Perimeter
12/19/2013
03:55 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Encrypted Cloud Startup Tresorit Reveals Pricing, Challenges Hackers To Break Their Service For $25,000

Tresorit is built on patented cryptographic tech, and uses shareable client-side encryption

NEW YORK, Dec. 19, 2013 /PRNewswire-iReach/ -- A challenge was issued to top hackers a week ago to break into secure cloud service, Tresorit for $25,000. 700 hackers from 49 countries already took up the hacking challenge, hailing from top universities like MIT, Stanford and Princeton and corporations like Vodafone and Tata Consulting.

(Photo: http://photos.prnewswire.com/prnh/20131219/MN35866)

Based on the previous 6 months of unsuccessful hack attempts following its April launch to beta, the company announced its Pro package today, offering plans starting from 100GB of secure storage for $12.99 a month. The service is also moving to target businesses.

"We're confident in our system, having withstood 6 months of hacking attempts since we posted the first bounty on our head when launching our beta, in April", says Istvan Lam, founder and CEO.

Tresorit is built on patented cryptographic tech, and uses shareable client-side encryption. Its users allegedly don't have to fear any admin, hacker, or even the NSA accessing their data, even when they share it with others or sync it to mobile devices.

Tresorit's approach to privacy made the service popular with a crowd of NSA-averse individuals - they enjoy 20% monthly user growth. Users are leaving competitors like Box and Dropbox behind for the service - their top rankings on Google Play (with a best in class 4.6, matched only by Dropbox) seem to confirm their dedication to the user experience.

But Tresorit's crypthographic assurance that data stays under the users' control and their EU-based servers are an even bigger draw among businesses who face compliance requirements or business needs for security. This fall the company even moved to Switzerland to enjoy increased legal protection from surveillance.

"We see great demand from industries like financial and legal advisories, healthcare, biotech or contruction. These verticals combine the need for strict control over data with collaboration and dispersed teams, off-site work or frequent file sharing with parties outside the company." - says Lam.

Moving into the SMB space will see Tresorit launch industry-focused features like timestamping, e-signatures and delivery reports early next year. Their roadmap also contains several features that will help it woo prospective enterprise clients as well - full audit trails, file-based policies, and central admin controls.

About Tresorit

Tresorit, an encrypted collaboration and storage service, based on patented cryptographic research from a team of European security experts started in 2009.

The company received a Series A funding of 1.7M USD in 2012 and grew to 30 people by the end of 2013. Tresorit emphasizes usability as well as security.

Aiming for concerned individuals and small and medium sized businesses who need compliance, security and confidentiality as well as collaboration and backup.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-1421
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Craig Knudsen WebCalendar before 1.2.5, 1.2.6, and other versions before 1.2.7 allows remote attackers to inject arbitrary web script or HTML via the Category Name field to category.php.

CVE-2013-2105
Published: 2014-04-22
The Show In Browser (show_in_browser) gem 0.0.3 for Ruby allows local users to inject arbitrary web script or HTML via a symlink attack on /tmp/browser.html.

CVE-2013-2187
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page.

CVE-2013-4116
Published: 2014-04-22
lib/npm.js in Node Packaged Modules (npm) before 1.3.3 allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names that are created when unpacking archives.

CVE-2013-4472
Published: 2014-04-22
The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

Best of the Web