TeraKey

Protect sensitive documents from internal theft with
unbreakable encryption

There are business documents in your company with information that is not for everyone. i.e.: Financial and payroll information, product development reports, market strategies, etc. TeraKey gives you control of who can decrypt and read sensitive business files.


STOP UPLOADING SENSITIVE FILES TO THE CLOUD WITHOUT TERAKEY ENCRYPTION.
TeraKey encryption users


  • Edit Word, Excel and Power Point files and simply save to encrypt.

  • Double-click on a file to decrypt, opening in its default application.

  • Encrypt folders with files and subfolders preserving the file tree.

  • You do not need to send a decryption key to file recipients.

  • Send encrypted files by email to other TeraKey users.

  • TeraKey uses random "ghost" keys that disappear after encryption.

  • Files never leave the TeraKey user's computer to be encrypted.

  • Protect sensitive documents from unauthorized people

    WHO NEEDS TERAKEY?
    A business that needs to protect sensitive files from falling into the wrong hands.

    CONTROL WHO DECRYPTS FILES
    With TeraKey, you can create any number of Group folders to store encrypted business files in the local computer, the network server or in the business's Cloud storage service. Assign authorized users to each Group folder as permission to encrypt and decrypt files.

    TERAKEY PRO
    When using TeraKey PRO, sharing consists of sending encrypted files to recipients over the network, via email, TeraMail or as a download from a Cloud storage service. Do not worry about distributing encryption keys.

    TERAKEY ENTERPRISE
    TeraKey ENTERPRISE provides users with shared Group folders that appear in their Explorer, showing the tree of encrypted folders and files stored in Google Drive. For automated encryption, a user can simply drag-and-drop a file into any folder or sub-folder of the Group tree. Every other user will instantly see in their Explorer the updated folder tree.

    CHOOSE TERAKEY PRO AND ENTERPRISE FOR YOUR BUSINESS NEEDS

    TeraKey Pro and Enterprise features


    WHAT MAKES TERAKEY PROTECTION UNIQUE?

  • Allows a quick recovery from a cyber attack.
  • Protects files from access by unauthorized individuals.
  • MS Office files encrypted when saved to TeraKey folder.
  • Administrator controls who can encrypt and view files.
  • Encrypted files can be emailed as attachments to other users.
  • Encrypt files and folders with drag and drop.
  • Use Google Drive to distribute and share encrypted files.

    ENCRYPTION "GHOST" KEYS

  • TeraKey encrypts and decrypts on the user's computer.
  • There are no files uploaded to TeraCryption for encryption.
  • TeraKey uses random "ghost" encryption keys.
  • TeraKey uses a different encryption key for each file.
  • Every encryption key is destroyed after use.
  • Hackers cannot find destroyed encryption keys in the computer.

    SEE THE DAMAGE CAUSED BY CYBER ATTACKS TO BUSINESSES LIKE YOURS

    COST OF INSIDER THREATS (2020)

    SANS - Reliable summary of cyber attacks

    Statistics Canada - March 28, 2019

    Center for Strategic & International Studies (CSIS)

  • TRUST YOUR FILES TO TERAKEY ENCRYPTION

    No one without using TeraKey can decrypt files

    TeraKey encrypts files using unique random "Ghost" keys that are destroyed after encryption verification. Unauthorized individuals will never find the keys that were used to encrypt files because they ceased to exist.

    Trust TeraKey to place encrypted sensitive files in the Cloud
    You can safely place the most sensitive TeraKey encrypted files in Cloud services without the fear of decryption because the documents do not carry the encryption key. The encryption key used in a document is not stored even in our TeraCryption service.

    TeraKey encryption is performed in the user's computer
    Business files never leave your security environment or the TeraKey user's computer for encryption.

    Decryption of files
    Only authorized users can decrypt files using TeraKey. Using patented technology, a new "Ghost" key appears for decryption only after verification that user has permission to decrypt, open, edit or view that particular file.

    Mass encryption utility
    Encrypt digital archive folders, with sub-folders and files. As destination, select any folder on the local encrypting computer, other network computer, the business Server or the Cloud. With TeraKey Enterprise, you can select as destination a shared TeraKey Group folder shown in Explorer. In this case, the archive encrypted folders will be automatically uploaded to the corresponding shared Group folder in Google Drive, preserving the original archive folder organization tree.

    Sharing TeraKey Group Files



    Request prices

    sales@teracryption.com

    TeraCryption Corporation is a business Division of Canamex Communications Corporation
    with more than 40 years providing critical messaging solutions to businesses, hospitals, factories and emergency services.
    TeraCryption® TeraKey® TeraMail® and TeraMessage® are registered trademarks.