Confidentiality and cloud
Tresorit answers to cloud security concerns
International recognition
• Windows, Android, Mac, iOS
–People love it
–4.7/5 ranked app
• Business HQ in Switzerland
• R&D HQ in Hungary
• Servers in EU (Amsterdam & Dublin)
Information is the new oil
• Worth keeping safe
• Cloud could be great place
Cloud & Confidentiality
• Access to uploaded files by third party
• Providers outsource several tasks!
• Providers can analyze the data
• Most businesses are not even allowed by law
• NSA and surveillance
Current cloud
• “When you upload or otherwise submit content to our
Services, you give Google a worldwide license to use, host,
store, reproduce, modify, create derivative works,
communicate, publish, publicly perform, publicly display and
distribute such content”.
• Google Terms of Use
• Dropbox-Honeydocs
– Honeydocs alert if document is opened
– Turned out, Dropbox analyse
Keep it on premise...?
• Is it really secure?
– How much does it worth?
– What is the density?
• Costs
– IT labor cost + Management
– Procedures and audit
– Software+Hardware
– Server room
– Duplication and backup
– Financing and projects
• Flexibility
• Multinational environment?
Encrypt. Sync. Share.
Philosophy:
„We NEVER collect or store your files, encryption keys and
passwords are unencrypted or invertible form. Files and
some corresponding encryption keys can only be
decrypted by the people you have explicitly shared with.”
Tresorit Terms of Use
Zero knowledge technologx
Noone else can access it.
True client side encryption
Everything is encrypted before upload.
You’re in control.
We have access only to encrypted data. Information
remains on your side.
Encrypt. Sync. Share.
Sync any folder
Unlike in Dropbox, with Tresorit you can choose any
folder to sync.
Access from other devices.
You can have your current folder structure untouched.
In-place sync
Files stored in a simple folder
Works with any file format
Works with any other application
Works offline
Access files anywhere, securely
Easy mobile access
No more FTP, no more VPN
No more papers on the road
Highest standard physical security of servers
Servers maintained by Microsoft Ireland
In the Amsterdam and Ireland, EU
Encrypt. Sync. Share.
Encrypted sharing
Patent-pending technology enables to share encrypted
content with others.
Based on strong, 4096 bit RSA based public key
cryptography and AES256
PGP like technology – client-to-client key exchange
What is encrypted in Tresorit, stays encrypted in Tresorit.
Even if you share it.
Other people will able to decrypt the content, but no
one else, even we cannot access any of your information.
Sharing with public link
Files are still encrypted – unlike other public link
Decrypts file in browser – no software install
Full Javascript based cryptography
Encrypt. Sync. Share.
$50,000 award
 In April 2013, we offered $10.000 to any hacker who
can access data stored in Tresorit.
 We copied our infrastructure, filled up with virtual
user data, obviously not with real user data.
 We gave the same access to the hackers what we
have.
 No need to hack firewall or any other access control,
it is open.
 We increased the price to $25,000 in November 2013,
then $50,000 in April 2014
 We are still not hacked since April 2013
 And the feedback was that it is impossible to do so. $25,000
award if hacked
Current security model - channel encryption
Alice
Mallory
Mallory
?ServerStorage
Tresorit’s client-side encryption
Alice
Mallory
Server
Mallory
?
?
Bob
?
Storage
Available on major platforms
Tresorit in action
Sync
Drag&Drop any folder
Name it & Start syncing
You are safe. It’s easy.
Check out the changes
Share
Select the Tresor you want to share
Invite by e-mail
Manage roles & include personal
message
Accept the invitation
Sharing with public link
Client side encryption – in browser
• Easy to share
• Key never sent to server
• JavaScript decryption
https://share.tresorit.com/?000 … YC3E#jlx1ws … nBuZw==
Only the browser can access the key after the „#” sign
Drag&Drop files to create a link
Download the shared
file
• By email:
nagy@tresorit.com
• Tresorit whitepaper: https://tresorit.com/tresoritwhitepaper.pdf
• Sharing link whitepaper: https://tresorit.com/blog/introducing-
tresorits-public-sharing-feature-cryptolink/
• Our blog: https://tresorit.com/blog/
• Our support portal with lots of information and FAQ:
https://support.tresorit.com
Learn more about our product

More Related Content

PDF
Cryptolab cse datasheet v1.1.pdf
PDF
CloudDOCX_SellSheet_GSmith_V2
PDF
SecuredBox - Secure your privacy
PDF
PDF
BlackBerry Workspaces: Solutions for Government
PPTX
multiple encryption in clouud computing
PDF
How One to One Sharing Enforces Secure Collaboration - xonom
PDF
Week 12 slide
Cryptolab cse datasheet v1.1.pdf
CloudDOCX_SellSheet_GSmith_V2
SecuredBox - Secure your privacy
BlackBerry Workspaces: Solutions for Government
multiple encryption in clouud computing
How One to One Sharing Enforces Secure Collaboration - xonom
Week 12 slide

