Virtru Email Encryption Features
Encryption (4)
Email Encryption
Encrypts the content of emails and their attachments.
File Transfer Encryption
Protects data with within or as it leaves your secure or local network.
Data Encryption
Provide a level of encryption of data in transit, protecting sensitive data while it lives in the backup application.
Document Encryption
Provides a level of encryption for text documents.
Compliance (3)
Authentication
Allows administrators to set multi-factor authentication requirements including tokens, keys, or sms messaging
Access Management
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
DLP Configuration
Offers data loss prevention tools to protect data from leaving the environments it is allowed to.
Management (3)
Backup
Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster.
Recovery
Decrypts datasets or files or allows users access to a backup database for reintegration.
File Management
Allows administrators to set levels of encryption for file types. Allows administrators to decide which files to encrypt.
Platform (7)
User Authorization - HIPAA Compliant Messaging
Allows administrators to set up and implement any levels of authorization required to send and receive secure messages
Compliant Emailing - HIPAA Compliant Messaging
Facilitates the receiving and sending of secure and encrypted emails
Clinical Communication - HIPAA Compliance
Facilitates communication between health care professionals
HIPAA Compliance - HIPAA Compliant Messaging
Aligns and complies with HIPAA regulation and standards
Operating Systems - HIPAA Compliant Messaging
Supports desktop, iOS, and Android operating systems
Message Lifespan - HIPAA Compliant Messaging
Allows the determination and assignment of the lifespan of a delivered message
Workflow Enhancement - HIPAA Compliant Messaging
Enhances clinical workflows
Administration (12)
Auditing
Documents access and alterations of the database for analytics and reporting.
Data Discovery
Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems.
Access Control
Supports LDAP Protocol to enable access control and governance.
Auditing
Documents access and alterations of the database for analytics and reporting.
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Management Console
Provides Administration tools/console that are easy to use and learn for routine maintenance tasks.
Reporting and Monitoring
Access pre-built and custom reports to monitor user activity and storage.
Breadth of Partner Applications
To what extent are there partner applications readily available for integrating into this product? Partner applications typically provide complementary, best of breed functionality not offered natively in this product.
Auditing
Documents access and alterations of the database for analytics and reporting.
Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Email Clients
Supports secure implementation with popular email applications and clients.
Role-Based Rules
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
Data Protection (11)
Data Masking
Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.
Data Encryption/Security
Manages policies for user data access and data encryption.
Data loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Sensitive Data Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Sensitive Data Discovery
Includes funcationality to automatically discover and classify sensitive and other defined data.
Structured and Unstructured Data
Can protect both structured and unstructured data using automated discovery tools.
Encryption
Includes encryption methods to protect data.
Persistent Protection
Protects data at rest, in transit, and in use.
Data Governance and Access Management
Provides policies and access controls to ensure the data is only handled by permisssioned users and processes.
Audit and Reporting
Includes audit and reporting functions to know exactly what actions have been taken on data, such as who has accessed it and when.
Analysis (3)
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse.
User Analytics
Allows for reporting and documentation of individual user behavior and privileges.
Usability (1)
Cross-Platforms
Allows data to move across multiple platform types and remain protected.
Availability (2)
Regional Support
Supports key distribution across multi-regions to increase availability.
Scalability
Expands functionality while maintaining balanced loads. Serves growing demand without reducing functionality.
Security (4)
Encrypted Storage
Provides some level of encryption of files and data in transit and sensitive information while it lives online.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Policy Enforcement
Allows administrators to set policies for security and data governance.
Access Control (4)
User, Role, and Access Management
Allows administrators to provision access based on the individual user and their role.
Access Rights
Defines which users have access to the different modules of the software and how.
User Analytics
Allows for reporting and documentation of individual user behavior and privileges.
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse.
Detection (1)
Activity Monitoring
Monitors user email activity, documents behaviors for baselining and anomaly detection.
Protection (2)
Targeted Attack Prevention
Analyzes historical email data, identifies at-risk individuals, then detects and blocks targeted spam emails.
Policy Enforcement
Allows administrators to set policies for security and governance.
Functionality (7)
Anti-Spam
Prevents unwanted emails including bulk, mass, or other junk emails from reaching recipients mailboxes.
Anti-Phishing
prevent social-engineering attacks such as phishing, spear-phishing, and c-level executive impersonation attacks.
Filtering Functionality
Provides filters such as: approved senders, whitelists, greylists such as bulk emails that may not be malicious, blocked senders, blacklists, IP reputation, content (such as profanity, credit card numbers, password protected files, and other sensitive information), virus detection, re-directs and malicious URLs, newsletter detection, attachment size, and invalid recipients.
Outbound Email Monitoring
Monitors outgoing mail to prevent data loss by encrypting messages or preventing the messages from being sent.
Archiving
Offers archival email retention for compliance purposes.
Reporting
Offers standard reporting functionality.
On-prem deployment
Supports on-premises deployments of secure email gateways, which requires a company to maintain their own hardware. This is different than Cloud Email Security software which protects cloud-based email environments and do not require on-premises hardware installations.
Encryption Techniques - Email Encryption (3)
Encryption Algorithms
Supports various encryption algorithms including AES (Advanced Encryption Standard), RSA (Rivest-Shamir-Adleman), Twofish, and Pretty Good Privacy (PGP).
Transport Encryption
Encrypts the email during transit between email servers, preventing interception by third parties.
End-to-End Encryption
Encrypts the message on the sender's device and decrypts it only on the recipient's device, ensuring that only the sender and recipient can read it.
Authentication, Verification, and Access Controls - Email Encryption (4)
Revocation Mechanisms
Allows users to revoke access to encrypted emails or keys in case of compromise.
Access Controls
Enables users to set permissions on who can access, read, or modify their encrypted emails.
Digital Signatures
Allows senders to sign their emails cryptographically, providing proof of authenticity and integrity.
Certificate Authorities
Verifies the identities of individuals or organizations through trusted third-party certificate authorities.
Security Enhancements and Auditing - Email Encryption (4)
Malware Scanning
Integrates with antivirus solutions to scan email attachments for malicious content.
Reporting
Generates reports on encryption usage, compliance status, and security incidents.
Audit Trails
Logs and tracks encryption-related activities for compliance, troubleshooting, and security analysis.
Data Loss Prevention (DLP)
Offers DLP features to prevent accidental or unauthorized transmission of sensitive information.
Integration, Compatibility, and Usability - Email Encryption (4)
User-Friendly Interfaces
Offers intuitive interfaces for sending, receiving, and managing encrypted emails.
APIs and SDKs
Offers application programming interface (APIs) and software development kits (SDKs) for integrating encryption features into custom applications or workflows.
Email Client Integration
Integrates seamlessly with popular email clients, including Gmail, Microsoft Outlook, and Thunderbird.
Automation
Automatically performs encryption and decryption processes to minimize user effort and errors.
Agentic AI - Secure Email Gateway (1)
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Agentic AI - Intelligent Email Protection (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Adaptive Learning
Improves performance based on feedback and experience





