Enable Private, Compliant Defense Supply Chain Workflows
Aerospace and defense (A&D) firms create and store intellectual property, controlled unclassified information (CUI) regulated by the Cybersecurity Maturity Model Certification (CMMC), and technical data regulated by the International Traffic in Arms Regulation (ITAR) and Export Administration Regulation (EAR). In order to enable cloud-based defense supply chain collaboration workflows that drive innovation, sharing this data is a necessity, but it presents significant privacy and compliance risks.
To maintain a competitive advantage and meet compliance standards for defense contracts, A&D firms must protect data everywhere it’s shared. Virtru provides persistent protection and granular controls to keep IP private and technical data and CUI compliant. Virtru adheres to security controls defined in NIST Special Publications 800-53 and 800-171 to help organizations prepare for CMMC Level 3 Maturity while offering end-to-end encryption to support ITAR and EAR compliance in the cloud. Virtru’s easy end-to-end encryption and granular access controls help you:
- Protect CUI and technical data stored and shared via Gmail, Google Drive, and Outlook from access by unauthorized users.
- Share protected email and encrypted files internally and with external primes, subcontractors, agencies, and other mission partners.
- Support remote workers and distributed teams throughout defense supply chain collaboration workflows.
- Boost user adoption with easy-to-use protections, seamless recipient access, and a quick installation process that gets users up and running in minutes.
Unlock Private, Compliant Defense Supply Chain Workflows
Prevent non-US entities from accessing technical data with easy end-to-end encryption for ITAR and EAR compliance. Protect CUI from unauthorized access to meet CMMC requirements aligned with NIST SP 800-171 and DFARS 252.204-7012.
Enable seamless, secure sharing throughout contracting and supply chain collaboration workflows, while maintaining persistent control and visibility.
Innovation & Growth
Unlock new collaboration workflows between primes, subcontractors, and mission partners, powering innovation throughout the defense industrial base to drive growth.
Keep CUI and Technical Data Protected and Under Your Control, Everywhere It’s Shared
Easy End-to-End Encryption for CUI and Technical Data
Virtru protects CUI and technical data within email and files from unauthorized access throughout its lifecycle.
Seamless end-to-end email and file encryption streamlines your preparations for CMMC Level 3 Maturity.
Enable Seamless Supply Chain Collaboration
Provide end users and administrators easy-to-use protection, embedded in existing applications like Gmail, Google Drive, and Outlook. Complement user protections with DLP rules that automatically enforce CUI and technical data protections.
Enable seamless access for recipients and supply chain collaborators via the Secure Reader, without requiring new accounts or passwords, enabling innovation and growth.
Maintain Control and Persistent Visibility
Enable secure sharing between primes, subcontractors, and mission partners with attribute-based access controls (ABAC) for CUI and technical data that enable instant access revocation, expiration, disable forwarding, and document watermarking.
Audit who has accessed data, when, where, and for how long. Export event logs for analysis or integrate with your SIEM for advanced threat intelligence.
Automatically Enforce CUI and Technical Protections with Data Loss Prevention (DLP)
Configure DLP rules that scan emails and attachments to detect CUI and technical data, then automatically enforce encryption and access controls that persist throughout supply chain workflows.
Proven Platform to Enable Compliant Supply Chains
Trusted Data Format (TDF)
Open data protection standard for object-level encryption. Virtru solutions use the TDF to bind encrypted data to policies and metadata, ensuring only authorized users can access CUI or technical data.
Software Development Kit (SDK)
Embed protection and controls into the apps and systems that power your digital supply chain workflows to prevent unauthorized access.
Integrate with existing key management processes and Hardware Security Modules (HSMs). Host your own keys so that only your authorized users can access the keys protecting CUI and technical data.
More than 20,000 organizations trust Virtru for data security and privacy protection.
Get expert insights on how to address your data protection challenges.
The International Traffic in Arms Regulation (ITAR) regulates technical data used for the development and manufacture of defense articles and services. Previous rules prevented technical data from being stored and…Learn More