Virtru Secure Share Features
Encryption (5)
Email Encryption
Encrypts the content of emails and their attachments.
Messaging Encryption
Encrypts messages being sent via text or within an application.
File Transfer Encryption
Protects data with within or as it leaves your secure or local network.
Data Encryption
Provide a level of encryption of data in transit, protecting sensitive data while it lives in the backup application.
Document Encryption
Provides a level of encryption for text documents.
Compliance (3)
Authentication
Allows administrators to set multi-factor authentication requirements including tokens, keys, or sms messaging
Access Management
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
DLP Configuration
Offers data loss prevention tools to protect data from leaving the environments it is allowed to.
Management (3)
Backup
Stores data remotely, on-premise, or in cloud databases in case of recovery during disaster.
Recovery
Decrypts datasets or files or allows users access to a backup database for reintegration.
File Management
Allows administrators to set levels of encryption for file types. Allows administrators to decide which files to encrypt.
Platform (7)
User Authorization - HIPAA Compliant Messaging
Allows administrators to set up and implement any levels of authorization required to send and receive secure messages
Compliant Emailing - HIPAA Compliant Messaging
Facilitates the receiving and sending of secure and encrypted emails
Clinical Communication - HIPAA Compliance
Facilitates communication between health care professionals
HIPAA Compliance - HIPAA Compliant Messaging
Aligns and complies with HIPAA regulation and standards
Operating Systems - HIPAA Compliant Messaging
Supports desktop, iOS, and Android operating systems
Message Lifespan - HIPAA Compliant Messaging
Allows the determination and assignment of the lifespan of a delivered message
Workflow Enhancement - HIPAA Compliant Messaging
Enhances clinical workflows
Administration (6)
Auditing
Documents access and alterations of the database for analytics and reporting.
Data Discovery
Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems.
Access Control
Supports LDAP Protocol to enable access control and governance.
Reporting and Monitoring
Access pre-built and custom reports to monitor user activity and storage.
Breadth of Partner Applications
To what extent are there partner applications readily available for integrating into this product? Partner applications typically provide complementary, best of breed functionality not offered natively in this product.
Auditing
Documents access and alterations of the database for analytics and reporting.
Data Protection (11)
Data Masking
Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.
Data Encryption/Security
Manages policies for user data access and data encryption.
Data loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Sensitive Data Compliance
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Sensitive Data Discovery
Includes funcationality to automatically discover and classify sensitive and other defined data.
Structured and Unstructured Data
Can protect both structured and unstructured data using automated discovery tools.
Encryption
Includes encryption methods to protect data.
Persistent Protection
Protects data at rest, in transit, and in use.
Data Governance and Access Management
Provides policies and access controls to ensure the data is only handled by permisssioned users and processes.
Audit and Reporting
Includes audit and reporting functions to know exactly what actions have been taken on data, such as who has accessed it and when.
Analysis (3)
Cloud Gap Analytics
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse.
User Analytics
Allows for reporting and documentation of individual user behavior and privileges.
Usability (1)
Cross-Platforms
Allows data to move across multiple platform types and remain protected.
Security (4)
Encrypted Storage
Provides some level of encryption of files and data in transit and sensitive information while it lives online.
Anomoly Detection
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data loss Prevention
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Policy Enforcement
Allows administrators to set policies for security and data governance.
Access Control (4)
User, Role, and Access Management
Allows administrators to provision access based on the individual user and their role.
Access Rights
Defines which users have access to the different modules of the software and how.
User Analytics
Allows for reporting and documentation of individual user behavior and privileges.
Compliance Monitoring
Monitors data quality and send alerts based on violations or misuse.

