A World Of Protection For Sensitive Business Files
In Your Company.
Don't take any risks!
Encrypt sensitive documents BEFORE uploading to a Cloud storage service.
Group folders in the Cloud with encrypted files appear on each user’s Explorer, providing instant file sharing between users in the Groups.
WHAT IS TERAKEY?
See how you can use TeraCryption (1.44 min.)
TeraKey is a file encryption system to protect sensitive documents in your company.
TeraKey is AN INTEGRATED SYSTEM for small to medium size businesses who need to ENCRYPT documents for protection. Users in groups can share their encrypted documents, or send them to clients for review, bypassing the risks of unsecure traditional email.
TeraKey is NOT only a file encryption solution, but an "Encrypted File Management System" to organize, control decryption, copy and handle encrypted documents using Explorer.
Protect sensitive documents with proven unbreakable encryption. Automatic upload to a Cloud storage service inaccessible to hackers and internal thieves. Integration to Explorer for familiar file management operation. Grant file encryption permissions with simple drag-and-drop. Encryption takes a few seconds and it is transparent to the user because there is no need for key management.
TeraCryption is a business platform to facilitate Encrypted Document Management and to protect them in a Cloud Service.
TERAKEY IS A FILE MANAGEMENT SYSTEM FOR ANY TYPE OF BUSINESS THAT NEEDS TO PROTECT DOCUMENTS
Do you have a Law Firm who needs to protect legal documents in the office? A Financial business dealing with VIP investors across the country? A factory that needs to protect sensitive lab data? No matter what your trade is, TeraKey will give you the protection to sensitive information that you are looking for with the capability to manage encrypted files. Chat with us or book a demo. You will be impressed!
ENCRYPT AND UPLOAD FILES TO THE CLOUD FOR ABSOLUTE SECURITY
Users can easily encrypt sensitive MS Office files, PDF documents and any type of files. TeraKey will automatically upload the encrypted files to your Cloud account with Google Drive or OneDrive for secure storage and sharing. NO ONE IN THE CLOUD CAN SEE THE FILES' CONTENT.
Keep files in encrypted state in the Cloud all the time. Only users with permission will be able to download, open, edit and encrypt them again, as a routine operation using their Explorer.
The TeraKey system delivers encrypted files directly to Explorer of authorized users and clients, regardless of their location (office, home, hotel, mobile, etc.). There is no need for sending unprotected documents by email or wireless. Anyone can use double-click to decrypt a file in seconds. It will automatically re-encrypt and upload to the Cloud when closing the file.
MY TERAKEY AND CLOUD SHARED FOLDERS
Drag and drop a file or use "Save as.." to My TeraKey folder or to Cloud shared folders shown on Explorer, to quickly encrypt a file or an entire folder with different types of files. TeraKey will automatically upload a copy of the local encrypted files to your Cloud account with Google Drive or OneDrive. You can quickly restore folders and files to your computer in case of a hacker attack or if files are lost.
SECURE INTERNET FILE COMMUNICATIONS
TeraKey users can send and receive text messages and TeraKey encrypted files using the TeraMail web application. In addition, users can install the TeraMessage Mobile app on their phone to exchange messages and files protected by encryption.
TERAKEY SYSTEM'S SIMPLICITY
There is nothing to install in the business Server.
There is no need for encryption key management because the keys are destroyed after encryption.
You simply add the name of each TeraKey user and give them permission to access TeraKey shared folders that store encrypted files.
When hackers enter your business is a tragic event. TeraKey could restore lost files and bring your operations back quickly.
SHARING ENCRYPTED FILES
Sharing encrypted files is critical during business operations. Many companies think that using file sharing cloud platforms solve the problem of protecting sensitive documents. Those services are popular for sharing non-sensitive files between users, but are not really protecting the content of your business sensitive files because, even if they encrypt them at rest, they have the encryption key. Your sensitive business information is at a high risk.
Since TeraKey does not need encryption key management, users can distribute and share encrypted documents with a group, or a single TeraKey user. One easy way would be to use TeraMail to communicate text messages and TeraKey encrypted files between authorized users. Text and attached encrypted documents travel on a TeraCryption private and secure connection. Users can access TeraMail when logging in to the TeraKey application.
AUTOMATIC FILE ENCRYPTION BEFORE UPLOADING TO CLOUDS FOR 100% PROTECTION
One powerful solution is to use TeraKey to perform file encryption prior to uploading them to cloud storage services. Cloud personnel or other users accessing the cloud storage, cannot decrypt and read your files because they do not have permission to open them. Authorized TeraKey users are the only users who can decrypt documents stored in the cloud.
With the TeraKey document encryption system, sharing encrypted files becomes a breeze. Only other authorized TeraKey users can decrypt a file on their computer running the TeraKey application. Now, you can easily store many folders with subfolders and files in local servers and cloud services, such as Google Drive and OneDrive, without any worries. No one can open the documents. TeraKey protects your sensitive documents 100% all the time.
TERAKEY DOES NOT NEED ENCRYPTION KEY MANAGEMENT
TeraKey can save thousands of dollars in management and maintenance of encryption keys because it does not require encryption key management. As less time and effort is required for document encryption with TeraKey, your business will be able to protect more files, more efficiently.
TeraKey is a document encryption system that uses a random encryption key that is destroyed after encrypting a file. The encryption key is never used ever again to encrypt a file. You can send a TeraKey encrypted file to other authorized TeraKey users to be decrypted with simple double-click action on their computers or smartphones.
TOTAL INTEGRATION TO EXPLORER
Shared encrypted Group folders automatically appear on Explorer of every authorized user regardless of their physical location. Simply drag and drop files into the My TeraKey or a shared Group folder on Explorer for automatic encryption.
Double-click on a TeraKey encrypted file located anywhere in your computer to automatically decrypt it and open it on the corresponding file application. Terakey can encrypt any type of files.
TERAMESSAGE MOBILE APP
Install the TeraMessage Mobile app on the iPhone or Android phones to communicate text and TeraKey encrypted files with users outside the office or when traveling.
BEFORE TERAKEY, DOCUMENT ENCRYPTION SYSTEMS WERE COMPLEX AND EXPENSIVE
Generally speaking, a document encryption system has been an expensive commodity only affordable by large companies. Today's document encryption systems require complex key management control. Normally, the installation of special software on the company's server is also required to generate and store encryption keys, with the risk of being found by unauthorized persons who could decrypt confidential files.
Expensive cybersecurity defense efforts could be jeopardized by installing encryption key generator software in the server. Without TeraKey, document encryption is a time-consuming task for users, because each user must ask the key management staff for the specific key to decrypt a document they need to edit. This is an unproductive task that takes a lot of time from each user with the consequent productivity losses to the company. In addition, encryption operations are limited to users on the local network, without the ability to easily share files with personnel outside the company.
TERAKEY IS THE FUTURE, TODAY. NO KEY MANAGEMENT NEEDED
The TeraKey file encryption system is relatively affordable by any size of business. There is no software to be installed in the server, keeping the current cybersecurity level intact. Files are encrypted on the user’s computer where a random "Ghost" encryption key only appears when needed to encrypt a file. Sensitive files never leave your business to be encrypted.
There is no need for "encryption key management" since TeraKey destroys the Ghost encryption key after the file has been encrypted. Hackers and internal thieves cannot decrypt documents because the encryption key does not exist.
Our proprietary method uses our patented techniques for total decryption reliability, which only takes seconds. Authorized TeraKey users can trust to open a file every time it is needed.