TeraKey first encrypts files and then uploads them to the cloud or stores them on the local server.
TeraCryption protects the exchange, storage, and sharing of sensitive documents in your business.
Encrypted Files Management
System for Business.
TeraKey encrypts files in seconds and automatically uploads them to your Cloud account or stores them in shared folders on your local server.
TeraKey encrypts files in seconds.
The administrator can control file decryption with a simple mouse click. Automated key management and the use of our bidirectional communications patent provide encryption and decryption operations in seconds. Unauthorized personnel, hackers, and internal thieves cannot access the content of encrypted files. Protect files in the cloud with unbreakable Terakey encryption.
Full integration with Explorer
There are no complicated learning steps. When first installed, TeraKey, the encrypted file system, automatically integrates with Explorer. After logging in to TeraKey, you can use Explorer to drag, drop, move, copy, and delete regular and encrypted files. Shared group folders, where the user is assigned, automatically appear as regular folders in Explorer. Use Explorer for encrypted file management and to restore ransom files safely stored in the cloud.
TeraKey stores encrypted files in your exclusive Cloud account
As a powerful TeraCryption encrypted file service option, you can connect TeraKey to automatically download and upload encrypted files to your exclusive Google Drive or OneDrive account. This account only stores and shares TeraKey files under rigid and secure file control decryption. For total security, users do not need to access this cloud account; it is only for TeraKey. Placing encrypted files in Google Drive or OneDrive protects sensitive files with double encryption and stops hackers and thieves from destroying them.
No encryption key management needed
Encrypted file management automatically destroys the encryption keys without leaving any trace after TeraKey encrypts and verifies a file. Because the keys no longer exist, no one can decrypt a file without the keys. TeraKey uses different keys every time a file is encrypted—the keys are never the same. The encryption keys are not placed inside the file. The TeraCryption encrypted file system uses patented control file decryption to recreate the keys when a document requires decryption. Decryption and encryption happen in a few seconds. Ask for a demo, and you will be impressed.
Control storage and sharing of TeraKey files
The administrator can control file decryption and who can encrypt to protect sensitive files. Using encrypted file management, the administrator can create as many groups as needed to control who can encrypt and decrypt to protect sensitive files organized by your security level or content. Files are encrypted to groups to control these permissions. The administrator assigns users to groups as a control file decryption. One user can be in more than one group. In the same way, the administrator can assign a client to a group that will only contain encrypted files related to that client. A few or hundreds of users can be assigned to groups to control file decryption.
Mass encryption of folders and files
The TeraCryption file management system allows authorized users to perform mass encryption. Think of a folder containing a tree of subfolders with random ramifications. For example, January has subfolders arranged by projects and dates; February has a similar structure. Therefore, the organization tree can have different levels of subfolders with many files. The administrator can use mass encryption by selecting the main folder and point where the new folder with encrypted files will be stored. Encryption will be performed much faster, and the organization tree will be preserved.
TeraMail and TeraMessage Mobile for safe communications
​The TeraCryption encrypted file system provides TeraMail, a secure web browser application used to communicate messages and files to authorized users. The web application is protected by encryption at the same or better level as that used for mobile banking. The TeraKey administrator uses TeraMail as a console to program users, create groups, and restore ransom files if a cloud service or a local server is used. The administrator can also assign mobile users to groups to enable them to decrypt TeraKey encrypted files when running the TeraMessage Mobile on their smartphone.
The TeraCryption System Integrates With Your Business Ecosystem
TYPES OF BUSINESSES USING TERACRYPTION
Because of a seamless document encryption integration with Explorer, TeraKey can be used by many businesses, such as Law and Financial firms, Chemical labs, Research and Development operations, Factories of competitive and innovative products, and Human Resource firms to protect the privacy of people; and many more type of businesses.
TeraMail, TeraMessage Mobile, and TeraKey will integrate to your way of operations no matter what mobile devices are used, the file system you have, and what your business ecosystem is.