<img src="https://ad.doubleclick.net/ddm/activity/src=11631230;type=pagevw0;cat=pw_allpg;dc_lat=;dc_rdid=;tag_for_child_directed_treatment=;tfua=;npa=;gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ord=1;num=1?" width="1" height="1" alt="">

Compliance with Virtru

Layered data-centric security to strengthen your compliance posture. 

Information technology professionals work on computers in a data room.


Encrypt and control criminal justice information (CJI) stored and shared via Google Workspace and Microsoft 365 for CJIS compliance (Criminal Justice Information Services).

Military personal working on computers in a data room


Protect Controlled Unclassified Information (CUI) everywhere it’s shared with NIST and DFARS compliant protections that position your organization for CMMC 2.0 compliance.

A college student raises his hand in a classroom


Effectively protect and control student PII and PHI to maintain compliance and data security requirements.

A man with a laptop looking out the window of a high-rise office

Financial Services

Virtru’s Zero Trust data protection equips financial services organizations to strengthen compliance with regulations like GLBA, PCI, CFPB, FINRA, and Sarbanes-Oxley (SOX).

A man works on his computer in an office

FTC Safeguards Rule

Virtru’s Zero Trust data encryption protects customer data in transit and at rest, equipping organizations to comply with evolving FTC regulations.

A woman working on a laptop in an office


Encrypt and control consumer data stored and shared via Gmail, Google Drive, and Outlook for compliance with GDPR.

A doctor speaking with her patient in a clinic


Encrypt and control Protected Health Information (PHI) inside and outside your organization to meet HIPAA compliance requirements.

A man works on a laptop in his office.

ISO 27001

Virtru’s Zero Trust data encryption provides enhanced security for information in transit and at rest, supporting many data security aspects of ISO 27001 Certification.

Manufacturing professionals looking at specs on a tablet


Prevent non-US entities from accessing ITAR technical data throughout cloud-based sharing workflows with data-centric protection and powerful key management capabilities.