Secure Virtual Data Room

Secure confidential files and publish via your website or a customizable user portal for easy access.

See Features

Content Security That Travels Well

Your documents stay secure from desktop to mobile device.

See Benefits

Keep a Close Eye on Your Files

Track who’s opening your documents when, where, for how long and more.

More Features

Why wait? Start Your Free Trial

Content security you can trust. Easy access for intended viewers only.

Start Free Trial

Digital Document Security Anywhere

Control who can access your documents, from where, when, and on which device.
No extra software, apps or plug-ins required for your audience.


Vitrium Security Overview


Encrypt Files

Add your files to Vitrium Security and the system will apply military-grade encryption. Acceptable file formats include PDF, Word, Excel and PowerPoint. And we continue to add more!



Add Users & Groups

Decide who can access your secured files, place them in user groups, or leave them as individual recipients. Vitrium can also be integrated with other user credential or third-party systems.


Apply Controls

Control your files with Vitrium’s document settings (print and copy controls, watermarks) and various DRM policy settings such as device limits, IP limits, expiry dates, offline access, and more.


Share With Users

Publish and share your secured content via a customizable user portal, via email as attachments or links, or through your own web portal, ecommerce site, document management system, association management, ECM, LMS, or other.

integrate-orange We can help you integrate Vitrium Security into any system you might be using.
Introducing Vitrium Security

For a brief introduction, watch our video.

Request Demo

Ready, Set…Protect!

This powerful yet easy to use document security system empowers content owners and publishers to protect their most valuable, confidential, sensitive or revenue-generating documents. Start securing your PDF, Word, Excel or PowerPoint files today by requesting a free trial of the software.
Get a Free Trial Today

Our Customers

Trusted by companies around the world

University of PheonixSource Media  Toshiba McGraw Financial Euromoney

File Encryption

  • 256-bit AES military-grade encryption
  • Security that travels with the document
  • Password protection or select your credential type
  • Man-in-the-middle (MITM) and replay attack prevention

Document Controls

  • Set printing, copying, highlighting & annotations controls
  • Customize watermarks and apply dynamic data to them
  • Customize login forms, settings, policies, and more
  • Set document expiry dates or revoke at any time

User Controls

  • Add, modify or delete users & groups
  • Define DRM policies at user, group or global level
  • Assign, change or revoke permissions at any time
  • Set device, browser & IP limits
  • Track user activity & export reports

Tracking & Analytics

  • Access real-time analytical reports
  • Track user activity (file opened, date, IP address, and more)
  • Look up error messages, browser or applications being used
  • Analyze user behaviors (read-through-rate, pages viewed, etc.)

Seamless Access

  • No plug-ins or apps required for users to access content
  • Publish and share secured content via a customizable user portal
  • Web & mobile-friendly access with Vitrium’s HTML5 web viewer
  • Compatibility with Adobe Reader & Acrobat PDF viewers
  • Easy to use administrator interface


  • Built-in integration with Dropbox, Google Drive, OneDrive, Box and Salesforce
  • Integrate with any 3rd party system including websites, document management, eCommerce, CRM, LMS, and more


Implementing A Document Security System

In today’s rapid changing digital technology, document security systems and the way we access and distribute documents continue to evolve, moving towards efficiency and convenience. Widespread file sharing tools like Dropbox, Google Docs, and simply emailing valuable content have become predominant methods of distributing and enabling access to critical business information, but do little to protect a business’s intellectual […]

Read More