top of page
Abstract Futuristic Background

File encryption system for business, with tracking reports.

TeraKey PC
for personal use

TeraKeyBlueSmall.png

An encryption engine disguised as a USB stick.

Management System for encrypted business files. Control sharing, sending and storing files in your servers and in the cloud.

REDUCE SENSITIVE INFORMATION VULNERABILITIES

For businesses with a few users up to large corporations.

To reduce information leakage, Administrators and Supervisors control who can share files with whom.  

  • The TeraKey file encryption system can encrypt entire folders containing subfolders and files of any size and type, preserving the file organization tree.
     

  • Management of sharing encrypted files is controlled by the administrator, by organizing users and files in dynamic groups. The operation of encryption of documents becomes transparent to the user, who can simply double-click to decrypt a file no matter where the file is located, an operation that takes just a few seconds.
     

  • TeraKey encrypts files and automatically upload them to a cloud service for maximum security and protection of sensitive information. The TeraKey file encryption system is reliable, practical and useful. Unique encrypted file administration will reduce information vulnerabilities.

TeraKey Business Configuration
Abstract Futuristic Background

Watch the benefits of using the TeraCryption platform (1.44 min.)

TERAKEY IS AN ENCRYPTION FILE SYSTEM FOR ANY TYPE OF BUSINESS THAT NEEDS TO PROTECT DOCUMENTS

  • Do you have a Law Firm who needs to protect legal documents in the office? A Financial business dealing with VIP investors across the country?  A factory that needs to protect sensitive lab data?
     

  • No matter what your trade is, TeraKey will give you the protection to sensitive information that you are looking for with the capability to manage who can encrypt files. Chat with us or book a demo. You will be impressed!

2fa SECURITY

Users enter special confirmation access code received by email or SMS messaging.

TRACKING LOGS

View the encryption history of each file since it was created, with dates and names of users who worked on them.

ACTIVE DIRECTORY LINK

Import names and access control from Windows Active Directory to save setup time.

GROUP ACCESS CONTROL

Create unlimited groups and add users to control who can encrypt and decrypt selected files.

AFFORDABLE

TeraKey is much more than just encrypting files for uploading to a cloud. TeraKey is a system for smooth operations while protecting sensitive documents.

TeraKey is a unique management system for encrypted files, where you control file sharing to eliminate document access vulnerabilities common in low cost systems.

  • TeraKey Enterprise is in fact a user-friendly file encryption system to manage encrypted files for any size of business. TeraKey has been specially designed to manage encrypted files using Explorer functionality.

  • The Administrator controls who can encrypt files and share them with other users, instead of having Users determining who they share encrypted files with. This gives the strongest secure document sharing ever.

  • The Administrator can create any number of Groups, each with any number of users.

  • As an encryption system, users encrypt files to Groups in order to have a secure file sharing operation with other users in the same Group.

  • There is no need to send encryption keys to users to share files. Users can send secure attachments via email or using TeraMail.

  • Encrypted files can be stored anywhere in the local computer, in a network computer, in a NAS or in any Cloud service.  TeraKey allows handling encrypted secure files as if they were regular files that can be copied, moved or send via email.  

  • TeraKey is the one that links to a Google Drive or OneDrive account, instead of having each user logged into the business cloud account with access to all the files.  

 

  • TeraKey automatically creates Group storage folders in the Cloud service and they appear in Explorer as “ghost” folders showing files and folders names, but without content or data. All encrypted files are safe in the Cloud.

  • Users can double-click on the "ghost" file name to download and decrypt a file. The files will be encrypted and uploaded to the cloud again when the file applications is closed. i.e.: Editing a Word file.

  • Encrypting a file or an entire folder is as simple as dragging and dropping it into the Group folder shown on Explorer. 
     

  • TeraKey offers secure file transfer between users in your business and your clients. 
     

  • TeraKey is an excellent secure document file system easy to install and use.

