Tresorit Features
Platform (6)
Custom Branding
Custom branding can be applied through signature process
User, Role, and Access Management
Grant access to select data, features, objects, etc. based on the users, user role, groups, etc.
Performance and Reliability
Based on 39 Tresorit reviews.
Software is consistently available (up-time) and allows users to complete tasks quickly because they are not waiting for the software to respond to an action they took.
Reporting and Auditing
As reported in 30 Tresorit reviews.
Access pre-built and custom reports to monitor user activity and storage
System of Record Integration
Integrates to systems other systems of record such as CRM, ERP, Outlook, Sharepoint
APIs
Enables custom integration to external systems
Signature Process (5)
Document Signing
Allows signor to easily and intuitively sign documents
Reminders and Expirations
Reminds signors of documents that are waiting to be signed and document expiration dates
Signature Workflow
Sendor/Adminstrators can easily set up and track documents through multiple signature steps
Reporting
Provides standard reports and easy creation of custom reports to manage signature process
Signature Document Creation
Easy to create signature blocks on all required electronic document types/formats
Security and Scalability (3)
Regulatory Compliance
Meets required regulartory compliances
Signature History and Audit
Tracks all document signing history to comply with required regulations
Enterprise Scalability
Provides features to allow scaling for large organizations
File Management (5)
Device Syncing
Based on 71 Tresorit reviews.
Provides functionality that manages file syncing between both PC and Mobile devices to ensure files are up to date no matter who or what device they are updated on
Web Interface
This feature was mentioned in 78 Tresorit reviews.
Ability to access documents via a web interface without a client being installed on a device
File Type Support
72 reviewers of Tresorit have provided feedback on this feature.
Supports all required file types including but not limited to: Google Docs, MS Office, images, videos, etc.
Search
This feature was mentioned in 66 Tresorit reviews.
Can easily find files via a simple and/or advanced search
Mobile Apps
As reported in 59 Tresorit reviews.
iOS, Android and Windows phone apps provide functionality that enable user to perform same functions as they would on a PC
Collaboration (2)
File Sharing
83 reviewers of Tresorit have provided feedback on this feature.
Allows users to share individual files/folders to persons outside or inside organization. Ability to assign edit or view only privileges.
Change Tracking / Audit Logs
58 reviewers of Tresorit have provided feedback on this feature.
Provides an audit log of changes and enables users to revert to a specific version
Administration (11)
User and Role Management
Based on 63 Tresorit reviews.
Enables administrator to provide segmented access to tool based on role. Easy to create new users and remove users.
Policies and Controls
This feature was mentioned in 52 Tresorit reviews.
Ability to control by user/group file/folder access, external sharing permissions, editing policies, device location restrictions, sharing by device, etc.
Device Management
55 reviewers of Tresorit have provided feedback on this feature.
Admins can restrict access to files by device in the event of lost/stolen devices as well as users that no long work for organization. Also may provide ability to wipe files from devices remotely.
Storage Zones
Based on 45 Tresorit reviews.
Choose data center your files should be stored at
Security
As reported in 77 Tresorit reviews.
Stores and transfers files in secure environment
Auditing
Documents access and alterations of the database for analytics and reporting.
Data Discovery
Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems.
Access Control
Supports LDAP Protocol to enable access control and governance.
Reporting and Monitoring
This feature was mentioned in 58 Tresorit reviews.
Access pre-built and custom reports to monitor user activity and storage.
Breadth of Partner Applications
44 reviewers of Tresorit have provided feedback on this feature.
To what extent are there partner applications readily available for integrating into this product? Partner applications typically provide complementary, best of breed functionality not offered natively in this product.
Auditing
47 reviewers of Tresorit have provided feedback on this feature.
Documents access and alterations of the database for analytics and reporting.
Encryption (4)
Email Encryption
As reported in 19 Tresorit reviews.
Encrypts the content of emails and their attachments.
File Transfer Encryption
As reported in 52 Tresorit reviews.
Protects data with within or as it leaves your secure or local network.
Data Encryption
Based on 52 Tresorit reviews.
Provide a level of encryption of data in transit, protecting sensitive data while it lives in the backup application.
Document Encryption
As reported in 49 Tresorit reviews.
Provides a level of encryption for text documents.
Compliance (3)
Authentication
42 reviewers of Tresorit have provided feedback on this feature.
Allows administrators to set multi-factor authentication requirements including tokens, keys, or sms messaging
Policy Enforcement
Based on 31 Tresorit reviews.
Abilities to set standards for database security and risk management.
Access Management
This feature was mentioned in 38 Tresorit reviews.
