top of page
v41.jpg

TeraKey file encryption system with user controls and tracking reports.

Unbreakable encryption allows you to safely send, share and store files.

FORGET ABOUT ENCRYPTION KEYS!
No management needed.

Abstract Futuristic Background

Watch the benefits of using TeraCryption (1.44 min.)

Vimeo                                    YouTube

TERAKEY IS AN ENCRYPTION FILE SYSTEM FOR ANY TYPE OF BUSINESS THAT NEEDS TO PROTECT DOCUMENTS

Do you have a Law Firm who needs to protect legal documents in the office? A Financial business dealing with VIP investors across the country?  A factory that needs to protect sensitive lab data? No matter what your trade is, TeraKey will give you the protection to sensitive information that you are looking for with the capability to manage encrypted files. Chat with us or book a demo. You will be impressed!

SPECIAL APPLICATIONS

Tell us what you need and we will propose a system that will work for you.

USERS OF OUR TECHNOLOGY

The core server of TeraCryption has been in use for more than 20  years servicing 1000's of users.

Encryption with no HASSLES

Our patented technology allows the destruction of encryption keys after encryption.

SUPPORT

Tutorial videos and direct support for installation and operation by users.

AFFORDABLE

Prices relatively low considering the high level of protection and a Management System with encryption tracking log.  

Abstract Futuristic Background

The TeraKey file encryption system allows users to easily encrypt sensitive MS Office files, PDF documents and any type of files.

 

NO ONE IN THE CLOUD CAN SEE THE FILES' CONTENT.​

Keep files in encrypted state in the Cloud all the time.

 

Only users with permission will be able to download, open, edit and encrypt them again, as a routine operation using their Explorer.

TERAKEY PRO ENCRYPTS AND UPLOADS FILES TO THE CLOUD FOR ABSOLUTE SECURITY

TeraKey encrypts and uploads to cloud

When you are not able to use a Cloud service for storage of encrypted files, TeraKey PRO can use the company's inhouse server or a NAS to store encrypted files.

As an example, watch a low cost solution when using TeraKey PRO and Dropbox to protect your files.  The storage destination can also be the Google Drive or MS OneDrive folder on your computer.

Illuminated Objects

TERAKEY ENTERPRISE AND CLOUD SHARED FOLDERS WITH ENCRYPTED FILES

Drag and drop a file or use "Save as.." to My TeraKey folder or to Cloud shared folders shown on Explorer, to quickly encrypt a file or an entire folder with different types of files. 

 

The TeraKey file encryption system will automatically upload a copy of the local encrypted files to your company's Cloud account with Google Drive or OneDrive. 

 

You can quickly restore folders and files to your computer in case of a hacker attack or if files are lost.

File Sharing Inverted - 3-min.png

Use TeraKey to communicate sensitive messages and files with your clients and other business associates, such as suppliers, contractors and company's staff at remote locations. 

Abstract Background

USE TERAKEY ENTERPRISE TO DELIVER ENCRYPTED FILES FROM EXPLORER TO EXPLORER

The TeraKey file encryption system delivers encrypted files directly to the Explorer of authorized users and clients, regardless of their location (office, home, hotel, mobile, etc.).

 

There is no need for sending unprotected documents by email or wireless.

 

Anyone can use double-click to decrypt a file in seconds. It will automatically re-encrypt and upload to the Cloud when closing the file.

TeraKey files from Explorer to Explorer

Every TeraKey user in your company can easily share encrypted files, which appear on the corresponding Group folder on their Explorer, athough they are stored in the Cloud service.

Shapes and Shades

USE TERAMAIL AND TERAKEY TO SECURE MESSAGES AND FILES COMMUNICATION TO MOBILE USERS

In addition, users can install the TeraMessage Mobile app on their phone to exchange messages and files protected by the file encryption system.

Encrypted files cannot be stored on the phone. Text messages are stored encryted.  The Administrator can delete messages and programming with remote control from the TeraKey file encryption system console in case the phone is lost.

TeraKey secure communication of files

Users can download and install the TeraMessage Mobile app on their iPhone and Android smartphones to send and receive text messages and view encrypted TeraKey files.

LogoSpeed_edited.jpg

USE TERAKEY ENTERPRISE TO SECURE INTERNET MESSAGES AND FILE COMMUNICATIONS IN HEALTHCARE

In a Hospital, it is critical to deliver emergency messages.

 

The TeraCryption platform provides an onsite transmiter and pocket pagers for Emergency  Response teams.

TeraCryption integrates TeraKey file encryption and messaging to pagers and smartphones, for delivery in seconds.

A log provides tracking of encryption, file delivery and messaging.

Logs Inverted - 5-min.png

Hospitals and other critical messaging applications use a local, in-building TeraCryption radio transmitter and pocket pagers. Smartphones with TeraMessage Mobile and computer users with TeraMail are integrated.

bottom of page
google-site-verification: google43d31fc921668958.html