FORGET ABOUT ENCRYPTION KEYS!
Encryption with no key management.

Abstract Futuristic Background

The file encryption system allows users to easily encrypt sensitive MS Office files, PDF documents and any type of files.

 

NO ONE IN THE CLOUD CAN SEE THE ENCRYPTED FILES' CONTENT.​

Keep encrypted files in their encrypted state in the Cloud all the time.

 

Only users with permission will be able to download, open, edit and encrypt them again, as a routine operation using their Explorer.

TERAKEY PRO ENCRYPTS AND UPLOADS FILES TO THE CLOUD FOR ABSOLUTE SECURITY

TeraKey encrypts and uploads to cloud

When you are not able to use a Cloud service for storage of encrypted files, TeraKey PRO can use the company's inhouse server or a NAS to store encrypted files.

Encryption of documents is easy. As an example, watch a low cost solution of secure file sharing when using TeraKey PRO and Dropbox. The storage destination can also be the Google Drive or MS OneDrive folder on your computer.

Illuminated Objects

TERAKEY ENTERPRISE MANAGEMENT SYSTEM REDUCES VULNERABILITIES BY YOU CONTROLLING ACCESS TO SENSITIVE ENCRYPTED FILES.

Drag and drop a file or use "Save as.." to My TeraKey folder or to Cloud shared folders shown on Explorer, to quickly encrypt a file or an entire folder with different types of files. 

 

The TeraKey file encryption system will automatically upload a copy of the local encrypted files to your company's Cloud account with Google Drive or OneDrive. 

 

You can quickly restore folders and files to your computer in case of a hacker attack or if files are lost.

File Sharing Inverted - 3-min.png

Use TeraKey to communicate sensitive messages and files with your clients and other business associates, such as suppliers, contractors and company's staff at remote locations. 

Abstract Background

USE THE TERAKEY ENTERPRISE MANAGEMENT SYSTEM TO DELIVER ENCRYPTED FILES FROM EXPLORER TO EXPLORER - NO EMAIL REQUIRED

The TeraKey file encryption system delivers encrypted files directly to the Explorer of authorized users and clients, regardless of their location (office, home, hotel, mobile, etc.).

 

There is no need for sending unprotected documents by email or wireless.

 

Anyone can use double-click to decrypt a file in seconds. It will automatically re-encrypt and upload to the Cloud when closing the file.

TeraKey files from Explorer to Explorer

Every TeraKey user in your company can easily share encrypted files, which appear on the corresponding Group folder on their Explorer, athough they are stored in the Cloud service.

Shapes and Shades

USE TERAMAIL AND TERAKEY TO SECURE MESSAGES AND FILES COMMUNICATION TO MOBILE USERS

In addition, users can install the TeraMessage Mobile app on their phone to exchange messages and files protected by the file encryption system.

Encrypted files cannot be stored on the phone. Text messages are stored encryted.  The Administrator can delete messages and programming with remote control from the TeraKey file encryption system console in case the phone is lost.

TeraKey secure communication of files

Users can download and install the TeraMessage Mobile app on their iPhone and Android smartphones to send and receive text messages and view encrypted TeraKey files.

LogoSpeed_edited.jpg

USE TERAKEY ENTERPRISE TO SECURE INTERNET MESSAGES AND FILE COMMUNICATIONS IN HEALTHCARE

In a Hospital, it is critical to deliver emergency messages.

 

The TeraCryption platform provides an onsite transmiter and pocket pagers for Emergency  Response teams.

TeraCryption integrates TeraKey file encryption and messaging to pagers and smartphones, for delivery in seconds.

A log provides tracking of encryption, file delivery and messaging.

Logs Inverted - 5-min.png

Hospitals and other critical messaging applications use a local, in-building TeraCryption radio transmitter and pocket pagers. Smartphones with TeraMessage Mobile and computer users with TeraMail are integrated.

bottom of page
google-site-verification: google43d31fc921668958.html