You can choose service contracts for one, two or three years.
Control who can view encrypted files saved by other users.
Store sensitive documents in computers, servers and in the cloud.
Authorized staff can safely communicate
messages and files with other TeraMail and
TeraMessage Mobile users in your Organization
Sensitive information travels protected by end-to-end encryption
The users' privacy is protected all the time.
Use TeraKey Networks to encrypt any type of files, such as documents, pictures, videos, audio files, etc.
Files never leave your company for encryption or decryption.
A TeraKey file can be safely stored anywhere since it can only be decrypted by an authorized recipient.
Create TeraKey groups to enable encryption and decryption of files by people in the same group.
Control who can decrypt files.
Use existing File Management Systems to search by document name and to organize encrypted files.
Make copies of TeraKey encrypted files for safe storage in computers, servers and the Cloud.
Regular emails and attachments can be easily intercepted. Corporate sensitive information is not safe.
Use TeraMail for protection of your Corporate communications when using computers and smartphones.
TeraMail becomes your private and secure Corporate email platform.
Invite customers to use your TeraMail platform for confidential and secure communications.
Messages and attachments are protected by high level encryption.
There is no need to install equipment. Use any browser on any computer anywhere.
Send long text and attachments as you do with regular email.
Register with your own SECRET password.
Phone numbers and email address are not needed.
TeraMessage app for iPhone and Android devices.
Control who can communicate with whom.
Record, send and receive encrypted voice messages.
Protection of messages and files by automated random encryption keys.
Messages saved encrypted in the memory's device.
Received attachments never saved on the phone.
View sent and received attachments at any time.
Alert notifications for emergency response crews.
Messages and attachments delivered in seconds.
Automatic notification when a sent message is read.
Indication of online TeraMail and TeraMessage Mobile users available to receive messages.
What is the most important asset of any company? SENSITIVE INFORMATION.
You can choose service contracts for one, two or three years.
The annual TeraCryption Service fee is based on the number of
The Administrator of TeraCryption in your organization will receive on-line assistance regarding programming at no additional charge.
TeraCryption users in your organization will have access to our training videos related to the use of TeraKey encryption, TeraMail PC and TeraMessage Mobile.
We offer engineering design and development services for integration of other applications used in your operations, to work with TeraKey Networks, TeraMail PC and TeraMessage Mobile.
Add more access licenses to your TeraCryption Service whenever you need them. It is simple! Just send us an email and we will add new licenses immediately.
The TeraCryption service will be automatically renewed upon receiving your instructions.
There is no need to make any changes to the way you are currently using the TeraCryption service.
COST COMPONENTS OF AN ADVERSE CYBER EVENT.
TABLE OF SECURITY INCIDENTS AND BREACHES BY SECTOR, 2016.
DISTRIBUTION OF SECURITY BREACHES BY INDUSTRY, 2016.
WHO NEEDS TERACRYPTION SERVICE?
It is vital for small, medium and large companies to protect sensitive files.
Many executives believe that hackers only target large corporations, but the latest events of ransomware attacks,
prove that any size of companies are exposed to this unwanted and dangerous risk. Furthermore, there are multiple reasons why
a company needs to protect sensitive documents and files with high level encryption.
How secure is encryption? Encryption security is measured by how difficult it is to find the encryption key. Traditionally, the encryption key must be available when decryption of a file is requested and it is normally kept on the computer doing the encryption or stored in the company's server. This means that the hacker can find the key when accessing the network and will be able to decrypt the sensitive files. This problem does not exist when using TeraKey Networks.
The content of an email or a mobile message can be very sensitive. It is well known that hackers can intercept public email, read the content and grab the files attached. The TeraCryption Service provides a secure and private email platform, where text and attachments are protected by encryption when traveling end-to-end on the Internet.
The next step is to put your executives on TeraMessage Mobile and TeraMail PC to exchange messages and attachments protected by encryption. The best defense against hackers is not only to prevent them from getting into your servers and network computer, but to let them take files encrypted with TeraKey. All their effort in getting into your company will be futile if they cannot decrypt files. The other defense is to store TeraKey encrypted files in a cloud as a backup. You will always be able to restore them in case that the hacker encrypts TeraKey encrypted files.
The Director of a Wealth Management company is responsible for the growth of personalized
investment portfolios worth millions of Dollars. To approve any investment changes,
the Director and the Account Managers must contact a client on the phone to confirm approval.
However, there is no record left on voice calls except handwritten notes that are placed in the client's file.
In case of a disagreement, the Director does not have a solid evidence of instructions acceptance
except his notes. The investment company is exposed to expensive lawsuits.
The Director and all his clients are aware of the risks of using regular public email to communicate sensitive information. Establishing a telephone call with busy clients is always a problem. By the time the Director connects with the client, the investment opportunity is gone.
The Director decided to use the TeraCryption service. TeraMail and TeraMessage Mobile where set for an initial (20) clients and (4) Managers. Each client installed TeraMessage Mobile on their smartphone and each registered on TeraMail using a computer browser.
When needed, the Director sends a TeraMail to a client, who would receive the message on the TeraMail computer screen and on their smartphone in case he is away from the computer. The client can view the text of the message and open any attachment sent by the Director. The client can reply from his smartphone using TeraMessage mobile or log in to TeraMail to reply from the computer. The Director will receive the response on the computer logged to TeraMail. The Director can print the response as a confirmation of the decision of his client. They both can establish a text conversation or send voice mail messages to each other.
The client is happy with this level of service, making positive investment decisions knowing the Company is taking care of his investment using a private secure communications platform
Executives and secretaries in Government Departments, utility companies, political parties, etc., use secure TeraMail replacing public email that can easily be hacked when in transit on the Internet. TeraMessage Mobile is used by executives to exchange messages with other staff using TeraMessage Mobile and TeraMail on computers. TeraKey provides total security to executives when carrying documents to meetings, when traveling and when are stored in their work computers.
TeraMail may be used as a dispatch console by Nurse Supervisors to establish a two-way communication with nurses and Doctors using TeraMessage Mobile in the Department. Doctors can establish text dialogs with Nurses and other staff in the Hospital. Doctors can receive x-Rays, medical results from the lab and other sensitive documents on their smartphone. TeraKey encryption allows Doctors and other medical staff to secure the privacy of patient medical records, instructions on Word Documents, diagnostics and prognosis, complying with HIPAA.
News agencies use TeraCryption for the safety of their field correspondents to file mobile reports with pictures, voice messages and documents. The correspondents can use TeraMail and TeraMessage Mobile anywhere in the world. TeraKey Networks can be used to encrypt files in the field that can only be opened at the main office.
TeraKey Networks users are able to encrypt multiple files,
which never leave your computers or your network for encryption or decryption.
There is no limit to the number of files that can be encrypted
or decrypted regardless of type and size.
TeraMail is used by authorized users to send and receive encrypted
messages and files using a computer. Users can print one messages
or the history of a complete conversations.
Schedule transmission of a TeraMail in the future.
Send and receive attachments. Access TeraMail using your Secrete Password.
Each Corporate user downloads the TeraMessage Mobile app from
Apple Store and Google Play Store. The user programs the SECRET
password to become part of their Corporate TeraCryption service.
TeraMessage mobile has been designed for maximum security and reliability.