

While Tresorit regulates security policies set by the owner of the content, Microsoft s underlying technology enables local control over data.


Even if corporate files are leaked, intruders are unable to access them due to the combined encryption layers of both Tresorit DRM and the service that powers it, Microsoft s Rights Management Service (RMS). 2ģ DISTRIBUTED CONTROL OF FILES: With Tresorit DRM, distributed control carries over to any device or user, because all files are encrypted individually. lockable, armoured cabinet OWNER MANAGER EDITOR READER SIMPLE RIGHTS view edit share delete a tresor print ADVANCED RIGHTS copy-paste print-screen forward Table 1: Control Every Aspect of Document Collaboration by Defining Roles in Tresorit DRM Copyright 2014 Tresorit. Once assigned, roles carry over to all of the user s devices, enforcing the granular policies that are mapped to each defined role: tresor noun (German) 1. These granular permissions provide exceptional control for complex collaboration on sensitive documents. With Tresorit DRM, administrators can set access levels on all encrypted folders (known as tresors), defining roles across teams with ease. DEFINE ROLES Document owners often need to provide different privileges to users to control who can view a file versus those who can print, edit, copy, or share it. 1Ģ DATA PROTECTION WITH Tresorit DRM protects data by combining strict role definition, distributed control of data, and the ability to revoke access to files to ensure complete data security in the cloud and on user devices. Tresorit DRM complements the Tresorit cloud-storage solution: Files are protected in transit and on the cloud with end-to-end encryption via Tresorit s storage solution DRM offers more control to businesses by extending security to documents once they have been shared. Tresorit s DRM offers the same high-level of security offered by enterprise-grade solutions, but is much simpler to use companies no longer need expensive infrastructure and large IT teams to have complete digital security. DRM technology has been used by commercial publishers to protect digital works such as music, videos, and e-books, and by large enterprises to manage access to sensitive documents and control content sharing. Whether malicious or accidental, protecting against these breaches is vital: According to a PwC study of 9,600 businesses, current and former employees account for 31% and 27% of data breach incidents respectively. DRM wards off a host of security concerns including attacks from external hacker as well as breaches from internal employees.
#TRESORIT DOCUMENT STORAGE CLOUD CRACKED#
But what happens to documents after they have been shared and during the collaboration process? INDUSTRY STANDARD SECURITY Box, Dropbox, Google Drive stolen password wifi cracked broken device TRESORIT ALL PLANS heartbleed hackers corporate espionage editing saving to usb copying content ing printing screenshoting IS A GAME-CHANGER FOR SMB DATA SECURITY: Unlike other cloud solutions, Tresorit DRM protects the data itself, not just the cloud infrastructure. Solutions that use client-side encryption, such as Tresorit, offer the most security for sensitive and private data as it travels from the user s desktop, to the cloud, and to the chosen collaborator s desktop. 1 Tresorit s DRM A New Level of Security for Document Collaboration and Sharing Cloud-based storage has made it easier for business users to share documents, but it has also opened up new vulnerabilities.
