Virtru Data Security Platform

A data security platform that protects sensitive data in a perimeter-less environment using the Trusted Data Format (TDF) standard.

Multi-Cloud Proprietary Self Hosted + Cloud Options
Category Data Security & Encryption
Last page update 19 days ago
Pricing Details Contact for pricing details.
Target Audience Organizations needing to protect sensitive data in various environments.

The Virtru Data Security Platform manages protecting sensitive data in a perimeter-less environment, where traditional network defenses are no longer sufficient. This platform is built on the open Trusted Data Format (TDF) standard, which enables robust data-centric security.

Technically, Virtru's architecture revolves around attribute-based access control (ABAC), allowing for granular policy enforcement at the intersection of data attributes and user identities. This is achieved through dynamic policy enforcement, normalization of attributes and metadata from external resources, and comprehensive visibility into data access and usage. The platform integrates with everyday applications such as Gmail, Outlook, Google Drive, and Zendesk, ensuring that security controls are invisible to users and do not disrupt workflows.

Operationally, the platform offers both self-managed and fully managed deployment options. The self-managed option provides maximum control over sensitive data, allowing hosting in fully air-gapped or VPC environments. The fully managed cloud option offers ease of use, scalability, and integration with common SaaS applications. Key operational considerations include the management of encryption keys, SIEM integration for auditing and compliance, and detailed audit telemetry for data access and sharing activities.

From a technical standpoint, Virtru employs AES-256 bit encryption to protect data both in transit and at rest, supporting strict compliance regulations like CMMC, ITAR, and CJIS. The platform also includes features such as Data Loss Prevention rules, Access Control Manager for granular policy enforcement, and a Secure Reader for safe viewing of protected content. These components ensure that sensitive data remains protected even after it has been shared with external parties.

Improve this page