Tresorit

Tresorit
Operating system Windows, macOS, Android, iOS, Windows Phone, Linux
Available in English, French, German, Hungarian, Spanish
Type Cloud storage
License Proprietary software
Website tresorit.com

Tresorit is an online cloud storage service based in Switzerland and Hungary that emphasizes enhanced security and data encryption for Businesses and individuals/freelancers. The Business version offers up to 1TB of storage space per user (the Solo version offers 2TB for one user) and extra security features such as DRM,[1] granular access levels and other functions which aim to create a safer collaborative environment.[2] Tresorit has been likened to a high-security alternative to Dropbox.[3][4]

Tresorit's service is accessible through client desktop software, web-based application and mobile apps.[5] Currently, the software is available for Windows, macOS, Android, Windows Phone 8, iOS, and Linux.[6]

History

Tresorit was founded in 2011 by Hungarian programmers Istvan Lam, who remains CEO, Szilveszter Szebeni, who is currently CIO and Gyorgy Szilagyi, who is the CPO of the company.[7]

Tresorit officially launched its client-side encrypted cloud storage service after emerging from its stealth beta in April 2014.[8]

In August 2015, Wuala (owned by LaCie and Seagate), a pioneer of secure cloud storage, announced it was closing its service after 7 years, and recommended their users to choose Tresorit as their secure cloud alternative.[9][10]

By the end of 2016, Tresorit launched a beta of the software development kit (SDK) ZeroKit.[11] In January 2017, Apple's SDK project CareKit announced the option for mobile app developers using CareKit to integrate ZeroKit, enabling zero knowledge user authentication and encryption for medical and health apps.[12][13]

Technology

Tresorit encrypts files using client-side encryption with AES-256 before uploading them. Files are also secured by HMAC message authentication codes applied on SHA-512 hashes.[14]

"Tresors" (German for vaults) are encrypted counterparts of uploaded directories. Tresors automatically sync with the cloud as files are added or removed from them, similar to Box.com and Dropbox's desktop software. The main difference between Tresorit and its competition is that Tresorit applies AES-256 client-side encryption to files while they are still local and then uploads them to the cloud. The company claims that due to its end-to-end encryption, users can share protected files and folders with others and work together on them, keeping the documents synced and secure in every step of the process.[15] There are additional layers of security, but the core privacy feature of the service is that the encryption key never leaves the user:[16] Using Zero-Knowledge encryption protocols,[17] Tresorit is not in possession of the users’ authentication data, so the content of files cannot be accessed from their servers nor delivered to authorities upon request.[18]

Hacking contest

In 2013 and 2014, Tresorit hosted a hacking contest offering $10,000 to anyone who hacked their data encryption methods to gain access to their servers.[19] After some months, the reward was increased to $25,000 and later to $50,000, challenging experts from institutions like Harvard, Stanford or MIT.[20][21][22] The contest ran for 468 days and according to the company, nobody was able to break the encryption. [23]

Reception

Tresorit has received a number of nominations and awards. Up-Cloud Rewards named it one of the top 5 Cloud security solutions for 2012.[24][25] Early 2016, Forbes listed Tresorit's cofounder Istvan Lam among the European "30 under 30".[26] In 2017, Tresorit was listed as finalist in the Cybersecurity Excellence Awards, category Encryption.[27]

See also

References

  1. "Tresorit Brings DRM To Cloud Data". Forbes. Retrieved 2016-02-22.
  2. Kucan, Berislav. "Tresorit for Business". Help Net Security. Retrieved 2016-02-22.
  3. "Ultra-secure storage". CBS News. 2013-04-25. Retrieved 2013-06-18.
  4. http://www.reviewtechnica.com/2014/07/tresorit-review.html
  5. "Our biggest update yet in 2015 – work securely without installing Tresorit, using your browser". 2015-07-29. Retrieved 2016-01-11.
  6. "Weekend Recap: Intel CEO on iPhone, Handbrake 0.9.9, Tresorit for Mac Teased | Mac|Life". Maclife.com. 2013-05-20. Retrieved 2013-06-18.
  7. "Management - Tresorit | We encrypt - You share". Tresorit. Archived from the original on 11 June 2013. Retrieved 18 June 2013.
  8. Tresorit opens its end-to-end encrypted file-sharing service to the public
  9. Seagate and LaCie spark security concerns by killing off Wuala cloud storage
  10. Wuala cloud storage to shut down, offers Tresorit as potential new home
  11. "0_kit by Tresorit: End-to-end Encryption for Your App". Retrieved 2017-01-11.
  12. "CareKit + ZeroKit: Protect patient data in the cloud". CareKit. Retrieved 2017-01-11.
  13. Hinchliffe, Emma. "Apple enhances security options for its CareKit apps". Mashable. Retrieved 2017-01-11.
  14. Get 50GB of Free, Encrypted Online Storage from Tresorit
  15. "Cloud Storage Security - Secure Cloud Storage from Tresorit". tresorit.com. Retrieved 2018-01-09.
  16. Tresorit takes on PRISM-provoked worries with encrypted cloud storage
  17. https://tresorit.com/blog/zero-knowledge-encryption/
  18. "Here is Tresorit's first transparency report". Tresorit Blog. 2017-12-14. Retrieved 2018-01-09.
  19. "Secure cloud storage outfit Tresorit posts $10K hacker bounty — Tech News and Analysis". Gigaom.com. Retrieved 2013-06-18.
  20. Hungarian ‘security freaks’: Hack our startup and we’ll give you $25K
  21. Hackers, Here's a Way To Make An Easy $25k
  22. Secure cloud firm Tresorit boosts hacker bounty to $25,000
  23. https://tresorit.com/business/wuala-alternative
  24. UP Cloud Computing Conference-Start Cloud Awards rankings as of October 17, 2012 Archived 30 June 2016 at the Wayback Machine.
  25. awards | UP 2012 - Cloud Computing Conference 2012
  26. https://www.forbes.com/pictures/mfg45jmjh/istvan-lam-28/
  27. "2017 Cybersecurity Product Awards - Winners and Finalists - Cybersecurity Excellence Awards". cybersecurity-excellence-awards.com. Retrieved 2017-06-16.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.