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
Management (6)
Backup
This feature was mentioned in 41 Tresorit reviews.
Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster.
Recovery
This feature was mentioned in 36 Tresorit reviews.
Decrypts datasets or files or allows users access to a backup database for reintegration.
Anomaly Detection
This feature was mentioned in 22 Tresorit reviews.
Monitors activity within networks and alerts administrators when unusual activity occurs.
File Sharing
Gives users the abilitity to access or send backup files stored online.
Security Standards
The ability to set standards for asset and risk management.
Encrypted Storage
Provides some level of encryption of data in transit and sensitive data while it lives online.
Functionality (8)
Real-time Sync
Continuously updates backup files to reflect most recent changes and updates.
Storage Capacity
The ability to store large amounts of data or scale capacity to fit storage needs.
Versioning
Keeps track of incrementally changing versions of the same content, data, and files.
Mobile Backup Application
Users can view and download files from a mobile device.
Storage Scaling
Provides dynamic and scalable storage features.
Backup Support
Offers cloning ability and snapshot features to support backup. Provides redundancy and data protection.
File Security
Supports some level of built in security by encrypting file systems.
File Organization
Organizes information in logical formats specified through folders and access paths.
Data Protection (5)
Data Masking
Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.
Data Encryption/Security
Manages policies for user data access and data encryption.
Data loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Sensitive Data Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Analysis (3)
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse.
User Analytics
Allows for reporting and documentation of individual user behavior and privileges.
Platform Basics (3)
Document Permissions
Provides granular user permission options related to document viewing and editing
Mobile
Offers user access across mobile platforms
Document Security
Provides robust security options, such as two-factor authentication, single sign-on controls, or fingerprint scanning
Platform Content (1)
File Sharing
Has secure file sharing capabilities for internal or external sharing
Platform Additional Functionality (1)
Watermarks
Automatically generates watermarks on documents when it is downloaded, viewed or printed
Platform Data (1)
Reporting
Provides metrics around user history, such as document views and edits
Platform Performance (1)
Bulk Upload
Allows users to upload several files at once
Security (4)
Encrypted Storage
This feature was mentioned in 85 Tresorit reviews.
Provides some level of encryption of files and data in transit and sensitive information while it lives online.
Anomoly Detection
48 reviewers of Tresorit have provided feedback on this feature.
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data loss Prevention
As reported in 68 Tresorit reviews.
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Policy Enforcement
This feature was mentioned in 60 Tresorit reviews.
Allows administrators to set policies for security and data governance.
Access Control (4)
User, Role, and Access Management
As reported in 78 Tresorit reviews.
Allows administrators to provision access based on the individual user and their role.
Access Rights
75 reviewers of Tresorit have provided feedback on this feature.
Defines which users have access to the different modules of the software and how.
User Analytics
Based on 50 Tresorit reviews.
Allows for reporting and documentation of individual user behavior and privileges.
Compliance Monitoring
As reported in 52 Tresorit reviews.
Monitors data quality and send alerts based on violations or misuse.
Cloud Support (1)
Service Support
Additional services and support provided by leading hyperscalers.
Encryption Techniques - Email Encryption (3)
Encryption Algorithms
Supports various encryption algorithms including AES (Advanced Encryption Standard), RSA (Rivest-Shamir-Adleman), Twofish, and Pretty Good Privacy (PGP).
Transport Encryption
Encrypts the email during transit between email servers, preventing interception by third parties.
End-to-End Encryption
Encrypts the message on the sender's device and decrypts it only on the recipient's device, ensuring that only the sender and recipient can read it.
Authentication, Verification, and Access Controls - Email Encryption (2)
Revocation Mechanisms
Allows users to revoke access to encrypted emails or keys in case of compromise.
Access Controls
Enables users to set permissions on who can access, read, or modify their encrypted emails.
Security Enhancements and Auditing - Email Encryption (3)
Reporting
Generates reports on encryption usage, compliance status, and security incidents.
Audit Trails
Logs and tracks encryption-related activities for compliance, troubleshooting, and security analysis.
Data Loss Prevention (DLP)
Offers DLP features to prevent accidental or unauthorized transmission of sensitive information.
Integration, Compatibility, and Usability - Email Encryption (3)
User-Friendly Interfaces
Offers intuitive interfaces for sending, receiving, and managing encrypted emails.
Email Client Integration
Integrates seamlessly with popular email clients, including Gmail, Microsoft Outlook, and Thunderbird.
Automation
Automatically performs encryption and decryption processes to minimize user effort and errors.




