Security & encryption you can trust

Tresorit provides a novel approach to secure cloud storage and collaboration by using end-to-end encryption

Highest level of encryption

Highest level of encryption

Tresorit uses end-to-end encryption to guarantee the security of your files in the cloud.

  • End-to-End Encryption

    Using end-to-end encryption, Tresorit encrypts every file and relevant file metadata on your devices with unique, randomly generated encryption keys. These keys are never sent to our servers in unencrypted format. Accessing files is only possible with a user’s unique decryption key. Learn more about our encryption

  • Cryptographic key sharing

    Tresorit is based on industry-standard public key cryptography that has been thoroughly analyzed by experts and declared secure. Public key cryptography guarantees that even Tresorit cannot access the shared keys. This key sharing is based on RSA-4096 with OAEP padding scheme (see RFC2437), used in group mode, and PKI certificates, combining it with a tree of symmetric keys. Learn more about our encryption

  • Client-side integrity protection

    Tresorit guarantees that the files's content cannot be modified without your knowledge, even if somebody hacks our system. Tresorit clients apply a Message Authentication Code (MAC) to each file’s content, with a key known only to the user’s client and those they share the file with, but not by the server. Learn more about our encryption

Centralized control over information

Centralized control over information

Set up security policies on your Admin Center to avoid accidental breaches caused by employee errors.

  • Define security policies

    The owner and admins of a Tresorit Business Account can apply policy templates to a set of users and create different policies to each template. Also, the admins can modify these policies at any moment. Policy templates include: 2-Step Verification, IP filtering, Timeout policies, Allowed Devices and Sharing policies.

  • Monitor device and user statistics

    Admins can monitor and decide which devices are allowed to be used to access files within your company, and where users are allowed to log into the company account to safeguard business-critical documents.

  • Revoke access from users and devices

    Tresorit Advanced Control enables Tresorit Business admins to enhance the security of their organization by resetting their users' lost passwords and revoke access from lost or stolen devices. Learn more about Advanced Control

  • Restore data lost due to ransomware

    Ransomware is a growing security risk for businesses. Easily recover your deleted files that are lost if you fall victim to a malware attack. Restore files simply when you delete them by accident. Learn more about Ransomware protection

Secure infrastructure

Secure infrastructure

Tresorit's datacenters are constantly guarded to prevent unauthorized access and constructed to protect against environmental threats.

  • Redundant storage

    Data uploaded to Tresorit is mirrored to multiple storage nodes in a datacenter, creating locally-redundant copies. This mitigates risk of data loss and ensures high availability at the same time. See Service Status History

  • 24/7 monitoring and physical security

    Tresorit servers are in highly secure, Microsoft Azure data centers in multiple countries in the EU, in Switzerland and North America. These data centers are constantly guarded to prevent unauthorized access and constructed to protect against environmental threats.

  • Continuous patching

    Tresorit applies all patches of third party system components continuously, and updates Tresorit server and client software regularly to ensure we run the latest, most secure versions.



Tresorit helps your business ensure compliance with data protection regulations.

  • Certified datacenters

    The data centers used by Tresorit are audited for ISO27001:2005, SSAE 16 and several other certifications. We use Microsoft Azure data centers located in the EU, in Ireland. Learn more about our data centers

  • ISO 27001

    Tresorit has a certification for compliance with ISO 27001:2013. Tresorit was audited and certified by TÜV Rheinland, an independent third-party auditor. Our compliance with this internationally-recognized standard and code of practice is evidence of our commitment to information security at every level of our organization

  • GDPR

    The GDPR highlights encryption as one of the technology measures to ensure data protection and compliance. With Tresorit's end-to-end encryption technology, your encryption keys that unlock your data are stored on the client side, on your device. Unlike in-transit or at-rest encryption, only you and those who you share with have access to the information. Learn more about GDPR and encryption


    With its zero-knowledge, end-to-end encrypted technology, Tresorit offers a HIPAA compliant cloud storage solution. Tresorit signs HIPAA Business Associate Agreements (BAA) for customers, who are seeking HIPAA compliance to safeguard Protected Health Information (PHI). Learn more about HIPAA compliance



Privacy is even more important when it comes to sharing and syncing files in the cloud.

  • Swiss privacy laws

    Tresorit handles data under Swiss privacy laws that provide stronger protection than similar laws in the US or even the EU.

  • Transparency Report

    Tresorit is transparent about how we respond to international and Swiss government data requests. Read our report here.

  • Non-convergent cryptography

    Only a few providers offer end-to-end encryption, but by using so-called convergent cryptography they sacrifice confidentiality to save storage space. The non-convergent cryptography used by Tresorit makes it impossible to determine when your content matches others’ content in the cloud, which could leak valuable data about you to outside observers.

“Tresorit is among the top companies that compete in secure cloud storage, and it offers lots of flexibility for businesses.”

– Tom's IT Pro

Keep control over your files