Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:17 PM
Dark Reading
Dark Reading
Products and Releases

New Encrypted Email And Privacy Service for Consumers: Recall Messages, Restrict Forwarding, Set Expiration

Virtru secures private communications for popular email services and clients, including Gmail, Yahoo, Outlook, and Mac Mail

WASHINGTON, D.C. -- Jan. 21, 2014 -- Virtru, a company dedicated to making it simple to keep private communications private, today announced the availability of the Virtru encrypted email and privacy service, the first solution to make sophisticated encryption and digital privacy technologies easy-to-use and available to everyone. Virtru allows anyone to secure their private communications by using popular email services and clients they are already familiar with including Gmail, Yahoo, Outlook and Mac Mail -- seamlessly securing email across desktops, phones and tablets.

Until now, individuals have had no control over messages sent to others via email. When a user sends a sensitive email there's no mechanism to prevent unwanted forwards or unintended recipients seeing something they shouldn't on an email chain. Virtru combines rock-solid encryption with privacy features that give individuals back control of their private communications and data. With Virtru, the sender can revoke an email at any time, rendering the message immediately unreadable. The sender can also restrict whether recipients are allowed to forward the message and give particularly sensitive emails an expiration date. Every message sent with Virtru is encrypted while in transit and stored in a format that prevents third-parties from spying on a sender's private messages.

Virtru was founded on the belief that people have a fundamental right to privacy and that exercising this right should be easy and available to everyone. Virtru makes this possible by building on the Trusted Data Format (TDF), an open-source technology invented by company co-founder Will Ackerly, a former cloud security architect at the National Security Agency (NSA). Virtru's data-centric approach encloses an email message or any attachment in its own secure envelope that can only be opened by its intended recipient. Virtru complements the TDF technology with patented encryption-key management that makes it possible to control the fate of an email and its attachments even after it has left the sender's outbox. Virtru never has access to the email content, but rather manages access to the key required to read the content.

See video overview here: http://www.youtube.com/watch?v=sErf3VCeaHE

"Highly trained engineers and security experts have been encrypting email for years," said Will Ackerly, Co-Founder and CTO of Virtru. "Virtru thinks everyone deserves real privacy and control over their data, even after hitting the send button. This means masking the complexity of encryption and making it dead simple for the everyday user. With Virtru, users gain confidence knowing that only intended recipients have access to messages and that their information is protected from third-parties like advertisers, governments, criminals and Internet Service Providers."

Email users are frustrated by the inability to recall an email sent in error or control who sees an email once it has been forwarded. The control, convenience and simplicity of the Virtru solution is a revolutionary approach to consumer privacy, data encryption and security that will forever change how people interact with their digital content.

Consumer awareness of data protection and digital privacy is at an all-time high. The results of new research from Harris Interactive, also announced today, found that more than 70% of Americans online are concerned about the privacy of their email communication, and an even higher percentage have not yet taken steps to secure their email because they don't know how. Americans worry about being targeted by advertisers based on the content of their private emails (83 percent), as well as messages being read by unintended recipients (75 percent). Virtru has responded, providing digital privacy and security without hassle. 77% of those polled said they would find the privacy control features offered by Virtru useful.

"Most email users have nothing to hide, but everything to protect," said John Ackerly, Co-Founder and CEO of Virtru. "Until now, true email privacy protection has not been available to the average user because it required considerable expertise on the part of both sender and receiver. Virtru has changed all that. We are excited to release our innovation into the marketplace, to empower individuals to protect their digital communications on their own terms, and to share with confidence."

The Washington D.C.-based startup has raised $4 million in angel funding to bring its Virtru email privacy solution to market. In coming months, Virtru will extend its product suite beyond email to allow users to control their texts, posts, Tweets, and other digital communications. Additionally, Virtru will be introducing solutions aimed at small businesses and enterprises later this year.

About Virtru

Virtru is the first company to make email privacy accessible to everyone. With a single plug-in, Virtru empowers individuals and business to control who receives, reviews and retains their digital information -- wherever it travels, throughout its lifespan. The company has set a new standard for digital privacy based on the Trusted Data Format (TDF), created by Virtru Co-founder Will Ackerly and used by the intelligence community to secure some of the nation's most sensitive data. Virtru requires no special skills or knowledge, supports all popular email and file types, and can be used on a PC, Mac or mobile device. To learn more about the company, go to http://www.virtru.com/and follow Virtru on Twitter @virtruprivacy.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-14
STMicroelectronics ST33TPHF2ESPI TPM devices before 2019-09-12 allow attackers to extract the ECDSA private key via a side-channel timing attack because ECDSA scalar multiplication is mishandled, aka TPM-FAIL.
PUBLISHED: 2019-11-14
SnowHaze before 2.6.6 is sometimes too late to honor a per-site JavaScript blocking setting, which leads to unintended JavaScript execution via a chain of webpage redirections targeted to the user's browser configuration.
PUBLISHED: 2019-11-14
In klibc 1.5.20 and 1.5.21, the DHCP options written by ipconfig to /tmp/net-$DEVICE.conf are not properly escaped. This may allow a remote attacker to send a specially crafted DHCP reply which could execute arbitrary code with the privileges of any process which sources DHCP options.
PUBLISHED: 2019-11-14
The SQLDriverConnect() function in unixODBC before 2.2.14p2 have a possible buffer overflow condition when specifying a large value for SAVEFILE parameter in the connection string.
PUBLISHED: 2019-11-14
A memory leak in rsyslog before 5.7.6 was found in the way deamon processed log messages are logged when $RepeatedMsgReduction was enabled. A local attacker could use this flaw to cause a denial of the rsyslogd daemon service by crashing the service via a sequence of repeated log messages sent withi...