File encryption system to protect sensitive files in your business.
ZERO TRUST SECURITY
Protect all communications and sensitive files with unbreakable encryption.
REDUCE SENSITIVE INFORMATION VULNERABILITIES
ENCRYPT, PROTECT AND
Automatic encryption key management allows authorized users to encrypt files in seconds. Use unlimited keys with your system. TeraCryption integrates with Explorer to avoid learning curves.
Store encrypted files in your computer, the server, or a cloud service.
Create Groups to control access to encrypted files. Increase productivity and raise the level of file protection.
Watch how Terakey allows you restoring of encrypted files avoiding paying ransom.
See how you can use Terakey to share encrypted files without worrying about sending encryption keys.
BETWEEN YOU AND YOUR CLIENTS
Do not risk sensitive client files. Using TeraCryption with TeraKey Enterprise, you and your client can create a folder in Explorer identified with the client's company name. i.e., ACME. Drag and drop a document into the ACME folder in your Explorer, and it will be automatically encrypted, appearing in seconds inside the ACME folder in your client's Explorer.
With TeraCryption, no more documents are sent via emails that can be intercepted. There is no hassle with encryption keys or asking clients to upload and download files.
Secure communications internally and with Clients.
TeraCryption provides the TeraKey Windows application to encrypt entire folders containing subfolders and files of any size and type, preserving the file organization tree.
The administrator controls shared encrypted file management by organizing users and files in dynamic groups. Encryption of documents becomes transparent to the user, who can double-click to decrypt a file no matter where the file is located.
TeraCryption allows authorized users with TeraKey Enterprise to encrypt files in seconds, which will be automatically uploaded to Google Drive or OneDrive for maximum security and protection of sensitive information.
The TeraCryption file encryption system is reliable, practical, and valuable. Unique file encryption technology and smooth, reliable integration with Google Drive or OneDrive will reduce information vulnerabilities.
Random encryption keys automatically managed.
Unbreakable military level of encryption.
Do not worry about sending keys to clients.
There is no need to buy encryption keys ever.
Unlimited encryption of any type of files.
SIGN AND ENCRYPT
Client double-clicks on a TeraKey encrypted document in a shared group folder on Explorer.
The document opens on Adobe, and the client inserts the electronic signature.
The client saves the document in the shared folder, and TeraKey encrypts the signed document, which appears in seconds in the client's folder in your Explorer.
FEATURES IN A NUTSHELL
TeraCryption Enterprise is a user-friendly File Encryption System to manage encrypted files in any size of business. TeraKey has been specially designed to manage encrypted files using Explorer functionality.
GROUP DECRYPTION CONTROL
The Administrator can create any number of groups, each with any number of users. During operation, TeraCryption users encrypt files to groups in order to have secure file sharing with other users. Only users assigned to a group can decrypt files encrypted to that group.
STORE ENCRYPTED FILES ANYWHERE
Encrypted files can be stored anywhere on the local computer, in a network computer, in a NAS, or the cloud. TeraCryption provides the TeraKey application integrated into Explorer to handle encrypted files as regular files, which can be copied, moved, or sent via email.
INTEGRATION WITH CLOUD SERVICES
TeraCryption with TeraKey Enterprise automatically creates group storage folders in the Cloud service, which appear in Windows Explorer for each user assigned to the group.
INTEGRATION WITH EXPLORER
TeraKey automatically integrates with Windows Explorer. Management of TeraKey encrypted files can quickly be done with Explorer functionality.
Encrypting a file or an entire folder is as simple as dragging and dropping it into the Group folders on Explorer.
Users can double-click on the TeraKey file name to decrypt a file. After editing and viewing, the files will be encrypted and uploaded to the cloud again when the application is closed. i.e., Editing a Word file.
TeraCryption provides a tracking log with the encryption history of any document since it was created.
The TeraCryption tracking log shows who has changed the file, showing the date and time when it was decrypted and encrypted again.
Export the tracking log in Excel format for further analysis.