You get to Torozo through the Web. Use any contemporary browser from most devices and go to http://www.torozo.com. All you need is a valid, reachable email address. From the site you will find a link to login. If you do not yet have an account, there is a link to sign up for one on the login page.
All Torozo accounts come with unlimited client/guest users.
A regular user is the account owner i.e., you or someone under your organizational account like an employee. A client/guest user is an external user or someone with a Torozo account that doesn’t work for your company.
Client/guest users are invited by regular users to access the file or folder you shared with them. Because of the invitation, they create their own ‘guest user’ account for free to access your shared file or folder. However, guest accounts don’t have ‘My Files’ capability so they can’t create root-level folders. If you give them edit permissions they can still upload to the folder you created and create subfolders but they cannot share a file. Only regular users can share a file.
Torozo is an ‘only pay for what you need’ service. User’s get 50GB of storage with their basic subscription and then purchase additional storage as needed. Most other services charge a much higher flat rate per month with bundled storage that they never use. We decided to price based on consumption – the fair way to do it.
Moreover, because of our unique technology even our pricing for additional storage beats many of our competitors bundled pricing.
Torozo safeguards your files with industry-accepted encryption protocols and algorithms in transit and at rest. Your files are encrypted with up to 256-bit encryption using industry-standard encryption protocols. Our cryptographic module received FIPS 140-2 validation from NIST in Washington.
Because other services do not validate that the recipient of the the email is the actual intended recipient. End users can accidentally share their confidential information. With that massive increases in phishing and email spam, bad actors can spoof an address and read the confidential content.