top of page
TeraCryption Q&A
TeraKey, Teramail & Enterprise File Encryption Questions
Enterprise file encryption protects business documents from unauthorized access, ransomware, and data leaks. This Q&A page answers the most common questions about how a file encryption system works, how encrypted file sharing is securely implemented, and how businesses protect files stored on servers and in the cloud.
CAD project files are encrypted on the designer’s workstation before storage. Designers open, edit, and save drawings normally while stored files remain protected from unauthorized access.
Yes. Teams can securely share project folders while access to drawings is controlled by permissions. Users only open the files assigned to them, preventing conflicts and unauthorized access.
Designer-side encryption means files are decrypted only on an authorized user’s computer and remain encrypted when stored on servers or cloud platforms. Anyone without permission cannot read the file contents.
No. The system operates at the file system level, so designers continue using their existing CAD tools normally without plugins or changes to their applications.
Protected files cannot be read without authorization. Organizations can restore access to clean encrypted copies stored in the protected project location, allowing operations to resume quickly.
No. The encryption process preserves file names, locations, and folder relationships. External references (XREF), linked models, and dependent project files continue to function normally because files are decrypted automatically when opened by authorized users.
Enterprise file encryption is a security system that encrypts business files and controls who can open them using user identity and group permissions. Only authorized users can decrypt and access protected files. Unlike simple password protection, enterprise file encryption is centrally managed and designed for business collaboration and regulatory compliance.
TeraKey automatically generates unique, random encryption keys when encrypting a file. Keys are never the same and are not stored on the user’s computer or on the server. Encryption keys do not require manual management. It complies with standard encryption protocols
Encryption keys are generated automatically and are never stored with the files. Users do not manage or exchange keys manually, which prevents key loss and removes administrative overhead while maintaining strong security.
Yes. Encrypted files can be stored and shared on Google Drive, Microsoft OneDrive, or Amazon S3. TeraKey encrypts the files and automatically uploads them to the cloud in the background while continuing encryption and decryption operations.
Yes, TeraKey Enterprise can protect against ransomware. With Subscription Plans 2 and 4, your organization can quickly recover encrypted files if they are compromised during a cyberattack.
TeraMail private email enables hospitals, clinics, and medical offices to exchange protected health information (PHI) securely. Messages and files such as medical records, lab results, and referral documents are encrypted end to end, ensuring HIPAA and HITECH compliance.
Yes. TeraMail supports role-based group permissions, allowing clinicians, administrators, and IT teams to collaborate safely while keeping patient information confidential.
TeraMail is a secure enterprise email and encrypted file-sharing platform included with the TeraCryption File Encryption System. Authorized users within your organization can send emails and exchange sensitive files safely, completely outside of public email systems.
Only authorized TeraCryption users within your company can access TeraMail. Administrators control which employees or departments have permission to send messages and share files, ensuring sensitive communication remains private.
TeraMail ensures data protection by using end-to-end encryption for all messages and files. Only the intended recipients can read the content, preventing interception or unauthorized access. No one at TeraCryption can read your text and files because we do not have the encryption keys.
TeraMail allows secure sharing of multiple files attached to a single message. All files remain encrypted during transit. Users can send TeraMails of up to 5,000 words and use editor features such as bold, underline, and font-size changes. You can add TeraKey for protection at rest on the recipient’s computer.
Yes. TeraMail provides centralized logging, delivery status, and read receipts for each user, along with a master log for administrators. This helps meet regulatory secure email requirements such as HIPAA, GDPR, and other enterprise compliance standards.
Yes. TeraMail works seamlessly with TeraKey, TeraMessage, and the broader TeraCryption file encryption system, allowing secure messaging and file sharing within your encrypted enterprise workflow.
TeraMail helps your business reduce data breach risks, protect sensitive communications, ensure compliance, and keep all internal messaging and file exchanges private.
Yes. You can securely communicate with clients even if they do not have TeraKey.
