Average Ratings 0 Ratings
Average Ratings 9 Ratings
Description
Your workforce depends on mobility and the ability to access information from anywhere to maintain their productivity. However, this convenience can inadvertently expose your sensitive data to risks, especially if devices are lost or stolen, leading to potential synchronization from the cloud. To safeguard this vital information and adhere to regulatory standards, Symantec Endpoint Encryption offers robust protection by encrypting every file on the hard drive, employing a sector-by-sector method for enhanced security. The solution is versatile, compatible with Windows, Mac, tablets, self-encrypting drives, as well as removable media like USB drives, external hard drives, and DVDs. Additionally, Symantec Endpoint Encryption provides management capabilities for devices protected by BitLocker and File Vault, ensuring maximum flexibility. On the communication front, Symantec Gateway Email Encryption facilitates secure, centrally-managed interactions with clients and partners right at the network gateway, effectively reducing the risk of data breaches while maintaining compliance with regulations. For email communication on desktops, Symantec Desktop Email Encryption seamlessly encrypts and decrypts messages between internal users, enhancing overall security and efficiency in correspondence. This comprehensive approach to data protection not only fortifies security but also promotes trust in your organization's handling of sensitive information.
Description
Tresorit is a zero‑knowledge, end‑to‑end encrypted cloud collaboration platform designed for individuals and organizations that need uncompromising data security. It enables users to securely store, sync, and share sensitive files while ensuring that only the data owner and explicitly authorized recipients can access the content. Files are encrypted on the user’s device before upload, and encryption keys are never available to Tresorit, eliminating the risk of provider‑side data access or exposure.
Built as a privacy‑first alternative to conventional cloud services, Tresorit supports secure internal collaboration as well as controlled external data exchange. Teams can share files and folders with granular permission settings, revoke access at any time, and monitor activity to maintain full visibility and control. External sharing is protected through encrypted links and secure email delivery, replacing risky attachments and uncontrolled file transfers.
Tresorit also enables secure, long‑term collaboration with clients and partners through encrypted data rooms that centralize documents, tasks, and approvals in a single protected workspace. Integrated digital signatures allow documents to be reviewed and signed without leaving the encrypted environment, preserving security throughout the entire document lifecycle.
With advanced admin controls, auditability, and configurable data residency options, Tresorit is built to support strict regulatory and compliance requirements. By combining strong security with ease of use, Tresorit allows organizations to collaborate productively while maintaining confidentiality, ownership, and trust over their most sensitive data.
API Access
Has API
API Access
Has API
Integrations
Active Directory
Amazon Cognito
CA Auditor for z/OS
Gmail
Microsoft 365
Microsoft Entra ID
Microsoft Outlook
Microsoft Sentinel
Microsoft Teams
Okta
Integrations
Active Directory
Amazon Cognito
CA Auditor for z/OS
Gmail
Microsoft 365
Microsoft Entra ID
Microsoft Outlook
Microsoft Sentinel
Microsoft Teams
Okta
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$4.75/month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Broadcom
Founded
1991
Country
United States
Website
www.broadcom.com/products/cybersecurity/endpoint/end-user
Vendor Details
Company Name
Tresorit
Founded
2011
Country
Hungary
Website
tresorit.com
Product Features
Encryption
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking
Product Features
Cloud Storage
Access Control
Archiving & Retention
Backup
Data Migration
Data Synchronization
Encryption
File Sharing
Version Control
Collaboration
Brainstorming
Calendar Management
Chat / Messaging
Contact Management
Content Management
Document Management
Project Management
Real Time Editing
Task Management
Version Control
Video Conferencing
Content Collaboration
Client Portal
Cloud Storage
Digital Asset Management
Document Creation / Editing
Document Management
Electronic Signature
Feedback Management
File Sharing
Messaging / Discussion
Real-Time / Interactive Editing
Roles / Permissions
Search
Version Control
Video / Image Editing
Workflow / Approval Process
Document Management
Access Controls
Archiving & Retention
Collaboration Tools
Compliance Tracking
Document Archiving
Document Assembly
Document Capture
Document Conversion
Document Delivery
Document Indexing
Document Retention
Electronic Signature
Email Management
File Recovery
File Type Conversion
Forms Management
Full Text Search
Offline Access
Optical Character Recognition
Print Management
Version Control
Encryption
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking
File Sharing
Audit Trail
Chat / Messaging
Collaboration
Document Management
Drag & Drop
Electronic Signature
Encryption
File Synchronization
Search
User Management
Version Control
Workflow Management