Cloud collaboration platform with eSignature feature

Cloud collaboration platform with eSignature feature

Share post

Electronic signature at the push of a button: Tresorit expands cloud collaboration platform with eSignature function. The integrated solution "Tresorit eSign" combines convenience with security and ensures a comprehensively protected and legally compliant document management workflow.

Tresorit, the Swiss-Hungarian specialist for end-to-end encrypted ("e2ee") cloud collaboration and subsidiary of Swiss Post, is now offering its customers the option of adding electronic signatures to documents at the touch of a button. The function fits seamlessly into Tresorit's highly secure digital workspace platform, in which signatures can now be conveniently requested and corresponding documents managed. With the new function package, the company is taking another central step towards a comprehensive, protected and legally compliant document management workflow that covers the entire life cycle of sensitive documents integrated in one platform.

Legally compliant document management workflow

"Especially in today's world, the paperless handling of documents has become a central factor for secure and efficient working methods," says Tresorit CEO and co-founder István Lám. “In practice, however, this often means e-mail chaos and media breaks. With our new set of features, companies can put an end to this. Because 'Tresorit eSign' is not an additional stand-alone solution, but an integrated function for our highly secure, end-to-end encrypted workspace and cloud collaboration platform. In this way, customers benefit twice: from maximum security for their sensitive documents and at the same time the greatest possible convenience for everyday practice.”

With Tresorit eSign, documents are digitally signed in the form of a so-called “simple electronic signature” (SES). It logically links the contractual partner's signature to the respective document in order to document their approval of the content. In contrast to the qualified electronic signature, no further security or proof of legitimacy is required for this.

Sign at the push of a button

At the touch of a button, documents to be signed can be sent to the respective recipients using Tresorit eSign, who can then view them, sign them or - if necessary, add a corresponding comment - reject them. The user always has an overview of which signatures have already been received and which are still pending. All steps, from document creation to filing, are thus optimally integrated into everyday work.

Since all documents to be signed are stored in the end-to-end encrypted Tresorit environment, companies retain complete control over them and their confidential content at all times: With the help of set permissions, it is possible to define who can view and edit the respective documents or how often and for how long they may be accessed. All accesses are logged in detail for complete traceability.

More at Tresorit.com

 


About Tresorit

Tresorit is an end-to-end encrypted productivity solution for ultra-secure collaboration. In addition, the solution offers functions for the secure administration, storage, synchronization and transmission of data. More than 10.000 companies use Tresorit to protect confidential data and exchange information securely. Since July 2021, Swiss Post has been the main shareholder of the company.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more