top of page

TeraMessage Mobile

Reach business associates and Clients on their mobile with absolute confidence. No one can intercept and read messages and files. Inform executives and clients on the move of sensitive events and critical business documents. Protect your business interests. Control who can communicate with whom.

​

Available on Google Play and Apple Stores for free. It does not access your Contacts or GPS. Messages and files travel protected by end-to-end encryption. TeraMessage Mobile is used for total mobile communication security.

TeraMessage Mobile Devices

WHO NEEDS TERAMESSAGE MOBILE?
Business mobile executives who are not in front of their computer and need to receive sensitive messages and business files.

CONTROL WHO SENDS MESSAGES AND FILES TO WHOM
Create Groups of users who need to communicate between themselves. i.e.: The Group "Real Estate" in a financial business. Users cannot invite strangers to be part of their TeraMessage Mobile Directory.

RECEIVED FILES ARE FOR VIEWING ONLY
The user cannot save the file on the phone or send it to users who are not in the TeraMessage directory.

LOGS OF MESSAGES
TeraMessage Mobile stores conversations protected by encryption.

MESSAGE CONTROL
Users can program the life of each message for automatic deletion. Access to messages is protected by a programmable code. Messages and credentials can be remotely deleted by the Administrator.

MESSAGE INTEGRATION
Users with a TeraMail and a TeraMessage Mobile licenses can view, send and receive messages in either application.

TERAMESSAGE MOBILE CONNECTION
TeraMessage will connect to the Internet following the smartphone connection switch between Wi-Fi and Cellular service.

 

TRACKING LOG INCLUDES DECRYPTION MOBILE HISTORY

The TeraMail encryption tracking log also collects file decryption details when Teramessage Mobile users decrypt TeraMail files.

FEATURES
• Mobile data communication TCP/IP encrypted by random keys never to be used again.
• Does not take your directory in the phone CONTACTS.
• No need to program the phone’s number.
• Received attachments cannot be stored on the phone or forwarded via email.
• On-line status indication.
• Automatic app upgrades.

​

Click here to request a demo.  

​

bottom of page
google-site-verification: google43d31fc921668958.html