Connected Circles of Trust™ is an enterprise application that provide file based protection. It enables the protection of high value data regardless of whether it is at rest or in motion. It is an easy to use security solution that allows end users to create a “trusted group” of people for simple and secure sharing. Encryption follows the data wherever it goes whether on an email, USB or sitting on someone’s desktop - only people in the Circle can access the file.
Connected Circles of Trust™ is available as a managed enterprise version. It supports mobile devices and are compatible with all major cloud devices. Threat models that Connected Circles of Trust™ addresses include: external hackers, lost or stolen devices, and accidental data exposure.