What's hot (18)

PPT
Encryption
PPTX
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
PPTX
The dark web
PDF
Future Trends for Repositories
PPTX
Decentralized Cloud Storage-Storjio
PDF
How encryption works
PPTX
PDF
Week11
PPTX
Encrytion ppt
PPTX
online game over cryptography
PDF
Dart Key ENG
PDF
Privacy in a Digital age
PPTX
Basic principles to information privacy in data mining & data warehouse
PPTX
The Dark Web by Kenneth Yu
PDF
Risk Management in the Cloud
PPTX
Cryptography in networks
PDF
Publeaks en
PDF
Collecting user-data-socially-responsibly
Encryption
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
The dark web
Future Trends for Repositories
Decentralized Cloud Storage-Storjio
How encryption works
Week11
Encrytion ppt
online game over cryptography
Dart Key ENG
Privacy in a Digital age
Basic principles to information privacy in data mining & data warehouse
The Dark Web by Kenneth Yu
Risk Management in the Cloud
Cryptography in networks
Publeaks en
Collecting user-data-socially-responsibly
Ad

Similar to Tresorit intro - Europas 2014 (20)

PDF
Ultimate Security: Share Files Without Worries
PPTX
Secure Document Collaboration with Alfresco
PPTX
Cloud security
PPTX
Cloud security
PPTX
Cloud Storage
PPTX
Fundamentals of Cryptography
PPTX
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
PPSX
Are You Leveraging the Cloud? Or is it Leveraging You?
ODP
Liberate Your Files with a Private Cloud Storage Solution powered by Open Source
PDF
Vaultize corp three-pager v14
PPTX
DDS Security for the Industrial Internet - London Connext DDS Conference
PPTX
Presentation1.pptx
PPTX
Governance and Security in Cloud and Mobile Apps
PDF
CloudStorage_M.A.Acar
PDF
IT Breakafst for FIN 28 sierpnia 2014, Warszawa, Pałac Sobańskich
PPTX
Cloud Data Security
PDF
Puzzle Lock
PPSX
Geek Night 15.0 - Touring the Dark-Side of the Internet
PPTX
N cryptedcloud
PDF
Jera it persentation.pdf
Ultimate Security: Share Files Without Worries
Secure Document Collaboration with Alfresco
Cloud security
Cloud security
Cloud Storage
Fundamentals of Cryptography
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Are You Leveraging the Cloud? Or is it Leveraging You?
Liberate Your Files with a Private Cloud Storage Solution powered by Open Source
Vaultize corp three-pager v14
DDS Security for the Industrial Internet - London Connext DDS Conference
Presentation1.pptx
Governance and Security in Cloud and Mobile Apps
CloudStorage_M.A.Acar
IT Breakafst for FIN 28 sierpnia 2014, Warszawa, Pałac Sobańskich
Cloud Data Security
Puzzle Lock
Geek Night 15.0 - Touring the Dark-Side of the Internet
N cryptedcloud
Jera it persentation.pdf
Ad

Recently uploaded (20)

PPT
Introduction to Supply Chain Management - Chp 16.ppt
PDF
A Practical Guide to Verified Profiles and Digital Trust.pdf
PDF
business planning presentation class 12 cbse
PPTX
Day 21-24 (Poultry and livestock materials, tools and equipment and their use...
PPTX
summer_internship_panki_power_plant_20250821124748.pptx
PPTX
Day 17-20 (Breeds of Farm Animals Cattle, Swine, Goat, and Rabbit).pptx
PPTX
Vocational_Technical_Skills_Training.pptx
PPT
Mark 364 - Logistics and Supply Chain Management - Chp 16.ppt
PPTX
Day 13-16 (Breeds of Farm Animals Chicken, Duck, and Quail).pptx
PPTX
Encarto_ Revolutionizing Online Gaming.pptx
PPTX
Difference between Entrepreneur & manager
PDF
8. FINANCE FOR NON-FINANCIAL MANAGERS.22.08.2025.pdf
PPTX
FINANCE FOR NON-FINANCIAL MANAGERS.26.08.2025.pptx
PDF
Practical tunnel construction by Er.usman farooq
PDF
HOSPITALITY PARK PVT LTD Company Profile
PDF
AI-Driven Ecommerce: Winning Holiday Shopping with Smarter Search & Faster Ho...
PPTX
Malnutrition_Presentation_Revised.pptxggg
PPTX
chapter 9 transportation material management
PPTX
Introduction To entrepreneurship and its types
PDF
Guía para la IA generativa con Microsoft Soluciones para potenciar la trans...
Introduction to Supply Chain Management - Chp 16.ppt
A Practical Guide to Verified Profiles and Digital Trust.pdf
business planning presentation class 12 cbse
Day 21-24 (Poultry and livestock materials, tools and equipment and their use...
summer_internship_panki_power_plant_20250821124748.pptx
Day 17-20 (Breeds of Farm Animals Cattle, Swine, Goat, and Rabbit).pptx
Vocational_Technical_Skills_Training.pptx
Mark 364 - Logistics and Supply Chain Management - Chp 16.ppt
Day 13-16 (Breeds of Farm Animals Chicken, Duck, and Quail).pptx
Encarto_ Revolutionizing Online Gaming.pptx
Difference between Entrepreneur & manager
8. FINANCE FOR NON-FINANCIAL MANAGERS.22.08.2025.pdf
FINANCE FOR NON-FINANCIAL MANAGERS.26.08.2025.pptx
Practical tunnel construction by Er.usman farooq
HOSPITALITY PARK PVT LTD Company Profile
AI-Driven Ecommerce: Winning Holiday Shopping with Smarter Search & Faster Ho...
Malnutrition_Presentation_Revised.pptxggg
chapter 9 transportation material management
Introduction To entrepreneurship and its types
Guía para la IA generativa con Microsoft Soluciones para potenciar la trans...

