Documents containing CUI and/or technical data stay protected wherever they’re shared throughout the defense supply chain with the Virtru Secure Reader.
Aerospace and defense (A&D) firms create and store intellectual property, controlled unclassified information (CUI) regulated by the Cybersecurity Maturity Model Certification (CMMC), and technical data regulated by the International Traffic in Arms Regulation (ITAR) and Export Administration Regulation (EAR). In order to enable cloud-based defense supply chain collaboration workflows that drive innovation, sharing this data is a necessity, but it presents significant privacy and compliance risks.
To maintain a competitive advantage and meet compliance standards for defense contracts, A&D firms must protect data everywhere it’s shared. Virtru provides persistent protection and granular controls to keep IP private and technical data and CUI compliant. Virtru adheres to security controls defined in NIST Special Publications 800-53 and 800-171 to help organizations prepare for CMMC Level 3 Maturity while offering end-to-end encryption to support ITAR and EAR compliance in the cloud. Virtru’s easy end-to-end encryption and granular access controls help you:
Prevent non-US entities from accessing technical data with easy end-to-end encryption for ITAR and EAR compliance. Protect CUI from unauthorized access to meet CMMC requirements aligned with NIST SP 800-171 and DFARS 252.204-7012.
Enable seamless, secure sharing throughout contracting and supply chain collaboration workflows, while maintaining persistent control and visibility.
Unlock new collaboration workflows between primes, subcontractors, and mission partners, powering innovation throughout the defense industrial base to drive growth.
Virtru protects CUI and technical data within email and files from unauthorized access throughout its lifecycle.
Seamless end-to-end email and file encryption streamlines your preparations for CMMC Level 3 Maturity.
Provide end users and administrators easy-to-use protection, embedded in existing applications like Gmail, Google Drive, and Outlook. Complement user protections with DLP rules that automatically enforce CUI and technical data protections.
Enable seamless access for recipients and supply chain collaborators via the Secure Reader, without requiring new accounts or passwords, enabling innovation and growth.
Enable secure sharing between primes, subcontractors, and mission partners with attribute-based access controls (ABAC) for CUI and technical data that enable instant access revocation, expiration, disable forwarding, and document watermarking.
Audit who has accessed data, when, where, and for how long. Export event logs for analysis or integrate with your SIEM for advanced threat intelligence.
Configure DLP rules that scan emails and attachments to detect CUI and technical data, then automatically enforce encryption and access controls that persist throughout supply chain workflows.
Get expert insights on how to address your data protection challenges.
The International Traffic in Arms Regulation (ITAR) regulates technical data used for the development and manufacture of defense articles and services. Previous rules prevented technical data from being stored and…