top of page
document-management-system.jpg

File encryption system to protect sensitive files in your business. 

ZERO TRUST SECURITY

Protect all communications and sensitive files with unbreakable encryption.

Control who can share and open encrypted files with automatic encryption key management.


REDUCE SENSITIVE INFORMATION VULNERABILITIES

TeraCryption protects sensitive information, reduces vulnerabilities, and encrypts, protects, and shares files. The system integrates with Explorer, allowing users to encrypt files in seconds and store them on their computer, the server, or a cloud service. It also provides document encryption tracking. Automated TeraCryption's key management system allows authorized users to encrypt files without human intervention, and it supports unlimited keys. TeraCryption is used by businesses of all sizes that need to protect their sensitive files. Our unique selling points are our zero-trust security, our automatic key management, and our ability to encrypt files in seconds.

While you take care of business.JPG

ENCRYPT, PROTECT AND
SHARE FILES

Key management with no human intervention

 

Automatic encryption key management allows authorized users to encrypt files in seconds. Use unlimited keys with your system.  TeraCryption integrates with Explorer to avoid learning curves.

Store encrypted files in your computer, the server, or a cloud service.

Create Groups to control access to encrypted files. Increase productivity and raise the level of file protection.  

Tracking log-2.jpg
TimeLine hacker Defense.jpg
TeraKey Enterprise User

BETWEEN YOU AND YOUR CLIENTS

Do not risk sensitive client files. Using TeraCryption with TeraKey Enterprise, you and your client can create a folder in Explorer identified by the client's company name, e.g., ACME. Drag and drop a document into the ACME folder in your Explorer, and it will be automatically encrypted, appearing in seconds inside the ACME folder in your client's Explorer. 

With TeraCryption, no more documents are sent via emails that can be intercepted. There is no hassle with encryption keys or asking clients to upload and download files.

USERS
 

  • Lawyers

  • Accountants

  • Financial Brokers

  • Hospitals

  • Healthcare

  • HR

  • Labs

  • Factories

  • R&D

  • Contractors

  • Consultants


       COMPONENTS

Secure communications internally and with Clients.

  • TeraCryption provides the TeraKey Windows application with the ability to encrypt entire folders containing subfolders and files of any size and type, preserving the file organization tree.

  • The administrator controls shared encrypted file management by organizing users and files in dynamic groups. Document encryption becomes transparent to the user, who can double-click to decrypt a file regardless of its location.

  • TeraCryption allows authorized users with TeraKey Enterprise to encrypt files in seconds. The encrypted files are automatically uploaded to Google Drive or OneDrive for maximum security and protection of sensitive information.

  • The TeraCryption file encryption system is reliable, practical, and valuable. Unique file encryption technology and smooth, reliable integration with Google Drive or OneDrive will reduce information vulnerabilities.

ENCRYPTION

  • Random encryption keys automatically managed.

 

  • Unbreakable military level of encryption.

  • Do not worry about sending keys to clients.

 

  • There is no need to buy encryption keys ever. 

  • Unlimited encryption of any type of files.

FEATURES IN A NUTSHELL

 

USER FRIENDLY

TeraCryption Enterprise is a user-friendly File Encryption System to manage encrypted files in any size of business. TeraKey has been specially designed to manage encrypted files using Explorer functionality.

GROUP DECRYPTION CONTROL

The Administrator can create any number of groups, each with any number of users. During operation, TeraCryption users encrypt files to groups in order to have secure file sharing with other users. Only users assigned to a group can decrypt files encrypted to that group.

 

STORE ENCRYPTED FILES ANYWHERE

Encrypted files can be store anywhere in the local computer, in a network computer, in a NAS, or in the cloud. TeraCryption provides the TeraKey application integrated to Explorer to allow handling of encrypted files as if they were regular files which can be copied, moved or sent via email.

INTEGRATION WITH CLOUD SERVICES

TeraCryption with TeraKey Enterprise, automatically creates group storage folders in the Cloud service, which appear in Windows Explorer of each user assigned to the group.

INTEGRATION WITH EXPLORER

TeraKey automatically integrates with Windows Explorer. Management of TeraKey encrypted files can easily be done with Explorer functionality.

 

DECRYPTION

Users can double-click on the TeraKey file name to decrypt a file. After editing and viewing, the files will be encrypted and uploaded to the cloud again when the application is closed. i.e.: Editing a Word file.

 

ENCRYPTION

Encrypting a file or an entire folder is as simple as dragging and dropping it into the Group folders showing on Explorer.

 

ENCRYPTION TRACKING

TeraCryption provides a tracking log with the encryption history of any document since it was created. The TeraCryption tracking log shows who has changed the file, showing the date and time of when it was decrypted and encrypted again.Export the tracking log in Excel format for further analysis.

 
bottom of page