Add your clients to your TeraCryption service and assign them to TeraMail. They will receive a username and password and can log in using any web browser to send and receive messages and files protected by end-to-end encryption in transit. Files are encrypted at rest only when the client is assigned as a TeraKey user and installs TeraKey on their computer.
TeraCryption is a business-grade file encryption management system that protects sensitive documents, enables secure file sharing, and ensures ransomware-proof recovery for enterprise environments.
TeraCryption is a file encryption management system, the essential protection layer that keeps your files safe from unauthorized individuals and ransomware. It ensures you can always recover from a cyberattack without paying.
• File-level encryption (granular control, not just disk-level).
• Ransomware-proof recovery (business continuity).
• Simple deployment (no IT overhaul needed).
• Competitive compliance advantage (supports ISO 27001, NIST, GDPR).
Users don’t have to struggle with key management software or worry about distributing keys to recipients to decrypt files.
• TeraCryption provides file encryption and decryption in seconds.
• No need for encryption key management software.
• No limit to the number of unique and randomly generated encryption keys used by the system to protect your files.
Yes. TeraCryption offers subscription plans for organizations of all sizes. Plans include TeraKey Enterprise, TeraLink, TeraMail, TeraBackup, and TeraMessage Mobile seats tailored to your encryption and secure communication needs.
You can store TeraKey encrypted files on your local server storage or approved cloud services such as OneDrive, Google Drive, or Amazon S3 buckets. TeraKey automatically uploads encrypted files to group folders for sharing with access permissions.
No. TeraCryption includes automatic encryption key generation and management. You do not need to purchase keys or manage them manually.
Yes. Group members who have been granted access by the administrator can decrypt and share encrypted files without manually managing encryption keys.
Administrators control access to encrypted files by assigning files and users to groups. Removing a user from a group immediately revokes decryption access. The TeraKey user who created and encrypted the file can determine with whom to share it within the group.
Yes. TeraCryption is designed for enterprise-grade security with file encryption, secure sharing, access control, and support for compliance standards such as ISO 27001, NIST, and GDPR
TeraKey encrypts files locally on the user’s computer using a unique, random encryption key for each file. Keys are never reused, and files remain encrypted at rest and in transit
You do not need to install TeraKey on your server. TeraKey runs on user endpoints and integrates with your storage system without impacting existing cybersecurity defenses. No software needs to be installed on the server.
Yes. TeraKey supports all file formats (documents, images, spreadsheets, CAD drawings, videos, and more) and encrypts them securely without user intervention to obtain encryption keys.
No. TeraKey encrypts files directly on the user’s device before storage or sharing, ensuring your sensitive files never leave your infrastructure unencrypted.
Only designated administrators can add, disable, and remove users and manage their encryption and decryption permissions.
TeraKey uses advanced encryption algorithms with unique keys per file, and only authorized users with permissions can decrypt files, ensuring strong protection against unauthorized access.
Yes. You can sign up for a 7-day free trial to test the full features of TeraKey and other TeraCryption components.
To begin your TeraCryption free trial, contact sales using the “Contact Us” form to receive installation instructions for TeraKey and related components.
At TeraCryption, we are committed to providing our customers with the highest level of support possible. Our team of experienced personnel is available to help with any issues or questions. We offer phone, email, and live chat support, and our response times are among the fastest in the industry. We also provide regular software updates and maintenance to ensure your TeraKey security system is always up to date and performing at its best.
TeraCryption offers subscription plans (https://www.teracryption.com/plans)and customized file encryption and management solutions tailored to your needs. As a result, the cost of our services varies depending on the quantity and type of component seats, as well as the nature of your project. You can have from just a few to thousands of users.
Please provide us with a description of your requirements. What are your main goals in using TeraKey to protect your sensitive files? Please send us your thoughts to sales@teracryption.com. (mailto:sales@teracryption.com)Your response will be confidential. You can count on that!
https://static.wixstatic.com/media/452dfd_cebd1429c8454ae9a61bf85247a07391~mv2.jpeg
bottom of page
