TeraCryption for your Business
Advantages and Benefits
DON'T PAY FOR INFORMATION RANSOM
​
TeraCryption is a service that protects sensitive documents in your business using local file encryption. It is not an antivirus or firewall. TeraCryption is a system that avoids paying the hacker to restore operations after freezing computers. With TeraCryption, you can restore business operations quickly without paying a ransom. ​Moreover, TeraCryption is your ally in eliminating internal theft and unauthorized access to sensitive business documents. It's a safeguard that prevents critical information from falling into the wrong hands and stops the leakage of information that could be sold to clients or competitors.
YOUR PRIVATE FILE AND MESSAGE COMMUNICATION SYSTEM
​
TeraCryption establishes a PRIVATE channel on the Internet (NOT VPN) for text messages and document transmission between local and remote offices. You no longer have to send sensitive documents via email that could be intercepted. By letting your clients know their information is secure, you can earn their trust, ensuring a long business relationship. Do not put sensitive client information at risk. Use TeraCryption to deliver documents directly to users’ Explorer. In case of a hacker attack, quickly restore business operations with clients.
SECURE COMMUNICATION WITH CLIENTS
​
TeraCryption offers robust local file encryption solutions that are easy to use. Exchange sensitive documents with authorized company's users and clients from Explorer to Explorer. This is ideal for lawyers and accountants to safely share encrypted documents with clients, protecting your business by safeguarding the sensitive information of your clients. TeraCryption is the simple solution for secure communication and file encryption.
DEPARTMENTAL ORGANIZATION OF ENCRYPTED DOCUMENTS
​
TeraCryption empowers you to organize and share encrypted documents by creating groups corresponding to your business' departments. This means that HR people, for example, cannot see or decrypt the Sales executives' encrypted files. The sharing of encrypted documents is under your control, as you play a crucial role in assigning users to the corresponding groups (your business departments) on a web console map. TeraCryption's protection extends to selected sensitive documents and files, guarding them against cyberattacks and malicious individuals who may seek to disrupt your business.
DOUBLE CLOUD PROTECTION
With TeraCryption, you can automatically store encrypted files in an independent Google Drive or OneDrive account that you can open for TeraCryption operations. Those cloud-storing services will again encrypt the uploaded files, providing double file protection. TeraKey, a TeraCryption application, performs local file encryption on the user’s Windows 10/11 computer. As the administrator, you have complete control over users’ access to the encrypted files stored in the cloud storage location, ensuring the highest level of security. TeraCryption's local file encryption is similar to placing your documents in a safe in your office and then uploading the safe to the cloud for double protection.
USE YOUR SERVER INSTEAD OF THE CLOUD
​
TeraCryption offers a convenient solution that automatically saves users’ encrypted files to an assigned folder on your server. Authorized TeraKey users can decrypt files stored in the server when visible in the shared group folders on their Explorer without the encrypted file moving to the user's computer. The encrypted files are only stored in the special folder on the server. You achieve total protection of shared encrypted documents stored on the server. With this TeraCryption file encryption solution, users can restore lost files if hackers freeze their computers because they are saved in the server. There are no decrypted files traveling on the network that could be intercepted, ensuring your data remains safe and users can work efficiently.
SEND ENCRYPTED DOCUMENTS FROM COMPUTERS TO SMARTPHONES
For businesses, protecting proprietary information and trade secrets is vital. Sending encrypted files from computers to mobile devices is crucial for an agile operation, security, and privacy. Users install the TeraMessage Mobile app on iPhone and Android devices to receive files that can only be decrypted if the user belongs to the encryption group and if TeraMessage can connect with the user’s credentials. TeraMessage helps ensure regulation compliance by protecting mobile data (HIPAA, NIST, GDPR). Decrypted files can only be viewed but not saved on the phone. An encrypted file sent to the phone running the TeraMessage app ensures that unauthorized parties cannot read it even if the data is intercepted. Decrypted files cannot be forwarded using email, WhatsApp, or any other messaging application.
EASY TO DEPLOY WITH OPERATION AND SECURITY SCALATION OPTIONS
​
OPTION 1
Subscribe to TeraCryption and obtain the number of seats and components for your annual license. Download and install the TeraKey application on your computer, program all the users or import them from Active Directory, and assign them to groups. The TeraCryption file encryption service will be ready to be used. There is nothing to install on the server. You don't need to buy encryption keys. The management of encryption keys is automatic. There is no limit to the files users can encrypt. The encryption log maintains information about who and when each file has been encrypted and decrypted.
​
OPTION 2
You want to create shared group folders to appear in authorized users’ and clients' Explorer to share encrypted files in seconds, regardless of their location. You will use TeraLink to connect TeraKey to your company’s Google Drive or OneDrive unique account for the exclusive use of TeraCryption, where the shared group of encrypted files will be stored.
​
OPTION 3
You want to store encrypted files on your server instead of in the cloud. To do this, you must create a TeraKey storage folder on the server and use TeraLink to connect over the network. Authorized users will find the server's shared group folders on their Explorer. Users can click on the name of the file to decrypt and open it without moving it to their computer.
​
OPTION 4
You want to implement Option 3 independent of the TeraCryption service cloud server. To do this, we must install the TeraCryption software server in your data center and comply with security and licensing terms and conditions. Please contact us for configuration details and prices.