.
top of page
TeraCryption Network

File encryption system to protect sensitive files in your business. 

ZERO TRUST SECURITY

Protect all communications and sensitive files with unbreakable encryption.

REDUCE SENSITIVE INFORMATION VULNERABILITIES

ENCRYPT, PROTECT AND
SHARE FILES

 
 
 

Automatic encryption key management allows authorized users to encrypt files in seconds. Use unlimited keys with your system.  TeraCryption integrates with Explorer to avoid learning curves.

Store encrypted files in your computer, the server, or a cloud service.

Create Groups to control access to encrypted files. Increase productivity and raise the level of file protection.   

TeraKey Network-2.jpg
Abstract Futuristic Background

Watch how Terakey allows you restoring of encrypted files avoiding paying ransom.

See how you can use Terakey to share encrypted files without worrying about sending encryption keys.

Abstract Futuristic Background

BETWEEN YOU AND YOUR CLIENTS

Do not risk sensitive client files. Using TeraCryption with TeraKey Enterprise, you and your client can create a folder in Explorer identified with the client's company name.  i.e., ACME. Drag and drop a document into the ACME folder in your Explorer, and it will be automatically encrypted, appearing in seconds inside the ACME folder in your client's Explorer. 

With TeraCryption, no more documents are sent via emails that can be intercepted. There is no hassle with encryption keys or asking clients to upload and download files.

cyber-security-and-personal-data-protection- for website -1.jpg

USERS
 

  • Lawyers

  • Accountants

  • Financial Brokers

  • Hospitals

  • Healthcare

  • HR

  • Labs

  • Factories

  • R&D

  • Contractors

  • Consultants


       COMPONENTS

Secure communications internally and with Clients.

  • TeraCryption provides the TeraKey Windows application to encrypt entire folders containing subfolders and files of any size and type, preserving the file organization tree.

  • The administrator controls shared encrypted file management by organizing users and files in dynamic groups. Encryption of documents becomes transparent to the user, who can double-click to decrypt a file no matter where the file is located.
     

  • TeraCryption allows authorized users with TeraKey Enterprise to encrypt files in seconds, which will be automatically uploaded to Google Drive or OneDrive for maximum security and protection of sensitive information.

  • The TeraCryption file encryption system is reliable, practical, and valuable. Unique file encryption technology and smooth, reliable integration with Google Drive or OneDrive will reduce information vulnerabilities.

ENCRYPTION

  • Random encryption keys automatically managed.

  • Unbreakable military level of encryption.

  • Do not worry about sending keys to clients.

 

  • There is no need to buy encryption keys ever. 

  • Unlimited encryption of any type of files.

SIGN AND ENCRYPT

Client double-clicks on a TeraKey encrypted document in a shared group folder on Explorer.

The document opens on Adobe, and the client inserts the electronic signature.

The client saves the document in the shared folder, and TeraKey encrypts the signed document, which appears in seconds in the client's folder in your Explorer.

TeraKey decrypt and sign

FEATURES IN A NUTSHELL

 

USER FRIENDLY 

TeraCryption Enterprise is a user-friendly File Encryption System to manage encrypted files in any size of business. TeraKey has been specially designed to manage encrypted files using Explorer functionality.

GROUP DECRYPTION CONTROL

The Administrator can create any number of groups, each with any number of users. During operation, TeraCryption users encrypt files to groups in order to have secure file sharing with other users. Only users assigned to a group can decrypt files encrypted to that group. 

STORE ENCRYPTED FILES ANYWHERE

Encrypted files can be stored anywhere on the local computer, in a network computer, in a NAS, or the cloud. TeraCryption provides the TeraKey application integrated into Explorer to handle encrypted files as regular files, which can be copied, moved, or sent via email.

INTEGRATION WITH CLOUD SERVICES

TeraCryption with TeraKey Enterprise automatically creates group storage folders in the Cloud service, which appear in Windows Explorer for each user assigned to the group. 


INTEGRATION WITH EXPLORER

TeraKey automatically integrates with Windows Explorer.  Management of TeraKey encrypted files can quickly be done with Explorer functionality.

ENCRYPTION

Encrypting a file or an entire folder is as simple as dragging and dropping it into the Group folders on Explorer.

DECRYPTION

Users can double-click on the TeraKey file name to decrypt a file. After editing and viewing, the files will be encrypted and uploaded to the cloud again when the application is closed.  i.e., Editing a Word file. 

 
 

ENCRYPTION TRACKING 

 
 

TeraCryption provides a tracking log with the encryption history of any document since it was created.
 
The TeraCryption tracking log shows who has changed the file, showing the date and time when it was decrypted and encrypted again.

 

Export the tracking log in Excel format for further analysis.
 

TeraKey Encryption Tracking Log
1
2
bottom of page