top of page

TeraMail

Users can exchange text messages and encrypted files on a secure private TeraMail channel using a browser and TeraKey. Use TeraMail when you want to be certain that the information is safe when traveling on the Internet.

 

TeraMail becomes your PRIVATE communication service for your business without any possible interception or theft of information.

TeraMail Symbolic Application

TERAMAIL IS THE TERAKEY PROGRAMMING CONSOLE

​

As the Administrator of your TeraKey service, you use TeraMail as the console to add users and create Groups to control encryption and decryption permissions.  You can assess the file encryption tracking log and the message logs. 

​

CONTROL WHO SENDS BUSINESS MESSAGES AND FILES TO WHOM

The Administrator can create any number of Groups and assign a number of users to each Group. For each user, the Administrator can determine which user can communicate with whom.

​

WHO NEEDS TERAMAIL COMMUNICATION?
TeraKey users working at the office, at home or at remote locations who need to exchange sensitive text messages and critical business documents over the Internet.

DIRECT DELIVERY OF SENSITIVE INFORMATION
Delivery of messages and files happen on a direct connection established by the TeraCryption service. Messages and files travel protected by encryption and can only be accessed and viewed by the sender and the designated recipients.

TERAMAIL GROUP FOLDERS FOR ENCRYPTED FILES
When using TeraKey encryption, create Group folders to store files encrypted by the Group users.

FEATURES
• Instant Messages.
• Drafts to review messages before being sent.
• Canned messages for quick responses.
• Up to ten (10) attachments of files.
• Scheduled messages for transmission at a future time.
• Logs of messages.
• Message status indicates date and time of delivery and being read.

​

Click here to request a demo.  

​

bottom of page
google-site-verification: google43d31fc921668958.html