

The activity section provides a snapshot of which user logged from what device and IP address. There are pie charts with specifics on storage per user, as well as operating systems used. The administration web interface has three tabs: activity, users and devices, and groups and policies.Īctivity: This is a textual and graphical overview on high level Tresorit usage within the organization. A new blog post explains how they implemented the whole “zero knowledge” (your data cannot bee seen by them) concept into the web access interface. If it seems strange that web access is called a new feature in 2015, check out this blog post from 2013, in which security-minded developers of Tresorit specified that they couldn’t guarantee the highest level of security for web access, so this feature was put aside until this could be achieved. One of the things that I considered to be a major negative aspect of Tresorit was fixed just a couple of weeks ago, when the company introduced web access to the encrypted files.

Tresors shared by other users will become visible inside the application. Versioning history, as well as detailed specifications about activities (added, edited, deleted, etc.) is available for all the files. The files inside the Tresors/local folders are unencrypted, but when they are synched to the cloud, their online versions are encrypted. Every Tresor corresponds to a local folder, which the user can work with even outside Tresorit. Tresors are placeholders for the files that you will manage. I’ll go into more details on these links later on.įrom a client’s standpoint, generating and storing data begins with creating specific Tresors. There aren’t many options here, as the functionality from the client perspective is focused on encrypting and sharing files and managing encrypted links. The installation was pretty straightforward and the application itself looks clean and is easy to use.

#Tresorit mac mac#
I’m an OS X user, so I am basing my experience on the Mac version of the product. Tresorit is also among the first apps offered on the Blackphone Silent Store.
#Tresorit mac windows#
The Tresorit desktop application is available for Windows and OS X systems, iOS- and Android-running mobile devices, as well as Windows Phone and Blackberry devices. For the geek in you, a detailed paper on it was published at the 2012 edition of Parallel Processing Workshops (ICPPW). The latter is a key management protocol that allows a group of users to agree on a shared group key, which can be used to protect shared data stored remotely in the cloud. Invitation and key agreement is done with ICE and ITGDH. Transport Layer Security (TLS) is used between the client’s workstation and the Tresorit cloud service. File operations are authenticated by using RSA-2048 signatures applied on SHA-512 hashes. Their datacenters, made disaster proof and protected by 24/7 physical security, are located in the European Union and are HIPAA and ISO27001:2013 compliant.Īll files uploaded to the cloud are encrypted, client-side, with AES-256 encryption. Also, the company handles the data under strict Swiss privacy laws. In the “Snowden era” it is important to note that Tresorit doesn’t store any aspect of the crypto process that could make anyone else able to access your files. One of Tresorit’s major advantages is a patent-pending security system where both the encryption and decryption is done on the client side.

The service provides end-to-end encryption for data in motion, along with all the enterprise functions related to managing user behavior and enforcing the policies for sharing the data in the most secure way possible. Tresorit for Business is a solution that, among other things, helps organizations with managing, protecting and preventing leaks of their corporate data. In the cloud computing era, companies need to be proactive on secure collaboration and file sharing.
