Trusted by Over 500 U.S. and International Defense Contractors

New regulations allow organizations to share ITAR data using cloud services if it is end-to-end encrypted and no third party has the decryption keys.
PreVeil’s encrypted Email and Drive platform meet these requirements and allow users to easily manage their ITAR data in the cloud. The same system also supports CMMC, NIST 800-171 and DFARS 7012 compliance.


PreVeil Drive

PreVeil Drive lets users encrypt, store and share their files containing ITAR data. All data is protected with end-to-end encryption. Users can easily access these files from their computers or mobile devices and share them with others. Works with Windows Explorer, Mac Finder and on browsers.


Learn More About PreVeil Drive

PreVeil Email

PreVeil is an end-to-end encrypted email service that meets ITAR requirements. Users can send and receive encrypted emails from their existing Office 365, Gmail or Apple mail using their existing email address just like they are used to.


Learn More About PreVeil Email

Why Leading Defense Contractors Choose PreVeil
for ITAR Compliance Software

Easy to Deploy

Deploys in hours alongside your existing O365, G-Suite or on-premise IT systems, avoiding months of business disruption and expense.


Only users handling ITAR data require a low-cost license. Suppliers and partners can join PreVeil for free. There are no servers to buy and maintain.


Per ITAR Regulation §120.54, all emails and files are end-to-end encrypted using FIPS 140-2 algorithms. Furthermore, PreVeil has no access to the decryption keys.

All your ITAR data in PreVeil is automatically encrypted and stored on Amazon’s FedRAMP High GovCloud for additional security and compliance.

Encrypted Storage on Amazon GovCloud

Zero Trust Security

PreVeil implements NSA-recommended Zero Trust security and assumes a breach is inevitable.
All data is secured using end-to-end encryption. Information is only ever encrypted and decrypted on a user’s device -never on the server. ITAR data cannot be accessed via stolen passwords or a compromised administrator’s credentials. It can also be recovered from a Ransomware attack. Organizations can restrict the flow of ITAR data to their trusted partners and suppliers.


Learn More About PreVeil Security