• Čeština
  • English
  • Čeština
  • English

Talkey aplication

We will secure your data and communication

The Talkey encryption app is used for secure data storage and encrypted communication.

With Talkey you can communicate without worry, whether you are an individual or a business, your important information and data is protected from unwanted views.

How does Talkey work?

Talkey is a unique encryption application that offers a solution for data security and secure electronic communication. By using Talkey, you can encrypt data on the disk as well as in online storage – in the cloud. It has advanced functions, the user decides how to handle his data also on other devices.

Talkey is available for both mobile devices (Android, iOS) and desktop platforms (Windows, macOS).

Main functions

Encrypted virtual drive

Automatically encrypts all input data. It can be created on your own device or in the cloud and shared with other Talkey users.

Secure shredder

Using this feature will permanently delete files and folders without the possibility of restoring them, even with special tools.

Encrypted emails

It is used for encrypted communication. Only the recipient who has a unique key to decrypt it can read the sent email including attachments.

Encrypting files and folders

Allows you to individually encrypt and decrypt files or entire folders directly on your computer. Suitable for data transfer using external drives.

Advanced features

sisable replies and forward encrypted email
destruction of the sent e-mail on the recipient’s side
setting the time period for decrypting e-mail
setting the number of times the email can be opened
automatic email destruction after x seconds

for higher security, keys can be stored on a token

Try Talkey
for 30 days for free

Try all the features and options. If you are satisfied with Talkey, you can buy it for 5 EUR monthly. This price allows you to use Talkey without restrictions and in the full version, including support and updates.

Solutions for companies and organisations

Talkey Server

Centrally managed applications
Solutions for companies that want to have a Talkey app under your own control. It also has a central user management, including connection to Active Directory.

Talkey Engine

Integration
Designed for integration into applications and third-party information systems. Allows automated steps to be included to to extend the basic version according to your needs.

Technology used

End-to-end encryption

communication does not run through the provider’s servers

Resilience against attacks on infrastructure

the system has no “Master Key”

Double encryption

symmetrical and asymmetrical algorithms

Multi-factor protection of decryption keys

saving the key to the computer, mobile, token

The implemented algorithms are consistent with the Czech National Cyber and Information Security Agency (NÚKIB) recommendations
Talkey is verifed by National Security Authority (NBÚ).

Why encrypt data?

Protection
of commercial interests

Compliance
with legislation

Preventing
data extraction

Privacy
and security

Reputation
protection

Preventing
identity theft

Use Talkey aplication effectively

Video tutorials

Manuals

FAQ