Select your cookie preferences

We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”

Sign in
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Great for Work

  • By Ashley Burns D.
  • on 12/18/2024

What do you like best about the product?
My most liked feature of Virtru Email Encryption is its user-friendly interface and seamless integration with existing email platforms like Gmail and Outlook, allowing for easy encryption of sensitive information without requiring complex setup or extensive user training, while still providing robust end-to-end encryption and advanced compliance features for sensitive data protection
What do you dislike about the product?
What I most disliked about Virtru Email Encryption include its potentially complex user interface, which can be frustrating for both senders and recipients, occasional lagging or non-functionality, and the relatively high cost compared to other email encryption services, leading to some users considering it overpriced for their needs.
What problems is the product solving and how is that benefiting you?
Virtru Email Encryption primarily solves the problem of securely sharing sensitive information through email by providing end-to-end encryption, allowing users to send and receive encrypted messages and attachments directly within their inbox without requiring recipients to download additional software or create passwords, thus protecting sensitive data from unauthorized access while meeting compliance requirements with ease


There are no comments to display