Tresorit intro - Europas 2014

  • 1. Confidentiality and cloud Tresorit answers to cloud security concerns
  • 2. International recognition • Windows, Android, Mac, iOS –People love it –4.7/5 ranked app • Business HQ in Switzerland • R&D HQ in Hungary • Servers in EU (Amsterdam & Dublin)
  • 3. Information is the new oil • Worth keeping safe • Cloud could be great place
  • 4. Cloud & Confidentiality • Access to uploaded files by third party • Providers outsource several tasks! • Providers can analyze the data • Most businesses are not even allowed by law • NSA and surveillance
  • 5. Current cloud • “When you upload or otherwise submit content to our Services, you give Google a worldwide license to use, host, store, reproduce, modify, create derivative works, communicate, publish, publicly perform, publicly display and distribute such content”. • Google Terms of Use • Dropbox-Honeydocs – Honeydocs alert if document is opened – Turned out, Dropbox analyse
  • 6. Keep it on premise...? • Is it really secure? – How much does it worth? – What is the density? • Costs – IT labor cost + Management – Procedures and audit – Software+Hardware – Server room – Duplication and backup – Financing and projects • Flexibility • Multinational environment?
  • 7. Encrypt. Sync. Share. Philosophy: „We NEVER collect or store your files, encryption keys and passwords are unencrypted or invertible form. Files and some corresponding encryption keys can only be decrypted by the people you have explicitly shared with.” Tresorit Terms of Use Zero knowledge technologx Noone else can access it. True client side encryption Everything is encrypted before upload. You’re in control. We have access only to encrypted data. Information remains on your side.
  • 8. Encrypt. Sync. Share. Sync any folder Unlike in Dropbox, with Tresorit you can choose any folder to sync. Access from other devices. You can have your current folder structure untouched. In-place sync Files stored in a simple folder Works with any file format Works with any other application Works offline Access files anywhere, securely Easy mobile access No more FTP, no more VPN No more papers on the road Highest standard physical security of servers Servers maintained by Microsoft Ireland In the Amsterdam and Ireland, EU
  • 9. Encrypt. Sync. Share. Encrypted sharing Patent-pending technology enables to share encrypted content with others. Based on strong, 4096 bit RSA based public key cryptography and AES256 PGP like technology – client-to-client key exchange What is encrypted in Tresorit, stays encrypted in Tresorit. Even if you share it. Other people will able to decrypt the content, but no one else, even we cannot access any of your information. Sharing with public link Files are still encrypted – unlike other public link Decrypts file in browser – no software install Full Javascript based cryptography
  • 10. Encrypt. Sync. Share. $50,000 award  In April 2013, we offered $10.000 to any hacker who can access data stored in Tresorit.  We copied our infrastructure, filled up with virtual user data, obviously not with real user data.  We gave the same access to the hackers what we have.  No need to hack firewall or any other access control, it is open.  We increased the price to $25,000 in November 2013, then $50,000 in April 2014  We are still not hacked since April 2013  And the feedback was that it is impossible to do so. $25,000 award if hacked
  • 11. Current security model - channel encryption Alice Mallory Mallory ?ServerStorage
  • 13. Available on major platforms
  • 15. Sync
  • 17. Name it & Start syncing
  • 18. You are safe. It’s easy.
  • 19. Check out the changes
  • 20. Share
  • 21. Select the Tresor you want to share
  • 23. Manage roles & include personal message
  • 26. Client side encryption – in browser • Easy to share • Key never sent to server • JavaScript decryption https://share.tresorit.com/?000 … YC3E#jlx1ws … nBuZw== Only the browser can access the key after the „#” sign
  • 27. Drag&Drop files to create a link
  • 29. • By email: [email protected] Tresorit whitepaper: https://tresorit.com/tresoritwhitepaper.pdf • Sharing link whitepaper: https://tresorit.com/blog/introducing- tresorits-public-sharing-feature-cryptolink/ • Our blog: https://tresorit.com/blog/ • Our support portal with lots of information and FAQ: https://support.tresorit.com Learn more about our product