Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

7/5/2016
05:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Virtru Sets a New Standard for Seamless Data Protection by Allowing Users to Search Full Text of Encrypted Content

With Industry's First Privacy-Preserving Encrypted Search, Users Can Now Search and Find Encrypted Content Without Weakening Data Protections or Exposing Content to Any Third Party

WASHINGTON, DC--(Marketwired - June 28, 2016) - Virtru, a trusted provider of encryption for email and files to thousands of organizations around the world, today announced the ability to search full body encrypted text without sacrificing data security or privacy. For the first time, users can search for content contained in the encrypted body of an email message or file, not just metadata found in the subject line, and do so while preserving privacy.

For enterprise users, searchable encryption is critical to e-discovery requirements, but has long been deemed technically too difficult or required decryption to take place on service providers' servers, exposing data to undue risk. Virtru's patent-pending split-knowledge search architecture separates content and search indices from encryption keys, ensuring that no third-party ever has access to unencrypted content or search terms.

"Searchability was a big barrier to encryption adoption by enterprises -- until now. Email users no longer have to sacrifice searchability when they choose to protect their content with strong encryption -- they can have both," said Will Ackerly, CTO and Co-Founder of Virtru. "Virtru's Encrypted Search avoids weaknesses that exist in other approaches like gateway-based tokenization, which fails to protect the data everywhere it travels. At Virtru, we believe encryption should be effortless, automatic, and built into the systems we use every day."

With Encrypted Search enabled, Virtru senders can search their inboxes and cloud storage services with no restrictions or limitations, and administrators can enable end users to encrypt or implement DLP-triggered encryption without losing the ability for e-discovery -- a critical compliance feature for highly regulated and audited industries.

Virtru enables administrators to configure rules that detect sensitive data in emails and files with controls to manage email and Google Drive encryption across the board. Controls can be set to examine subject lines, email and file content, attachments and other criteria to detect and call out sensitive information, including credit cards and social security numbers, and other keywords flagged by administrators. When Virtru detects these patterns, emails can be set to automatically encrypt, or to simply show a warning message to the end user indicating that he or she may want to encrypt.

For organizations using packaged e-discovery tools like Google Vault, Virtru Encrypted Search will be integrated directly into their existing user interface. Support for Google Vault will be available in August 2016.

Encrypted Search is just the latest in a series of new product features announced by Virtru to remove the complexities of traditional approaches to strong encryption, making it easy-to-use and therefore easy-to-adopt. Virtru for Google Drive allows users to easily and affordably share encrypted documents with Google Drive and non-Drive users. Virtru's support for hardware-backed encryption keys gives customers the ability to choose the physical location of their keys, and the Virtru SDK allows independent software vendors (ISVs) and cloud providers to easily embed Virtru's data-centric encryption into their products. To learn more about Virtru's Encryption-as-a-Service architecture, download the technical whitepaper here.

About Virtru
In an era where every data transfer is a potential data leak, Virtru makes it possible for everyone to protect their content by offering easy and affordable email and file encryption. From individuals to large enterprises, Virtru lets people control who receives, reviews, and retains their information -- wherever it travels, throughout its lifespan. Based on the open Trusted Data Format (TDF) created by Virtru Co-Founder Will Ackerly, the company's Encryption-as-a-Service (EaaS) architecture, integrates powerful data security directly into the applications we use every day. Learn more at www.virtru.com or follow @virtruprivacy on Twitter.

 

 

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
AramJ898
50%
50%
AramJ898,
User Rank: Apprentice
9/8/2016 | 9:39:00 AM
First Industrial Vendor of fully cloud-based encrypted search is Skycryptor
I think Skycryptor is the pioneer company providing encrypted search functionality over encrypted cloud data. You can check it at www.skycryptor.com
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18575
PUBLISHED: 2019-12-06
Dell Command Configure versions prior to 4.2.1 contain an uncontrolled search path vulnerability. A locally authenticated malicious user could exploit this vulnerability by creating a symlink to a target file, allowing the attacker to overwrite or corrupt a specified file on the system.
CVE-2019-11293
PUBLISHED: 2019-12-06
Cloud Foundry UAA Release, versions prior to v74.10.0, when set to logging level DEBUG, logs client_secret credentials when sent as a query parameter. A remote authenticated malicious user could gain access to user credentials via the uaa.log file if authentication is provided via query parameters.
CVE-2019-16771
PUBLISHED: 2019-12-06
Versions of Armeria 0.85.0 through and including 0.96.0 are vulnerable to HTTP response splitting, which allows remote attackers to inject arbitrary HTTP headers via CRLF sequences when unsanitized data is used to populate the headers of an HTTP response. This vulnerability has been patched in 0.97....
CVE-2019-1551
PUBLISHED: 2019-12-06
There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with 512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform and are n...
CVE-2019-16671
PUBLISHED: 2019-12-06
An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Remote authenticated users can crash a device with a special packet because of Uncontrolled Resource Consumption.