Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

7/5/2016
05:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Virtru Sets a New Standard for Seamless Data Protection by Allowing Users to Search Full Text of Encrypted Content

With Industry's First Privacy-Preserving Encrypted Search, Users Can Now Search and Find Encrypted Content Without Weakening Data Protections or Exposing Content to Any Third Party

WASHINGTON, DC--(Marketwired - June 28, 2016) - Virtru, a trusted provider of encryption for email and files to thousands of organizations around the world, today announced the ability to search full body encrypted text without sacrificing data security or privacy. For the first time, users can search for content contained in the encrypted body of an email message or file, not just metadata found in the subject line, and do so while preserving privacy.

For enterprise users, searchable encryption is critical to e-discovery requirements, but has long been deemed technically too difficult or required decryption to take place on service providers' servers, exposing data to undue risk. Virtru's patent-pending split-knowledge search architecture separates content and search indices from encryption keys, ensuring that no third-party ever has access to unencrypted content or search terms.

"Searchability was a big barrier to encryption adoption by enterprises -- until now. Email users no longer have to sacrifice searchability when they choose to protect their content with strong encryption -- they can have both," said Will Ackerly, CTO and Co-Founder of Virtru. "Virtru's Encrypted Search avoids weaknesses that exist in other approaches like gateway-based tokenization, which fails to protect the data everywhere it travels. At Virtru, we believe encryption should be effortless, automatic, and built into the systems we use every day."

With Encrypted Search enabled, Virtru senders can search their inboxes and cloud storage services with no restrictions or limitations, and administrators can enable end users to encrypt or implement DLP-triggered encryption without losing the ability for e-discovery -- a critical compliance feature for highly regulated and audited industries.

Virtru enables administrators to configure rules that detect sensitive data in emails and files with controls to manage email and Google Drive encryption across the board. Controls can be set to examine subject lines, email and file content, attachments and other criteria to detect and call out sensitive information, including credit cards and social security numbers, and other keywords flagged by administrators. When Virtru detects these patterns, emails can be set to automatically encrypt, or to simply show a warning message to the end user indicating that he or she may want to encrypt.

For organizations using packaged e-discovery tools like Google Vault, Virtru Encrypted Search will be integrated directly into their existing user interface. Support for Google Vault will be available in August 2016.

Encrypted Search is just the latest in a series of new product features announced by Virtru to remove the complexities of traditional approaches to strong encryption, making it easy-to-use and therefore easy-to-adopt. Virtru for Google Drive allows users to easily and affordably share encrypted documents with Google Drive and non-Drive users. Virtru's support for hardware-backed encryption keys gives customers the ability to choose the physical location of their keys, and the Virtru SDK allows independent software vendors (ISVs) and cloud providers to easily embed Virtru's data-centric encryption into their products. To learn more about Virtru's Encryption-as-a-Service architecture, download the technical whitepaper here.

About Virtru
In an era where every data transfer is a potential data leak, Virtru makes it possible for everyone to protect their content by offering easy and affordable email and file encryption. From individuals to large enterprises, Virtru lets people control who receives, reviews, and retains their information -- wherever it travels, throughout its lifespan. Based on the open Trusted Data Format (TDF) created by Virtru Co-Founder Will Ackerly, the company's Encryption-as-a-Service (EaaS) architecture, integrates powerful data security directly into the applications we use every day. Learn more at www.virtru.com or follow @virtruprivacy on Twitter.

 

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
AramJ898
50%
50%
AramJ898,
User Rank: Apprentice
9/8/2016 | 9:39:00 AM
First Industrial Vendor of fully cloud-based encrypted search is Skycryptor
I think Skycryptor is the pioneer company providing encrypted search functionality over encrypted cloud data. You can check it at www.skycryptor.com
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: -when I told you that our cyber-defense was from another age
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-3350
PUBLISHED: 2019-11-19
masqmail 0.2.21 through 0.2.30 improperly calls seteuid() in src/log.c and src/masqmail.c that results in improper privilege dropping.
CVE-2011-3352
PUBLISHED: 2019-11-19
Zikula 1.3.0 build #3168 and probably prior has XSS flaw due to improper sanitization of the 'themename' parameter by setting default, modifying and deleting themes. A remote attacker with Zikula administrator privilege could use this flaw to execute arbitrary HTML or web script code in the context ...
CVE-2011-3349
PUBLISHED: 2019-11-19
lightdm before 0.9.6 writes in .dmrc and Xauthority files using root permissions while the files are in user controlled folders. A local user can overwrite root-owned files via a symlink, which can allow possible privilege escalation.
CVE-2019-10080
PUBLISHED: 2019-11-19
The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the versions of Java, Jersey, and Apache that the NiFI ...
CVE-2019-10083
PUBLISHED: 2019-11-19
When updating a Process Group via the API in NiFi versions 1.3.0 to 1.9.2, the response to the request includes all of its contents (at the top most level, not recursively). The response included details about processors and controller services which the user may not have had read access to.