Tresorit Features
Platform (6)
Custom Branding
Custom branding can be applied through signature process
User, Role, and Access Management
Grant access to select data, features, objects, etc. based on the users, user role, groups, etc.
Performance and Reliability
Software is consistently available (up-time) and allows users to complete tasks quickly because they are not waiting for the software to respond to an action they took. This feature was mentioned in 39 Tresorit reviews.
Reporting and Auditing
Based on 30 Tresorit reviews. Access pre-built and custom reports to monitor user activity and storage
System of Record Integration
Integrates to systems other systems of record such as CRM, ERP, Outlook, Sharepoint
APIs
Enables custom integration to external systems
Signature Process (5)
Document Signing
Allows signor to easily and intuitively sign documents
Reminders and Expirations
Reminds signors of documents that are waiting to be signed and document expiration dates
Signature Workflow
Sendor/Adminstrators can easily set up and track documents through multiple signature steps
Reporting
Provides standard reports and easy creation of custom reports to manage signature process
Signature Document Creation
Easy to create signature blocks on all required electronic document types/formats
Security and Scalability (3)
Regulatory Compliance
Meets required regulartory compliances
Signature History and Audit
Tracks all document signing history to comply with required regulations
Enterprise Scalability
Provides features to allow scaling for large organizations
File Management (5)
Device Syncing
As reported in 71 Tresorit reviews. Provides functionality that manages file syncing between both PC and Mobile devices to ensure files are up to date no matter who or what device they are updated on
Web Interface
As reported in 78 Tresorit reviews. Ability to access documents via a web interface without a client being installed on a device
File Type Support
Supports all required file types including but not limited to: Google Docs, MS Office, images, videos, etc. This feature was mentioned in 72 Tresorit reviews.
Search
Can easily find files via a simple and/or advanced search This feature was mentioned in 66 Tresorit reviews.
Mobile Apps
iOS, Android and Windows phone apps provide functionality that enable user to perform same functions as they would on a PC This feature was mentioned in 59 Tresorit reviews.
Collaboration (2)
File Sharing
As reported in 81 Tresorit reviews. Allows users to share individual files/folders to persons outside or inside organization. Ability to assign edit or view only privileges.
Change Tracking / Audit Logs
Provides an audit log of changes and enables users to revert to a specific version 58 reviewers of Tresorit have provided feedback on this feature.
Administration (8)
User and Role Management
Enables administrator to provide segmented access to tool based on role. Easy to create new users and remove users. 63 reviewers of Tresorit have provided feedback on this feature.
Policies and Controls
Ability to control by user/group file/folder access, external sharing permissions, editing policies, device location restrictions, sharing by device, etc. This feature was mentioned in 51 Tresorit reviews.
Device Management
As reported in 55 Tresorit reviews. Admins can restrict access to files by device in the event of lost/stolen devices as well as users that no long work for organization. Also may provide ability to wipe files from devices remotely.
Storage Zones
Based on 45 Tresorit reviews. Choose data center your files should be stored at
Security
As reported in 75 Tresorit reviews. Stores and transfers files in secure environment
Reporting and Monitoring
Access pre-built and custom reports to monitor user activity and storage. 58 reviewers of Tresorit have provided feedback on this feature.
Breadth of Partner Applications
Based on 44 Tresorit reviews. To what extent are there partner applications readily available for integrating into this product? Partner applications typically provide complementary, best of breed functionality not offered natively in this product.
Auditing
Based on 47 Tresorit reviews. Documents access and alterations of the database for analytics and reporting.
Encryption (4)
Email Encryption
Encrypts the content of emails and their attachments. This feature was mentioned in 19 Tresorit reviews.
File Transfer Encryption
Protects data with within or as it leaves your secure or local network. 52 reviewers of Tresorit have provided feedback on this feature.
Data Encryption
Provide a level of encryption of data in transit, protecting sensitive data while it lives in the backup application. 52 reviewers of Tresorit have provided feedback on this feature.
Document Encryption
Provides a level of encryption for text documents. 49 reviewers of Tresorit have provided feedback on this feature.
Compliance (3)
Authentication
Allows administrators to set multi-factor authentication requirements including tokens, keys, or sms messaging This feature was mentioned in 42 Tresorit reviews.
Policy Enforcement
Based on 31 Tresorit reviews. Abilities to set standards for database security and risk management.
