TeraKey Client allows executives with TeraKey Enterprise to deliver encrypted files directly to their clients’ Windows Explorer: no email, fuzz, or hassle.
To exchange encrypted files with clients, they only need to install TeraKey Client on their computers and log in with their secure username and password. That’s all.
File delivery to Clients
To illustrate how it works, let's take the example of a lawyer dealing with critical clients. After each client installs TeraKey Client, folders named after each client appear in the lawyer's Explorer.
For example, the lawyer John Smith needs to deliver a sensitive file to his client Jim Brown. John drags and drops the file into the “Jim Brown” folder on his Explorer. The file is immediately encrypted and appears within seconds inside the “Jim Brown” folder on Jim’s Explorer. To view and edit it, Jim only has to double-click the file to open it. Clients can be anywhere in the world.
The Client edits the file and returns it to the executive.
After Jim edits and saves the file, it is automatically encrypted and updated in the “Jim Brown” folder in John’s Explorer. John can double-click to decrypt and open the edited version of the file.
Clients deliver new files to executives.
Clients can encrypt by simply drag-and-dropping a new file into their TeraKey shared folder in their Explorer. Files will appear in seconds in the corresponding client’s folder in the executive's Explorer.
This is the easiest and most secure way to exchange sensitive files with all your clients. TeraKey Client removes the risk of hijacking or stealing files at rest and in transit to clients. Note that the TeraKey files remain encrypted at both ends, and based on the Administrator’s permissions, only the sender and the recipient can open them.
No encryption keys to worry about
The benefit is that there is no encryption key management required. There are no distractions or interruptions to ongoing work tasks. Operation is transparent to clients and executives.
TeraKey Client will give you and your clients total confidence in exchanging sensitive documents.
Remember: Files travel protected by unbreakable encryption! Would you like to try it? Fill in the form in the “Contact Us” tab. Alternatively, click the “Book Demo” tab and choose a convenient date and time for a 30-minute demo.
If you are a current user of the TeraCryption platform, contact Support for an upgrade.
_____________________________________________________________________________________
Prepared by TeraCryption Corporation.
Copyrights reserved.
Comments