+
+

Related Products

  • ManageEngine Endpoint Central
    2,683 Ratings
    Visit Website
  • Diplomat Managed File Transfer
    47 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • MOVEit
    621 Ratings
    Visit Website
  • DriveStrike
    24 Ratings
    Visit Website
  • Proton Mail
    108,630 Ratings
    Visit Website
  • Files.com
    309 Ratings
    Visit Website
  • CLEAR
    1 Rating
    Visit Website
  • Securden Password Vault for Enterprises
    55 Ratings
    Visit Website

About

Increased remote working makes it more important than ever to secure computers and the data on them. With the huge number of laptops lost, stolen, or misplaced every day, a crucial first line of defense against the loss or theft of devices is full disk encryption. Sophos Central Device Encryption leverages Windows BitLocker and macOS FileVault to secure devices and data. Centralized security management and operations from the world’s most trusted and scalable cloud security platform. With open APIs, extensive third-party integrations, and consolidated dashboards and alerts, Sophos Central makes cybersecurity easier and more effective. Integrated SASE-ready solutions to secure your cloud and hybrid networks - now and into the future. From Firewall and Zero Trust to Switches, Wi-Fi, and more. Trust your inbox again with cloud email security that protects your people and critical information from malware, phishing and impersonation attempts.

About

End-to-end encrypted file sync & sharing Tresorit is the ultra-secure place in the cloud to store, sync and share files easily from anywhere, anytime. Tresorit is powered by end-to-end encryption, therefore it seals your files away from internal data breaches and hackers. All the data is securely stored according to the GDPR in Europe in Microsoft Azure datacenters. Manage who can add, edit or only view the data you shared. Team members can securely access the updated files using their browser, desktop, or mobile device, wherever they are. Files can be shared with the same secure manners outside your company as well. Replace risky email attachments with ultra-secure share links. Thanks to end-to-end encryption, nothing leaves your device unencrypted, meaning only you and your recipient can open the files. Utilize the new Content Shield features for your Business to secure collaboration with external parties. Read more here: https://tresorit.com/tresorit-content-shield

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT teams and anyone seeking a solution to manage their security operations

Audience

Individuals, small businesses and enterprises working with confidential data

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$10.42/month
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 4.3 / 5
ease 4.9 / 5
features 4.6 / 5
design 4.7 / 5
support 4.8 / 5

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Sophos
United States
www.sophos.com

Company Information

Tresorit
Founded: 2011
Hungary
tresorit.com

Alternatives

Alternatives

Proton Drive

Proton Drive

Proton AG
Panda Full Encryption

Panda Full Encryption

WatchGuard Technologies
CLEAR

CLEAR

Quantum Knight
Central Huddle

Central Huddle

Classy Geeks
BitLocker

BitLocker

Microsoft

Categories

Categories

Encryption Features

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Encryption Features

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Cloud Storage Features

Access Control
Archiving & Retention
Backup
Data Migration
Data Synchronization
Encryption
File Sharing
Version Control

Collaboration Features

Brainstorming
Calendar Management
Chat / Messaging
Contact Management
Content Management
Document Management
Project Management
Real Time Editing
Task Management
Version Control
Video Conferencing

Content Collaboration Features

Client Portal
Cloud Storage
Digital Asset Management
Document Creation / Editing
Document Management
Electronic Signature
Feedback Management
File Sharing
Messaging / Discussion
Real-Time / Interactive Editing
Roles / Permissions
Search
Version Control
Video / Image Editing
Workflow / Approval Process

Document Management Features

Access Controls
Archiving & Retention
Collaboration Tools
Compliance Tracking
Document Archiving
Document Assembly
Document Capture
Document Conversion
Document Delivery
Document Indexing
Document Retention
Electronic Signature
Email Management
File Recovery
File Type Conversion
Forms Management
Full Text Search
Offline Access
Optical Character Recognition
Print Management
Version Control

File Sharing Features

Audit Trail
Chat / Messaging
Collaboration
Document Management
Drag & Drop
Electronic Signature
Encryption
File Synchronization
Search
User Management
Version Control
Workflow Management

Integrations

AriLinc
AuthPoint
Datto RMM
Datto Workplace
Dcycle
Graylog
Jotti
Junos Traffic Vision
KeePassium
Microsoft Outlook
OctoXLabs
Product Marketing Alliance
Prominic.NET
SecureW2
Sophos Intercept X Endpoint

Integrations

AriLinc
AuthPoint
Datto RMM
Datto Workplace
Dcycle
Graylog
Jotti
Junos Traffic Vision
KeePassium
Microsoft Outlook
OctoXLabs
Product Marketing Alliance
Prominic.NET
SecureW2
Sophos Intercept X Endpoint
Claim Sophos Central Device Encryption and update features and information
Claim Sophos Central Device Encryption and update features and information
Claim Tresorit and update features and information
Claim Tresorit and update features and information