top of page

TERAKEY ENTERPRISE

Enterprise-Grade File Encryption, Built for Control and Simplicity

TeraKey Enterprise is the encryption engine of the TeraCryption platform, designed to protect sensitive files stored on the server and users’ computers. Unlike cloud-based encryption tools, TeraKey encrypts and decrypts files locally, ensuring your files never leave your control.

Files are never uploaded to TeraCryption for storage, encryption, or decryption. You decide where encrypted files are stored—on local disks, internal servers, or your approved cloud storage.

How TeraKey Enterprise Works


TeraKey is part of the broader File Encryption Systems offered by the TeraCryption platform, designed to secure files at rest while preserving full control over storage and access. TeraKey installs directly on each authorized user’s computer and integrates seamlessly with Windows Explorer, making file encryption part of everyday workflows.


•    Encryption and decryption happen locally on the user’s computer.
•    No file content is sent to TeraCryption servers.
•    Users work with encrypted files just like standard unencrypted files.
•    Strong security with minimal user training.

Installation and Deployment for Enterprises


TeraKey Enterprise is built for managed IT environments.


•    Administrator-controlled installation ensures only approved users can install and activate TeraKey.
•    TeraKey.exe allows local installation on each user's computer. 
•    Deploy remotely using TeraKey.msi with Windows Server tools (GPO, Intune, SCCM).
•    No manual key management or complex configuration required.

 

Once installed, TeraKey automatically integrates into Windows Explorer as the primary user interface.
 

My TeraKey Folder: Secure by Default


During installation, TeraKey creates a dedicated My TeraKey folder visible in Windows Explorer only when the user logs in.


•    Equivalent to My Documents, but all files are encrypted automatically.
•    Files are encrypted the moment they are saved.
•    Ideal for protecting daily working documents.

 

Users can also encrypt files or folders anywhere on the computer or network using right-click Explorer actions.

 

Group-Based Encryption and Access Control


TeraKey supports group-based encryption, enabling secure collaboration.


•    Files are encrypted for a specific group.
•    Each group can contain any number of users.
•    Only group members can decrypt group-encrypted files.
•    Administrators fully control who can encrypt and view files.

 

This model ensures sensitive files are shared only with authorized users—internally or across departments.

Subscription Plans and Storage Options


TeraKey integrates seamlessly with TeraCryption Subscription Plans, enabling organizations to align encryption, storage, and recovery strategies with their security and infrastructure requirements.  Learn more...

Strong Authentication and User Security


To encrypt or decrypt files, users must log in to TeraKey.


•    Two-Factor Authentication (2FA) verifies user identity.
•    Prevents unauthorized access, even on compromised devices.
•    Works transparently within Explorer.

 

High-Performance TeraKey Enterprise Encryption

TeraKey Enterprise is designed for scale and speed:

  • Encrypt entire folders or single files.

  • An unlimited number of files.

  • Average file encryption or decryption takes only seconds.

  • No performance impact on daily operations.

  • Automated Key Management.

 

TeraKey Enterprise eliminates the complexity of encryption key handling

  • Random, unique encryption keys per file.

  • Keys are never reused and never recycled.

  • Keys are not stored on the computer or the server.

  • No key management software to install or maintain.

This architecture prevents attackers from discovering or extracting encryption keys.

Key Benefits of TeraKey Enterprise

TeraKey complements TeraMail, enabling users to securely send encrypted files while maintaining end-to-end protection across file storage and messaging.

  • Protects files from unauthorized access.

  • Enables rapid document recovery after cyberattacks (Plan 2 & 4).

  • Full administrative control over encryption and access.

  • Send encrypted files safely as email attachments.

  • Encrypt files using familiar Explorer actions.

  • Compatible with Google Drive, Microsoft OneDrive, and Amazon S3 to share files.

  • No centralized key vaults or manual key administration.

Encryption Operation Overview

  • Encryption and decryption occur on the user’s computer.

  • No files are uploaded to TeraCryption for encryption.

  • Unique encryption key per file.

  • Keys are never reused.

  • Files saved to My TeraKey are encrypted automatically.

!
Widget Didn’t Load
Check your internet and refresh this page.
If that doesn’t work, contact us.

Is TeraKey Enterprise Right for Your Organization?

Answer a few questions to see how TeraKey Enterprise can fit your security strategy:

  1. Do you need to encrypt sensitive files without uploading them to third-party servers?

  2. Do your users work with confidential files on laptops, desktops, or shared drives?

  3. Do you require administrator control over who can encrypt and access files?

  4. Are you concerned about ransomware, insider threats, or unauthorized access?

  5. Do you want encryption that works directly within Windows Explorer?

  6. Do you need secure file sharing with internal teams or external partners?

  7. Would automated backup and rapid recovery after cyberattacks be valuable?

 

If you answered yes to several of these questions, TeraKey Enterprise is designed for your organization.

TM logo 300 x 300 transparent_edited

File Encryption and Secure Communications Platform

  • Linkedin

    TeraCryption Canada

    20 Valleywood Drive,

    Markham, Ontario,

    Tel: 905-475-5557

    Toll Free: 1-800-387- 4237

    TeraCryption USA

    401 Park Ave S, 

    New York, NY.

    Tel: 212-921-5222
    Toll Free: 1-800-387- 4237

    TeraCryption Mexico

    Comunicaciones Elite S.A. de C.V.

    Atenas, Col. Conjunto Europa

    Irapuato, Guanajuato,

              462-152-4294 Manager

              462-627-7007​ Sales

              rgproactivo@gmail.com

              comsel7@gmail.com

              www.comsel.mx

    Imagen Whatsapp-1
    Email Transparent envelop
    www icon

    © 2026 Canamex Communications Corporation
    © 2026 TeraCryption Corporation

    TeraCryption is the cybersecurity division of Canamex Communications Corporation

     

    All rights reserved. Information, products, software, operational description, and specifications are subject to change without notice. All information is provided on an “AS IS” basis without warranties. TeraCryption, the TeraCryption logo, and other TeraCryption trademarks are the property of Canamex Communications Corporation.  All other trademarks are the property of their respective owners.

    Contact us at TeraCryption

    bottom of page
    google-site-verification: google43d31fc921668958.html