top of page
  • Is TeraCryption a system for business?
    Yes, TeraCryption is designed to meet the file security needs of businesses of all sizes. Our platform offers a range of advanced file security features that can be tailored to your organization. From file encryption and secure document sharing to access control and user authentication, TeraCryption has everything you need to keep your sensitive files safe and use secure and private text and file communications.
  • How does TeraKey protect files?
    The TeraKey application installed on the user's computer encrypts documents using unlimited random keys. The same keys are never used again; they appear only when an authorized user needs to decrypt a file. The user manages files and folders using Explorer functionality. File encryption takes just a few seconds. Key management is completely automatic without the user's intervention.
  • How do I control who can decrypt files?
    The TeraKey file security system allows you to control who can decrypt files by assigning access permissions to individual users or groups. You can assign any number of users to a group, permitting them to open encrypted files stored in that group folder. To stop a user from opening files in the Group, you can remove the user from the Group using a drag-and-drop action on a web page map available only to administrators and supervisors.
  • Can TeraKey encrypt any type of files?
    Yes, TeraKey can encrypt any type of files. From documents to photos and videos, TeraKey's advanced encryption technology ensures that your files are protected from unauthorized access. TeraKey also supports many file formats, including PDFs, Word documents, and Excel spreadsheets. Additionally, TeraKey's use of Explorer makes it easy to encrypt and decrypt files, even for those with little to no technical expertise. So, whether you want to protect files such as audio recordings, pictures, or sensitive business files, TeraKey has you covered.
  • Where can I store the TeraKey encrypted files?
    TeraKey can manage storing and sharing encrypted files in a cloud service or on your local server storage disks. TeraKey can connect to an exclusive MS OneDrive or Google Drive account, which users do not need to access directly to share files. This capability protects your encrypted files, ensuring unauthorized individuals cannot access them. TeraKey, acting as a robotic user, will automatically create Group folders and upload files after they are encrypted in the user’s computer.
  • Can I share encrypted files without worring about sending the encryption keys?
    Yes, you can share encrypted files with other users in your groups regardless of their location and without having to worry about sending encryption keys separately. TeraKey automatically gives recipients permission to have their TeraKey application decrypt the shared group files appearing in the sender and recipient Explorer. This feature allows for secure communication and sharing of sensitive information without the complexity of managing encryption keys not needed in TeraKey.
  • Do I have to buy encryption keys, and how much do I have to pay?
    No, you do not have to buy encryption keys. Your TeraCryption subscription provides unlimited encryption key generation and automatic key management as a part of its service operation, which is transparent to users. The price for your annual subscription varies depending on the quantity and type of component seats, such as TeraKey Enterprise, TeraKey Client, TeraMessage Mobile, etc., selected for your business's specific needs and requirements.
  • Are my sensitive documents uploaded to TeraCryption to be encrypted?
    No, TeraKey encrypts files in the user’s computer. Files are not uploaded to our service to be encrypted. Our encryption technology ensures that your documents never leave your business computers to be encrypted. Your files remain confidential and protected from unauthorized access at all times. We understand the importance of file security and take precautions to ensure your information is safe. Rest assured that your sensitive files encrypted by TeraKey are always in your hands, no matter where you store them.
  • Who can add users to have access to the TeraKey system
    Only the designated administrator can add, disable, and delete users and grant or deny them access to encrypted files. The administrator has complete control over each user's encryption and decryption permissions. To maintain the system's security and integrity, only authorized personnel are given access to TeraKey. If you have any questions or concerns about user access, please contact TeraCryption's support team for assistance.
  • What do I have to install in our server?
    To use TeraKey, you do not need to install any TeraKey software on your server and risk affecting your existing cybersecurity defense system, whatever it might be. You also do not need to install encryption keys or encryption key management software.
  • Is TeraKey encryption unbreakable?
    TeraKey is designed to provide the highest level of file security ever. Any encrypted file cannot be decrypted without using the original keys. TeraKey destroys the encryption keys after verification and does not p within the file content. Therefore, you can use TeraKey to encrypt a file and upload it to any cloud storage service without worries. No computer could decipher the document-encrypted data because there are no encryption keys. Furthermore, TeraKey includes multiple layers of authentication (2FA) and access control to prevent unauthorized access. A file can only be decrypted by a TeraKey user under your TeraCryption company's secret license and only if you, as the administrator, grant permission. Rest assured that your files will be protected with TeraKey's advanced security measures.
  • Can we try TeraKey before we subscribe?
    Yes. You can sign up for a 7-day trial to test the features and capabilities of the TeraKey file encryption management system. During the trial, you can access all the TeraKey functionality. If you subscribe to the TeraCryption service after the trial, we can seamlessly upgrade your account to a paid subscription. We encourage you to take advantage of our free trial offer if the price is right and experience TeraKey's benefits firsthand.
  • How can I start the trial?
    Go to "Contact Us" and fill out the form. After approval, you will receive a link with TeraKey installation instructions for your 7-day trial with three TeraKey and TeraMessage Mobile seats.
  • What level of support will we receive?
    At TeraCryption, we are committed to providing our customers with the highest level of support possible. Our team of experienced personnel is available to help you with any issues or questions you may have. We offer phone, email, and live chat support, and our response times are among the fastest in the industry. In addition, we provide regular software updates and maintenance to ensure that your TeraKey security system is always up-to-date and functioning at its best. With the TeraCryption platform, you can rest assured that you will receive top-notch support and service.
  • How much is the TeraCryption service?
    TeraCryption offers customized security solutions based on your specific needs and requirements. As a result, the cost of our services varies depending on the quantity and type of component seats and the nature of your project. You can have from just a few to thousands of users in your TeraCryption system. We offer competitive pricing and flexible payment options to ensure our services are accessible to businesses of all sizes. Contact us today to discuss your security needs and receive a quote. Please go to "Contact Us" and fill out the form. Enter the expected number of users and briefly describe what you need. You can also email us at or call our toll-free line at 1-800-387-4237. We will respond as soon as possible.
  • We would like to receive your feedback.
    Please provide us with a description of your requirements. What are your main concerns in using TeraKey to protect your sensitive files? Please send us your thoughts to Your response will be confidential. You can count on that!


bottom of page
google-site-verification: google43d31fc921668958.html ..... ..... .....
..... ..... .....
...... ......