Protect, Track & Control Data.
Anywhere. Anytime.

Get started in JavaScript, Node.js, Python, or C++.

Use Cases

In order to deliver against our data privacy mission—all data protected, anywhere—we built our SDKs to simply and flexibly support a wide range of use cases. Below are five specific examples of how Virtru SDKs are being used today to protect data across environments, applications, and devices.

Scroll down or jump directly to your preferred use case:

Cloud Data Protection & Compliance

An increasing amount of data is stored in the cloud, aggregated into reports and funneled into custom applications to support business objectives. If you operate in a highly regulated environment, the native security features your cloud provider offers are simply not enough to protect your organization from a damaging breach or human error. An additional layer of end-to-end encryption protects your data while ensuring continuous compliance with changing regulations.

Relevant core capabilities include:

  • Consistent policy enforcement across cloud environments.
  • Granular access controls.
  • Audit trail to assess data access.
  • Persistent data protection that binds to the data wherever it goes.

Data Protection for IoT Devices

IoT devices introduce new technical challenges to protect against unauthorized data access, with sensors producing multiple files per second or streaming data between locations. This data must uphold privacy standards across the entire lifecycle of the data, from collection to transmission to analysis even when the device itself may be insecure. TDF protections travel with the data throughout transmission and dissemination without causing any latency issues. Attribute-based access controls (ABAC) enables granular access control as well as revocation and expiration. Given the potential for IoT devices to be lost or stolen, access controls coupled with audit features protect data from abuse and compromise.

Relevant core capabilities include:

  • ABAC-controls manage access policies and evolve them due to changing requirements or lost or compromised devices.
  • Track data events at the object-level through audit controls.
  • Low latency encryption does not slow down the workflow or data streams.

Secure File Transfer

Due to the amount of data shared among disparate locations, platforms, and partners, companies are taking a hard look at the security of their legacy file sharing solutions or looking for new ways to share securely. Access to the Virtru Data Protection Platform enables you to supplement your current file sharing solution and/or workflows with end-to-end data protection and continuous control and visibility. Virtru is platform, data, and device-independent so you can protect and share your sensitive data without size or file type constraints; in-transit and at rest.

Relevant core capabilities include:

  • Audit logs for enhanced visibility of data.
  • Flexible key management services that integrate easily into customized applications.
  • TDF wraps data, automatically providing persistent controls that travel with the data.

End User Privacy Protection

If you are collecting customer, patient or end-user data in a form, portal or fax machine, personal privacy, and compliance with regulations such as GDPR and CCPA are a big concern. Ensuring customers that you have the proper safeguards in place and can prove that their data is protected in the case of a breach is of the utmost importance. Protect and track customer data regardless of how or where it was shared with audit controls that adapt to the strictest privacy needs.

Relevant core capabilities include:

  • Audit features to track data access.
  • Full life cycle data protection from authentication to encryption, decryption, revocation and key rotation.
  • TDF wraps data, automatically providing persistent controls that travel with the data.
  • The data owner can track the lifecycle of the data through audit controls and demonstrate proven protection.

Compliance Process Automation

Robotic Process Automation can significantly reduce the human cost of compliance ($7 to $30 million annually) and the potential fines that inevitably occur through data handling errors. Secure your RPA-enabled workflows to ensure that sensitive data shared within and outside the organization has the appropriate levels of encryption and policy controls. Since Virtru is not platform dependent, our technology can be utilized with any robotic process automation partner.

Relevant core capabilities include:

  • Full life cycle data protection from authentication to encryption, decryption, revocation and key rotation.
  • TDF wraps data, automatically providing persistent controls that travels with the data.
  • The data owner can track the lifecycle of the data through audit controls and demonstrate proven protection.