File encryption system to protect sensitive files in your business.
Protect all communications and sensitive files with unbreakable encryption.
REDUCE SENSITIVE INFORMATION VULNERABILITIES
BETWEEN YOU AND YOUR CLIENTS
Do not risk sensitive client files. Using TeraCryption with TeraKey Enterprise, you and your client can create a folder identified with the client's company name. i.e.: ACME. Simply drag-and-drop a document into the ACME folder in your Explorer and it will be automatically encrypted, appearing in seconds inside the ACME folder in Explorer of your client.
With TeraCryption, no more documents sent via emails that can be intercepted. No hassle with encryption keys or asking clients to upload and download files.
Watch how Terakey allows you restoring of encrypted files avoiding paying ransom.
See how you can use Terakey to share encrypted files without worrying about sending encryption keys.
MANAGE SHARING OF ENCRYPTED FILES
The only way to truly protect sensitive files is by using TeraCryption unbreakable encryption.
Do not upload files to cloud services if they are not previously encrypted using TeraCryption.
TeraCryption's TeraKey automatically encrypts files that can be SAFELY stored in your server or uploaded to a cloud service.
Secure communications internally and with Clients.
TeraCryption provides the TeraKey Windows application to encrypt entire folders containing subfolders and files of any size and type, preserving the file organization tree.
Management of shared encrypted files is controlled by the administrator, by organizing users and files in dynamic groups. Encryption of documents becomes transparent to the user, who can simply double-click to decrypt a file no matter where the file is located.
TeraCryption allows authorized users with TeraKey Enterprise to encrypt files in seconds, which will be automatically uploaded to Google Drive or OneDrive for maximum security and protection of sensitive information
The TeraCryption file encryption system is reliable, practical and useful. Unique file encryption technology and smooth, reliable integration with Google Drive or OneDrive will reduce information vulnerabilities.
Random encryption keys automatically managed.
Unbreakable military level of encryption.
Do not worry about sending keys to clients.
There is no need to buy encryption keys ever.
Unlimited encryption of any type of files.
SIGN AND ENCRYPT
Client double-clicks on a TeraKey encrypted document in a shared group folder on Explorer.
The document opens on Adobe and the client inserts the electronic signature.
The client saves the document in the shared folder and TeraKey encrypts the signed document, which appears in seconds on the client's folder in your Explorer.
FEATURES IN A NUTSHELL
TeraCryption Enterprise is a user-friendly File Encryption System to manage encrypted files in any size of business. TeraKey has been specially designed to manage encrypted files using Explorer functionality.
GROUP DECRYPTION CONTROL
The Administrator can create any number of groups, each with any number of users. During operation, TeraCryption users encrypt files to groups in order to have secure file sharing with other users. Only users assigned to a group can decrypt files encrypted to that group.
STORE ENCRYPTED FILES ANYWHERE
Encrypted files can be store anywhere in the local computer, in a network computer, in a NAS, or in the cloud. TeraCryption provides the TeraKey application integrated to Explorer to allow handling of encrypted files as if they were regular files which can be copied, moved or sent via email.
INTEGRATION WITH CLOUD SERVICES
TeraCryption with TeraKey Enterprise, automatically creates group storage folders in the Cloud service, which appear in Windows Explorer of each user assigned to the group.
INTEGRATION WITH EXPLORER
TeraKey automatically integrates with Windows Explorer. Management of TeraKey encrypted files can easily be done with Explorer functionality.
Users can double-click on the TeraKey file name to decrypt a file. After editing and viewing, the files will be encrypted and uploaded to the cloud again when the application is closed. i.e.: Editing a Word file.
Encrypting a file or an entire folder is as simple as dragging and dropping it into the Group folders showing on Explorer.
TeraCryption provides a tracking log with the encryption history of any document since it was created.
The TeraCryption tracking log shows who has changed the file, showing the date and time of when it was decrypted and encrypted again.
Export the tracking log in Excel format for further analysis.