Overview

Circles of Trust™ enables the continued protection of high value data regardless of whether it is at rest or in motion. It is an easy way to use security solution that allows end users to create a “trusted group” of people for simple and secure sharing. Encryption follows the data wherever it goes whether on an email, USB or sitting on someone’s desktop - only people in the Circle can access the file.

 

Circles of Trust™ is available as a managed enterprise version. It supports mobile devices and are compatible with all major cloud devices. Threat models that Circles of Trust™ addresses include: external hackers, lost or stolen devices, and accidental data exposure. Circles of Trust™ runs on Microsoft® Windows™ operating systems, as well as iOS, Android, and Windows phone platforms.

Circles Of Trust
Benefits

• Enterprise oriented with support for a hybrid model

 

• End-to-End encryption

 

• Supports multiple cloud providers

 

• Mac OS support coming soon

 

• Runs on Windows 7, 8 & 8.1 as well as iOS and Android

 

• Flexible file sharing

 

• Scalable and easy to install and set-up

 

• Easy to organize

   - Create multiple Circles

   - Designate which members belong to which circle

 

• Management console provides control for regulating the flow of information

Circles Of Trust
Features

Secure Cross Border Sharing

Central Management

Persistent File Protection

On Premises Key Control

Mobile Device Reader

Multiple Device Sync

Protected Cloud Storage Support

Cryptographic Access Driven

Folder-Centric Classification

Seamless Access to Protected Files

Circles of Trust

For Enterprise

Minimum Technical Specifications

Circles of Trust Client Supported OS

2GHz

2GB

512MB

On-prem KMS Supported OS

 

2GHz

4GB

512MB

Data Protection Everywhere

Circles of Trust allows for secure cross-border sharing. This means any information that is encrypted will remain encrypted regardless of where it is stored or transferred. Data will be protected at rest and in motion; whether you are sending it through an email FTP-transfer or moving it onto a removable storage or mobile device, it will be protected.

File Level Encryption

With Circles of Trust, encryption occurs at the file level. This means you can choose which files to encrypt in a quick and easy way. You can encrypt files individually, or choose to protect a folder. Any data stored within a protected folder will automatically be encrypted. Only members of the Circle will be able to view and edit an encrypted file.

Seamless And Transparent

No additional steps or passwords are required to view or edit any encrypted data, allowing for no disruptions to your daily workflow. Any file moved into a protected folder will automatically be encrypted, and will not require password entry to view for any members of the Circle it belongs to. Circle information will be synchronized with all of your devices protected by Circles of Trust, meaning you only have to accept a Circle invitation once to gain access on all protected devices.

Secure Group Sharing

Files protected by Circles of Trust can be securely shared through any means, such as
e-mail, cloud storage, or removable storage devices. Only members of a Circle will be able to view or edit a protected document; if any data is lost or stolen, it will remain fully encrypted and protected. Circle members do not need to enter any passwords to view encrypted content – once you are a member of a Circle, you can view encrypted data seamlessly and transparently.

Protect Cloud Storage

Multiple cloud providers, such as Box, OneDrive, Dropbox, iCloud, ShareFile, Google Drive, and more, are supported by Circles of Trust. Encrypt your cloud files in the same manner as a local file, with the same seamless and transparent access. Information floating in the cloud will be encrypted and secure, allowing only Circle members to access their content in the case of theft or data leakage.

No Additional Passwords

Circles of Trust integrates with the Windows operating system, using your existing Windows login credentials to operate. This means you do not have to enter or create any additional passwords to protect your data. Encrypted information can be accessed seamlessly. Password entry is not required to access encrypted information once you have logged in to your Windows machine, causing no disruptions to your daily workflow.

Stay Connected

Mobile applications are available for Android, iOS, and Windows Phone. All of your Circles will be synchronized across all of your devices, allowing you to accept a Circle invitation once for access to encrypted data on all of your devices. Mobile devices maintain full functionality and are capable of accepting Circle invitations, creating new Circles, encrypting new files, and reading encrypting files.

No Interruption To Work Flow

No additional steps or passwords are required to view or edit any CoT encrypted data. If you are a member of a Circle, any files protected within it can be accessed without any disruptions to your daily workflow. CoT encrypted files can still be opened in their native applications for editing in the same manner as before they were encrypted and without entering any passwords. Files can also be encrypted simply by moving them into a CoT folder, without entering any passwords.

We Support All File Formats

When it comes to encrypting a file, you don't need to worry about what format it's in. We support all file formats. This creates ease of mind and keeps the work flow seamless.

Trust View

Not everyone you send an encrypted file to will be using  Circles of Trust. CoT's Trust Viewer makes it easy for you to let those people only read encrypted files as well as blocking screen capture software. It doesn't require installation or administrator privileges. Its as easy as drag and drop.

Deployment

Circles of Trust flexible architecture supports private clouds, hybrids or multi-tenant public clouds.

Flexible deployment includes:

On-Premise

No Keys in the Cloud

Private Cloud

Multi-Tenant

Public Cloud

Hybrid Cloud

Proudly Canadian

Use Cases