Manage and Audit Data Access with Virtru Control Center

Virtru Control Center gives administrators a single interface to create and manage data protection policies, easily revoke or change access privileges, and get comprehensive visibility for compliance audits.


Centrally Manage

Sharing of sensitive data, inside and outside your organization.


Monitor and Control

Access to sensitive information by setting and enforcing DLP rules across the enterprise.


Audit Data Access

For security intelligence, with reports, visualizations, SIEM integrations, and event exports.

Create Rules

Built-in Rules

Choose from pre-configured data protection rules that scan emails and virtually any attachment file type for sensitive keywords, patterns, and other common indicators.

Rules Builder

Configure powerful rules to match your organization’s data access control policies and compliance requirements.

Notify Users and Enforce Rules

Notify Users

Alert users of potential compliance or security issues before they occur.

Set Automatic Protection

Configure rules to automatically enforce specific data protection or compliance policies.

Enforce rules enterprise-wide or for specific groups or organization units.

Provides Central Data Access Control

Set Enterprise-wide Rules to Control Access.

Revoke or expire messages, control forwarding, view read receipt, and add watermarks to PDFs even after emails have been read.

Optionally allow end users to control access with one click.


Gain Visibility Through Audit Trails

Granular Insight and Control

See where information is shared and revoke access at any point in the chain of custody.

Control Center Details

The Control Center ensures that only authorized parties can access Virtru-protected content. It stores and mediates access-to-access control keys, manages policies, and authenticates users via either federated identity services or an email verification path.

The Control Center mediates several types of policies, including:

  • Encryption key ownership
  • Encryption key access
  • Current access state (active or revoked)
  • Access expiration
  • Authorization to add others to the policy (disable forwarding)
  • Content protection settings (watermarking, download disablement)

See Virtru Up Close & Personal

Gmail and Outlook Encryption has never been easier. Book a demo to see how it works.

Looking for a Deep Dive on the Virtru Platform?

Get our Technical Whitepaper

Download Now