TeraKey encrypts files using unique random "Ghost" keys that are destroyed after encryption verification.
Unauthorized individuals will never find the keys that were used to
encrypt files because they ceased to exist.
Trust TeraKey to place encrypted sensitive files in the Cloud
You can safely place the most sensitive TeraKey encrypted files in Cloud services without the fear of decryption
because the documents do not carry the encryption key. The encryption key used in a document is not stored
even in our TeraCryption service.
TeraKey encryption is performed in the user's computer
Business files never leave your security environment or the TeraKey user's computer for encryption.
Decryption of files
Only authorized users can decrypt files using TeraKey. Using patented technology, a new "Ghost" key appears for decryption only after verification
that user has permission to decrypt, open, edit or view that particular file.
Mass encryption utility
Encrypt digital archive folders, with sub-folders and files.
As destination, select any folder on the local encrypting computer, other network computer, the business Server or the Cloud.
With TeraKey Enterprise, you can select as destination a shared TeraKey Group folder shown in Explorer. In this case,
the archive encrypted folders will be automatically uploaded to the corresponding shared Group folder in Google Drive,
preserving the original archive folder organization tree.