit have provided feedback on this feature.
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
Management (6)
Backup
41 reviewers of Tresorit have provided feedback on this feature.
Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster.
Recovery
36 reviewers of Tresorit have provided feedback on this feature.
Decrypts datasets or files or allows users access to a backup database for reintegration.
Anomaly Detection
Based on 22 Tresorit reviews.
Monitors activity within networks and alerts administrators when unusual activity occurs.
File Sharing
Gives users the abilitity to access or send backup files stored online.
Security Standards
The ability to set standards for asset and risk management.
Encrypted Storage
Provides some level of encryption of data in transit and sensitive data while it lives online.
Functionality (8)
Real-time Sync
Continuously updates backup files to reflect most recent changes and updates.
Storage Capacity
The ability to store large amounts of data or scale capacity to fit storage needs.
Versioning
Keeps track of incrementally changing versions of the same content, data, and files.
Mobile Backup Application
Users can view and download files from a mobile device.
Storage Scaling
Provides dynamic and scalable storage features.
Backup Support
Offers cloning ability and snapshot features to support backup. Provides redundancy and data protection.
File Security
Supports some level of built in security by encrypting file systems.
File Organization
Organizes information in logical formats specified through folders and access paths.
Data Protection (5)
Data Masking
Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.
Data Encryption/Security
Manages policies for user data access and data encryption.
Data loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Sensitive Data Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Analysis (3)
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse.
User Analytics
Allows for reporting and documentation of individual user behavior and privileges.
Platform Basics (3)
Document Permissions
Provides granular user permission options related to document viewing and editing
Mobile
Offers user access across mobile platforms
Document Security
Provides robust security options, such as two-factor authentication, single sign-on controls, or fingerprint scanning
Platform Content (1)
File Sharing
Has secure file sharing capabilities for internal or external sharing
Platform Additional Functionality (1)
Watermarks
Automatically generates watermarks on documents when it is downloaded, viewed or printed
Platform Data (1)
Reporting
Provides metrics around user history, such as document views and edits
Platform Performance (1)
Bulk Upload
Allows users to upload several files at once
Security (4)
Encrypted Storage
85 reviewers of Tresorit have provided feedback on this feature.
Provides some level of encryption of files and data in transit and sensitive information while it lives online.
Anomoly Detection
Based on 48 Tresorit reviews.
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data loss Prevention
This feature was mentioned in 68 Tresorit reviews.
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Policy Enforcement
Based on 60 Tresorit reviews.
Allows administrators to set policies for security and data governance.
Access Control (4)
User, Role, and Access Management
78 reviewers of Tresorit have provided feedback on this feature.
Allows administrators to provision access based on the individual user and their role.
Access Rights
75 reviewers of Tresorit have provided feedback on this feature.
Defines which users have access to the different modules of the software and how.
User Analytics
Based on 50 Tresorit reviews.
Allows for reporting and documentation of individual user behavior and privileges.
Compliance Monitoring
52 reviewers of Tresorit have provided feedback on this feature.
Monitors data quality and send alerts based on violations or misuse.
Cloud Support (1)
Service Support
Additional services and support provided by leading hyperscalers.
Encryption Techniques - Email Encryption (3)
Encryption Algorithms
Supports various encryption algorithms including AES (Advanced Encryption Standard), RSA (Rivest-Shamir-Adleman), Twofish, and Pretty Good Privacy (PGP).
Transport Encryption
Encrypts the email during transit between email servers, preventing interception by third parties.
End-to-End Encryption
Encrypts the message on the sender's device and decrypts it only on the recipient's device, ensuring that only the sender and recipient can read it.
Authentication, Verification, and Access Controls - Email Encryption (2)
Revocation Mechanisms
Allows users to revoke access to encrypted emails or keys in case of compromise.
Access Controls
Enables users to set permissions on who can access, read, or modify their encrypted emails.
Security Enhancements and Auditing - Email Encryption (3)
Reporting
Generates reports on encryption usage, compliance status, and security incidents.
Audit Trails
Logs and tracks encryption-related activities for compliance, troubleshooting, and security analysis.
Data Loss Prevention (DLP)
Offers DLP features to prevent accidental or unauthorized transmission of sensitive information.
Integration, Compatibility, and Usability - Email Encryption (3)
User-Friendly Interfaces
Offers intuitive interfaces for sending, receiving, and managing encrypted emails.
Email Client Integration
Integrates seamlessly with popular email clients, including Gmail, Microsoft Outlook, and Thunderbird.
Automation
Automatically performs encryption and decryption processes to minimize user effort and errors.




