USE TERAMESSAGE MOBILE TO PROTECT BUSINESS MESSAGES AND FILES
The user's directory is controlled by the Administrator.
Messages travel encrypted end-to-end on the Internet.
One random encryption key per message and attachment.
Encryption keys are never used again.
Only sender and recipient can view encrypted files.
Impossible to forward a message or a file to an email address.
Messages and files not decrypted at the TeraCryption Service.
User can program the life of the messages stored on the phone.
The Administrator can remove user's access remotely.
Sender is notified when recipient reads the messages.
Downloaded files and pictures are for viewing only.
Record voice messages and send them encrypted to recipients.
Voice messages are not stored on the phone.
Access to TeraMessage may be protected by unique passcode.
WHAT MAKES TERAMESSAGE UNIQUE?
SEE THE DAMAGE CAUSED BY CYBER ATTACKS TO BUSINESSES LIKE YOURS
SANS - Reliable summary of cyber attacks
Statistics Canada - March 28, 2019
Center for Strategic & International Studies (CSIS)