Tresorit
Tresorit is a zero‑knowledge, end‑to‑end encrypted cloud collaboration platform built for organizations that handle sensitive data. It enables secure file storage, syncing, and sharing while ensuring that only data owners and authorized recipients can access content—Tresorit itself cannot. Files are encrypted on the user’s device before upload and remain protected throughout storage and sharing.
The platform supports secure internal collaboration and external data exchange through encrypted file sharing, secure email links, digital signatures, and encrypted data rooms for client and partner collaboration. Tresorit provides granular access controls, auditability, and configurable data residency to help meet strict security and compliance requirements. Designed as a privacy‑first alternative to traditional cloud tools, Tresorit allows teams to collaborate productively without compromising control, confidentiality, or regulatory obligations.
Learn more
Rclone
Rclone is a command-line program to manage files on cloud storage. It is a feature-rich alternative to cloud vendors' web storage interfaces. Over 40 cloud storage products support rclone including S3 object stores, business & consumer file storage services, as well as standard transfer protocols. Rclone has powerful cloud equivalents to the Unix commands rsync, cp, mv, mount, ls, ncdu, tree, rm, and cat. Rclone's familiar syntax includes shell pipeline support, and --dry-run protection. It is used at the command line, in scripts, or via its API. Rclone really looks after your data. It preserves timestamps and verifies checksums at all times. Transfers over limited bandwidth; intermittent connections, or subject to quota can be restarted, from the last good file transferred. You can check the integrity of your files. Where possible, rclone employs server-side transfers to minimize local bandwidth use and transfers from one provider to another without using the local disk.
Learn more
Titaniam
Titaniam provides enterprises and SaaS vendors with a full suite of data security/privacy controls in a single, enterprise grade solution. This includes highly advanced options such as encryption-in-use that enables encrypted search and analytics without decryption, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. If attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of 3+ categories of solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner, IDC, and TAG Cyber and has won coveted industry awards e.g. SINET16 and at RSAC2022.
Learn more
Lockystar
Lockystar is a file encryption application. It allows you to encrypt individual files wherever they are: in your cloud or on your hard drive.
It's an easy-to-use application, whose goal is to provide a robust security solution to as many people as possible.
Lockystar is zero-knowledge and uses end-to-end encryption: no one but you can decrypt your files.
Learn more