Q&A with Tresorit: Secure and Streamline Your Transition to the Cloud

By Community Team

2020 was the year of genuine Digital Transformation for many firms and businesses. Cloud storage and file sharing via email was introduced to many sectors which relied on paper, or other outdated and analog means of storage and sharing. 

Tresorit is an end-to-end encrypted, cloud storage and content collaboration platform, where privacy is the primary focus and a strongly enforced right of the end user. 

The encrypted storage experts at Tresorit firmly believe in a private, secure cloud and we had a chat with VP of Product Péter Budai to tell us how the solutions of Tresorit can help you secure and streamline your transition to the cloud.

Q: What are the most challenging aspects of content collaboration today?

A: Due to Covid, many businesses had to migrate their operations to cloud providers to enable environments where employees can work remotely. However, collaborating internally is much different than sharing files with external partners, due to platform differences, or legacy software. These differences bring an inherent difficulty and vulnerability to collaboration as it is hard to prepare for every variable when transferring data from different systems. 

Tresorit offers a solution for this issue by making the requirements of a secure channel to be provided by one party only. Our end-to-end encryption extends to sharing links and email attachments, and our users can create File Requests, which enable external partners to upload files using an encrypted channel without having a Tresorit account. 

Q: Can you tell us more about these collaboration solutions? Who are they designed for?

A: Sure! We tried to incorporate requirements from many sectors, including ones with the most rigorous security and privacy needs, such as healthcare and legal. Thus we provide a highly granular, customizable collaboration suite, where you not only can set a password or a watermark for a shared file for example, but set an expiry date, download limit, email verification, or outright disable the option to download the shared file. 

We realized that aside from providing this granularity, we also have to provide admin and audit options for management and administration. Admins in a Tresorit account can create and audit detailed access logs, manage group, or individual permissions via policies and selectively restrict access to different features if necessary. 

Q: So in theory, this feature suite can be utilized by any business or firm, no matter the size or internal environment?

A: Yes, we’ve built Tresorit’s collaboration options to be applicable ranging from the individual to the largest enterprises. 

For larger firms, who are already heavily invested in custom infrastructure, Tresorit can be a tool to integrate and use for secure content collaboration. We’ve recently launched our SSO tool, which can work together with existing Azure AD, Octa and soon, Google Single Sign-on systems, making integrating Tresorit into the company workflow relatively painless and easy.

Tresorit is a great tool when applied to specific parts of a company, such as handling and sharing HR documents, scanning, watermarking and selectively sharing contracts and setting up encrypted folders with different access rights and permissions so that the company content is truly only available for those who need to have access.

We’ve also implemented a deleted file recovery system, so that in case of accidental deletions, or – a worst case scenario – a ransomware attack, the most important files of a company can always be recovered or reverted to a previous, unaffected version.

To sum it all up, we think that Tresorit has arrived at a stage where we can offer a truly secure, feature-rich suite that can take a rightful place among other software that any company uses.

Q: An interesting question with encrypted solutions and the cloud is, how can we trust Tresorit? 

A: Indeed, trust and verifiable security is of utmost importance when you want to store your most valued files and documents in the cloud. The technology behind end-to-end encryption, the mathematical security of it is the basis of trust. It is such a computational impossibility to break, that you don’t have to trust the people, you can trust the numbers. We encrypt everything to know nothing.

Besides the scientific facts of the technology, we have published a number of explanations, certificates and security reports, from Ernst and Young for example. We’ve also acquired a number of international certifications such as ISO 27001 and we can also provide written HIPAA certifications for our healthcare clients. We also acknowledged that physical data storage location is a high-priority legal question for many of our customers, so we’re proud to offer numerous options globally to select where you’d like to store your data. 

For more information on how to accelerate your businesses transition to the cloud, visit our business homepage here. Or, if you’d simply like to find more about what makes us tick, browse our library of podcast episodes here.’

Related Categories