top of page

TeraKey® to deliver encrypted files to clients.

When using the TeraCryption service, the TeraKey Client feature allows executives to deliver TeraKey encrypted files directly to their clients’ Windows Explorer. No fuzz, no hassle.

To exchange encrypted files with your clients, they only need to install TeraKey Client on their computers and login with their secure username and password. That’s all.

TeraKey Clients

To illustrate how it works, let's take the example of a Lawyer dealing with critical clients. After each client installs TeraKey, folders named after each client appear in the Lawyer's Explorer. To deliver a confidential file to client "B", the Lawyer drags and drops it into client "B's" folder. Within seconds, the file is encrypted and appears in the "B" folder in Explorer on the client's computer.

Client “B” simply double-clicks on the TeraKey file to automatically decrypt it, opening in the file’s application, such as Word, Excel, Adobe PDF, etc.

Client “B” will be able to edit the file, which will be automatically encrypted again and placed back in the same folder when finished. Within seconds, the edited file appears in the folder of client “B” in Explorer of the Lawyer, regardless of their physical location.

Clients can encrypt by simple drag-and-drop of a new file into the TeraKey clients’ shared folder in their Explorer. Files will appear in seconds in the corresponding client’s folder in Explorer on the Lawyer’s computer.

This is the easiest and most secure way to exchange sensitive files with all your clients. TeraKey Client removes the risk of hijacking or stealing files at rest and in transit to clients. Note that the TeraKey files remain encrypted at both ends and based on the Administrator’s permissions, only the sender and the recipient can open them.

The beauty is that there is no encryption key management required. There is no distractions or interruptions to ongoing work tasks. Operation is totally transparent to clients and to executives.

TeraKey Client will give you and your clients total confidence in exchanging sensitive documents.

Remember: Files travel protected by unbreakable encryption! Would you like to try it? Fill in the form in the “Contact us” tab. As an alternative, click on the “Book Demo” tab and choose a date and time of your convenience.

If you are a current user of the TeraCryption platform, contact Support for an upgrade.


Prepared by TeraCryption Corporation.

Copyrights reserved.

Recent Posts

See All

Existing file encryption systems File encryption systems using hard drive encryption are an excellent way to protect sensitive files. However, files lose protection the moment they are taken out of th

bottom of page