Access Management
Based on 38 Tresorit reviews. Allows administrators to set user access privileges to permit approved parties to access sensitive data.
Management (6)
Backup
Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster. This feature was mentioned in 41 Tresorit reviews.
Recovery
Decrypts datasets or files or allows users access to a backup database for reintegration. 36 reviewers of Tresorit have provided feedback on this feature.
Anomaly Detection
Based on 22 Tresorit reviews. Monitors activity within networks and alerts administrators when unusual activity occurs.
File Sharing
Gives users the abilitity to access or send backup files stored online.
Security Standards
The ability to set standards for asset and risk management.
Encrypted Storage
Provides some level of encryption of data in transit and sensitive data while it lives online.
Functionality (8)
Real-time Sync
Continuously updates backup files to reflect most recent changes and updates.
Storage Capacity
The ability to store large amounts of data or scale capacity to fit storage needs.
Versioning
Keeps track of incrementally changing versions of the same content, data, and files.
Mobile Backup Application
Users can view and download files from a mobile device.
Storage Scaling
Provides dynamic and scalable storage features.
Backup Support
Offers cloning ability and snapshot features to support backup. Provides redundancy and data protection.
File Security
Supports some level of built in security by encrypting file systems.
File Organization
Organizes information in logical formats specified through folders and access paths.
Platform Basics (3)
Document Permissions
Provides granular user permission options related to document viewing and editing
Mobile
Offers user access across mobile platforms
Document Security
Provides robust security options, such as two-factor authentication, single sign-on controls, or fingerprint scanning
Platform Content (1)
File Sharing
Has secure file sharing capabilities for internal or external sharing
Platform Additional Functionality (1)
Watermarks
Automatically generates watermarks on documents when it is downloaded, viewed or printed
Platform Data (1)
Reporting
Provides metrics around user history, such as document views and edits
Platform Performance (1)
Bulk Upload
Allows users to upload several files at once
Security (4)
Encrypted Storage
As reported in 84 Tresorit reviews. Provides some level of encryption of files and data in transit and sensitive information while it lives online.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. This feature was mentioned in 48 Tresorit reviews.
Data loss Prevention
As reported in 68 Tresorit reviews. Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Policy Enforcement
Allows administrators to set policies for security and data governance. 59 reviewers of Tresorit have provided feedback on this feature.
Access Control (4)
User, Role, and Access Management
Based on 78 Tresorit reviews. Allows administrators to provision access based on the individual user and their role.
Access Rights
Defines which users have access to the different modules of the software and how. 74 reviewers of Tresorit have provided feedback on this feature.
User Analytics
Allows for reporting and documentation of individual user behavior and privileges. 50 reviewers of Tresorit have provided feedback on this feature.
Compliance Monitoring
Based on 52 Tresorit reviews. Monitors data quality and send alerts based on violations or misuse.
Cloud Support (1)
Service Support
Additional services and support provided by leading hyperscalers.
Encryption Techniques - Email Encryption (3)
Encryption Algorithms
Supports various encryption algorithms including AES (Advanced Encryption Standard), RSA (Rivest-Shamir-Adleman), Twofish, and Pretty Good Privacy (PGP).
Transport Encryption
Encrypts the email during transit between email servers, preventing interception by third parties.
End-to-End Encryption
Encrypts the message on the sender's device and decrypts it only on the recipient's device, ensuring that only the sender and recipient can read it.
Authentication, Verification, and Access Controls - Email Encryption (2)
Revocation Mechanisms
Allows users to revoke access to encrypted emails or keys in case of compromise.
Access Controls
Enables users to set permissions on who can access, read, or modify their encrypted emails.
Security Enhancements and Auditing - Email Encryption (3)
Reporting
Generates reports on encryption usage, compliance status, and security incidents.
Audit Trails
Logs and tracks encryption-related activities for compliance, troubleshooting, and security analysis.
Data Loss Prevention (DLP)
Offers DLP features to prevent accidental or unauthorized transmission of sensitive information.
Integration, Compatibility, and Usability - Email Encryption (3)
User-Friendly Interfaces
Offers intuitive interfaces for sending, receiving, and managing encrypted emails.
Email Client Integration
Integrates seamlessly with popular email clients, including Gmail, Microsoft Outlook, and Thunderbird.
Automation
Automatically performs encryption and decryption processes to minimize user effort and errors.




