TeraCryption is a file encryption management system, the essential protection layer that keeps your files safe from unauthorized individuals and ransomware. It ensures you can always recover from a cyberattack without paying.
File-level encryption (granular control, not just disk-level).
Ransomware-proof recovery (business continuity).
Simple deployment (no IT overhaul needed).
Competitive compliance advantage (supports ISO 27001, NIST, GDPR).
Users don’t have to struggle with key management software or worry about distributing keys to recipients to decrypt files.
TeraCryption provides file encryption and decryption in seconds.
No need for encryption key management software.
No limit to the number of unique and randomly generated encryption keys used by the system to protect your files.
Select a Subscription Plan that matches your file encryption needs. Briefly:
Plan 1: For businesses with 3-5 users.
Plan 2: Designed for companies with 5 to 50 users, where encrypted files are safely stored in a cloud service, and TeraKey can recover them after a cybersecurity attack to prevent ransom payments.
Plan 3: For companies that want to store their encrypted files on a local server.
Plan 4: Similar to Plan 3, with the addition of TeraBackup to automatically create a mirror of each file in the central folder on the server and store it in a cloud service for restoration in the event of a cyberattack.
You can securely store your TeraKey encrypted files in a cloud service or on your local server storage disks. TeraKey connects to exclusive MS OneDrive or Google Drive accounts, allowing you to share files without direct access. This ensures your encrypted files are protected from unauthorized access. TeraKey will automatically create Group folders and upload files after encryption on your computer.
No, you don't need to purchase encryption keys. Your TeraCryption subscription includes unlimited encryption key generation and automatic key management. The annual subscription cost varies based on the quantity and type of component seats (e.g., TeraKey Enterprise, TeraLink, TeraKey Client, TeraBackup, TeraMail, TeraMessage Mobile) tailored to your business needs. See Plans.
Yes, you can share encrypted files with other users in your groups without worrying about sending encryption keys separately. TeraKey automatically grants recipients permission to decrypt shared group files, ensuring secure communication and sharing of sensitive information without the complexity of managing encryption keys.
The TeraKey file security system allows you to control who can decrypt files by assigning access permissions to individual users or groups. You can assign any number of users to a group, permitting them to open encrypted files stored in that group folder. To stop a user from opening files in the Group, you can remove the user from the Group using a drag-and-drop action on a web page map available on TeraMail only to administrators and supervisors.
Yes, TeraCryption is designed to meet the file security needs of businesses of all sizes. Our platform offers a range of advanced file security features that can be tailored to your organization. From file encryption and secure document sharing to access control and user authentication, TeraCryption has everything you need to keep your sensitive files safe and use secure and private text and file communications.
The TeraKey application installed on the user's computer encrypts documents using unlimited random keys. The same keys are never used again; they appear only when an authorized user needs to decrypt a file. The user manages files and folders using Explorer functionality. File encryption takes just a few seconds. Key management is completely automatic without the user's intervention.
To use TeraKey, you don't need to install any TeraKey software on your server, ensuring your existing cybersecurity defense system remains unaffected. Additionally, there's no need to install encryption keys or encryption key management software.
Yes, TeraKey can encrypt any type of files. From documents to photos and videos, TeraKey's advanced encryption technology ensures that your files are protected from unauthorized access. TeraKey also supports many file formats, including PDFs, Word documents, and Excel spreadsheets. Additionally, TeraKey's use of Explorer makes it easy to encrypt and decrypt files, even for those with little to no technical expertise. So, whether you want to protect files such as audio recordings, pictures, or sensitive business files, TeraKey has you covered.
No, TeraKey encrypts files in the user’s computer. Files are not uploaded to our service to be encrypted. Our encryption technology ensures that your documents never leave your business computers to be encrypted. Your files remain confidential and protected from unauthorized access at all times. We understand the importance of file security and take precautions to ensure your information is safe. Rest assured that your sensitive files encrypted by TeraKey are always in your hands, no matter where you store them.
Only the designated administrator can add, disable, and delete users, as well as grant or deny access to encrypted files. The administrator controls each user's encryption and decryption permissions, ensuring system security and integrity. For any questions or concerns about user access, please contact TeraCryption's support team.
TeraKey is designed to provide the highest level of file security ever. Any encrypted file cannot be decrypted without using the original keys. TeraKey destroys the encryption keys after instant decryption verification. Therefore, you can use TeraKey to encrypt a file and upload it to any cloud storage service without worries. No computer could decipher the document-encrypted data because there are no encryption keys. Furthermore, TeraKey includes multiple layers of authentication (2FA) and access control to prevent unauthorized access. A file can only be decrypted by a TeraKey user under your TeraCryption company's secret license and only if you, as the administrator, grant permission. Rest assured that your files will be protected with TeraKey's advanced security measures.
Yes. You can sign up for a 7-day trial to test the features and capabilities of the TeraKey file encryption management system. During the trial, you can access all the TeraKey functionality. If you subscribe to the TeraCryption service after the trial, we can seamlessly upgrade your account to a paid subscription. We encourage you to take advantage of our free trial offer if the price is right and experience TeraKey's benefits firsthand.
Go to "Contact Us" and fill out the form. After approval, you will receive a link with TeraKey installation instructions for your 7-day trial with three TeraKey and TeraMessage Mobile seats.
At TeraCryption, we are committed to providing our customers with the highest level of support possible. Our team of experienced personnel is available to help you with any issues or questions you may have. We offer phone, email, and live chat support, and our response times are among the fastest in the industry. In addition, we provide regular software updates and maintenance to ensure that your TeraKey security system is always up-to-date and functioning at its best. With the TeraCryption platform, you can rest assured that you will receive top-notch support and service.
TeraCryption offers subscription plans and customized file encryption and management solutions for your specific needs and requirements. As a result, the cost of our services varies depending on the quantity and type of component seats, as well as the nature of your project. You can have from just a few to thousands of users. Contact us today to discuss your file encryption and security needs and receive a quote. Enter the expected number of users and briefly describe what you need. You can also email us at sales@teracryption.com. We will respond as soon as possible.
Please provide us with a description of your requirements. What are your main goals in using TeraKey to protect your sensitive files? Please send us your thoughts to sales@teracryption.com. Your response will be confidential. You can count on that!
