Highly secure file manager

Every SecureSafe account includes a highly secure and privacy-protected file manager for your personal use. Here, you can upload and manage identity papers, contracts, insurance policies, certificates, wedding images and other files, which deserve special protection.

Read more

​Secure file synchronization

With the SecureSafe Desktop App you can sync all team files between your personal computer and SecureSafe, ensuring all shared files are always up to date.

Read more

The safest way to transfer files online

The SecureSend feature is included in every SecureSafe account and enables you to send files up to 2GB in size to any recipient of your choice. The recipient does not need to have a SecureSafe account to receive and download the files sent.

Read more

Your secure password manager

To stay safe online, you need a strong, unique password for each and every online account that you create. Use the SecureSafe password manager to keep track of your ever-growing list of passwords and avoid the risk of reusing weak passwords.

Read more

Team safes for secure business file sharing

Use our uniquely secure team safes to store, share and sync files with your team, company or organization. Team safes are shared workspaces, which you can access via any browser of your choice or directly from a dedicated folder on your work computer. Open as many team safes as you need to share files online with different teams, customers or external partners.

Read more

SecureSafe mobile app: Your digital vaccination certificate. Anytime. Anywhere.

Imagine being regularly asked about your vaccination status and how convenient it would be to have it close to hand at all times. That's exactly what your SecureSafe offers you. With just one tap on the login page, you can easily access your vaccination certificate – and it's absolutely secure.

Read more

Tips & tricks for a successful home office

More people than ever before are currently working from home. We too, the employees of SecureSafe, have moved from our office in the heart of Zurich to our desks at home. After just over a month working by remote, we decided to share a few ideas within our team and put together a few valuable tips that help us start the day with plenty of structure and motivation.

Read more

New enhanced PDF tool and online team safe purchase

The SecureSafe web and desktop app got updates with neat features for you. Here's your quick overview of the enhancements.

Read more

Password autofill

There’s a new version of the SecureSafe app out and that means safer, simpler ways to manage your passwords. In particular, the password autofill feature has been greatly enhanced for iPhone users that have installed iOS 12 on their mobile.

Read more

Cyber war: The invisible opponent

It’s like the plot of a bad crime novel. A series of crimes occur and the police always come across the same suspect at the scene of the crime. He would definitely have a motive, but constantly asserts his innocence and no one can prove he did anything.

Read more

Introducing brand new local encryption feature

After two years of intense development, our team is proud to present an absolutely unique security feature, currently one of a kind worldwide: local encryption for file synchronization.

Read more

Data inheritance on different online platforms

The topic of data inheritance is young and many online service providers have yet to present their policies on it. Some of the heavyweights have, however, already put various options in place for their users to pass on important data or rights to online accounts. We give you an overview here.

Read more

What are DDoS attacks?

In the last days numerous online shops were hit by DDoS attacks. The attackers sent countless data packages to the server systems of the affected companies causing their online shops to be completely down at times.

Read more

What is ransomware?

Ransomware is malicious software used by cyber-attackers in order to blackmail their victims. Successful attackers can make millions of dollars extorting money from a large number of private individuals as well as businesses.

Read more

20 tips to fight against social engineering

Industry spies aim to get access to sensitive business data through so-called social engineering attacks. The attackers confuse the employees with misleading information to reach their goals. These 20 tips help to better protect your company.

Read more

The early riser

Tobias Christen is the CEO and co-founder of the company DSwiss, which stands behind SecureSafe. In this interview, he explains how the importance of privacy protection has changed.

Read more

What are bitcoins really?

8 years ago an unknown person, who uses the pseudonym Satoshi Nakamoto invented an alternative means of payment – the so-called bitcoin. Untraditionally, this digital currency is not printed by governments but “mined” on computers.

Read more

Security-Tester – Sherlock Holmes of the IT-Branche

Tobias Ospelt checks IT solutions for security vulnerabilities and consults companies about the topic of IT security.

Read more

What are Man-in-the-Middle Attacks?

Man-in-the-middle attacks are a specific type of hacker attack: the attacker reads or manipulates unencrypted data shared between the victim’s computer and the server.

Read more

Here security is preprogramed

Michael Tschannen is the Chief Technical Officer at SecureSafe. In collaboration with our developer team, he is responsible for our own cloud storage solution as well as eSafe solutions for banks, insurance companies and other large customers.

Read more

What is social engineering?

Social engineering is a simple yet very effective form of industrial espionage. The attackers steal important company data or exploit human error to introduce viruses to a system.

Read more

What are zero day exploits?

Zero day exploits are very dangerous hacker attacks, which take advantage of unknown security breaches in software programs.

Read more

SaaS, PaaS or IaaS – which is right for my company?

If you consider using a cloud solution for your company, you will have 3 different models to choose from. But which is best suited for your company?

Read more

System engineers: the architects of the data highway

In this interview, Pascal Weller (43) explains how data from a PC reaches the cloud and what role servers play in this process.

Read more

The invisible side of the Internet

More than 3 billion people surf the net tapping more than 50,000 search request into Google’s search engine per second.

Read more

13 tips to protect you against malware

Whether viruses, trojans or spyware: malicious programs are designed to attack computer systems and endanger the security of your personal data. These guidelines will help you to protect yourself against unwanted attacks.

Read more

DoubleSec – the unique secure login feature for smartphones

High security login technology using 2-factor authentication on an iPhone or Android Phone - but as easy as standard username/password!

Read more
Cookies – please make your selection
Cookies
This website uses cookies to ensure you get the best experience on our website.

Essential cookies – essential for the use of the website
Off On
Preference cookies – enable the website to remember the user preferences of the user, such as language and region
Off On
Statistical cookies – anonymised gathering of information to evaluate the use of the website by the visitor
Off On