Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:30 PM
Dark Reading
Dark Reading
Products and Releases

Virtru Launches Hardware-Backed Encryption Key Management Service

Gives Users Ultimate Control Over Content and Keys

WASHINGTON, D.C. – Jan. 13, 2016 – Virtru, which provides encryption for email and files to thousands of businesses around the world, today announced the general availability of its patent-pending Hardware-Backed Encryption Key Management (HEKM) service. The new service adds the strongest level of protection with customer keys stored on Hardware Security Modules (HSMs). Virtru customers now have exclusive control of keys that protect security-critical data using HSM-backed encryption keys without hindering the ease-of-use or performance of cloud-based collaboration tools.

The Virtru Pro offering has provided enterprise customers with managed encryption keys and control features such as revoke, expiration, and forwarding control. With the addition of Virtru HEKM, customers have an additional layer of encryption keys that they can directly control. The Virtru HEKM can be set up in minutes and integrates easily with the applications customers use every day including Microsoft Outlook, Gmail, and Google Drive. Virtru adds hardware-backed encryption keys transparently with no disruption to content creation or sharing.

Virtru HEKM provides enterprise users with total control over their content and where their encryption keys are stored. Customers that service highly regulated industries or who must comply with strict consumer privacy laws by country or region can store keys in the US, Ireland, Germany, Singapore and Japan.

“Virtru is dedicated to privacy and control without sacrificing convenience. The Virtru HEKM builds on this tradition, giving security-minded organizations a trusted solution to protect their most sensitive data in the cloud,” said Will Ackerly, CTO and Co-Founder of Virtru. “This level of security and control has traditionally been reserved for the largest enterprises in the world.  Now any business can control and manage their own encryption keys.”

Virtru may be used to protect any type of content shared via email or through cloud storage services like Google Drive.  The Virtru software development kit (SDK) offers integration with any third-party platform, as well as existing integrations into Microsoft and Google environments.

About Virtru

In an era where every data transfer is a potential data leak, Virtru makes it easy and affordable for everyone to protect their content.  From individuals to large enterprises, Virtru lets people control who receives, reviews, and retains their information – wherever it travels, throughout its lifespan.  Based on the open Trusted Data Format (TDF) created by Virtru Co-Founder Will Ackerly, the company’s Encryption-as-a-Service (EaaS) architecture, integrates powerful data security directly into the applications we use every day.  Learn more at www.virtru.com or follow @virtruprivacy on Twitter.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I like the old version of Google assistant much better.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver Vault Plugin prior to v0.0.6, Azure Plugin prior to v0.0.10, and GCP Plugin prior to v0.2.0 allow an attacker who can create specially-crafted SecretProviderClass objects to write to arbitrary file paths on the host filesystem, including /var/lib/kubelet/pods.
PUBLISHED: 2021-01-21
Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a SecretProviderClassPodStatus/Status resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under var/lib/kubelet/pods that conta...
PUBLISHED: 2021-01-21
Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when: - The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass. - The snapshot-controller crashes, ...
PUBLISHED: 2021-01-21
Kubernetes Java client libraries in version 10.0.0 and versions prior to 9.0.1 allow writes to paths outside of the current directory when copying multiple files from a remote pod which sends a maliciously crafted archive. This can potentially overwrite any files on the system of the process executi...
PUBLISHED: 2021-01-21
Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typicall...