Protect documents with encryption in seconds and share them with other authorized users.
TeraCryption protects exchange, storage and sharing of sensitive documents in your business.
Protect sensitive documents with proven unbreakable encryption. Automatic upload to a cloud storage service inaccessible to hackers and internal thieves. Integration to Explorer for familiar file management operation. Grant file encryption permissions with simple drag-and-drop. Encryption takes a few seconds and it is transparent to the user because there is no need for key management. TeraCryption is a business platform to facilitate document protection in your business.
IN CASE OF A HACKER ATTACK
Tom, Mary and John can quickly restore up-to-date encrypted files back to their local My TeraKey folder.
Replace Windows and reinstall TeraKey to access TeraKey shared Group folders. Nothing is lost!
Control who can encrypt and decrypt files in shared Group folders by simple drag-and-drop action.
TeraKey encrypts and automatically uploads files to the cloud
The only safe way to protect your documents from hackers and internal theft is to encrypt them first and then save them in the Cloud. Hackers and internal thieves cannot access them. If they did, they could not decrypt them.
Full integration with Explorer
Use Explorer as you do with other files. No software is installed on your Company's server. There is NO encryption hardware to buy. Random GHOST encryption keys DO NOT need to be managed because they are destroyed after encrypting a file. File encryption takes just a few seconds!
Store TeraKey encrypted files in your exclusive Google Drive account
As a powerful option, TeraKey automatically uploads encrypted files to your exclusive Google Drive account dedicated to only store TeraKey documents. For total security, users do not need to access this account. Placing encrypted files in Google Drive detains hackers and thieves from destroying them. Use file encryption without having to think about it!
No encryption key management needed
After TeraKey encrypts a document, the key is destroyed without leaving any trace. No one can decrypt a file because the key does not longer exist. TeraKey uses a different key every time a document is encrypted. The key is never the same. TeraKey file encryption becomes a standard in your business.
Control storage and sharing of TeraKey Files
Use the TeraMail web console to create Group folders in Google Drive. Control who has access to folders and who can decrypt. Secure file encryption sharing. Group shared folders appear on each user's Explorer.
Mass folder and files encryption
Encrypt existing archived folders and sub-folders preserving the original organization. Store encrypted archives in your servers or in the cloud. Only users with permission will be able to open encrypted archives. File encryption gives you total protection.
TeraMail and TeraMessage Mobile for safe communications
Users with computers using TeraMail browser application can communicate text messages and encrypted files. Users with our TeraMessage Mobile app on iPhone or Android devices can also communicate messages and encrypted documents with TeraMail users.
TeraCryption use and benefits (1.37min.)
When using a cloud storage service, such as Google Drive or OneDrive, you can quickly restore files destroyed by hackers. We offer free system configuration to suit your file security and restorage needs. (2.28 min.)
The TeraCryption System Integrates With Your Business Ecosystem
TYPES OF BUSINESSES USING TERACRYPTION
Because of a seamless document encryption integration with Explorer, TeraKey can be used by many businesses, such as Law and Financial firms; Chemical labs; Research and Development operations; Factories of competitive and innovative products; Human Resource firms to protect the privacy of people; and many more type of businesses.
TeraMail, TeraMessage Mobile and TeraKey will integrate to your way of operations no matter what mobile devices are used, the file system you have, and what your business ecosystem is.