Free Trial

Circles of Trust

Secure Cross Border File Protection

Overview

Circles of Trust eliminates the risks associated with data breaches from an attack on network, cloud, device and emails, as well as data leaks through lost or stolen devices.

 

Circles enables the continued protection of sensitive data regardless of whether it is at rest or in motion. Encryption follows the data wherever it goes.

 

CoT is an easy to use security solution, that facilitates the creation of a designated “trusted group” of people, for secure sharing and collaboration of sensitive data.

 

Data stays protected as sharing is done via an email, USB, mobile device, in the cloud, or sitting on someone’s desktop. Only trusted members can access the encrypted data.

Circles of Trust
Features & Benefits

Secure Cross-border sharing

Circles of Trust provides a simple and intuitive workflow for collaborating within and outside your organization.

 

Convenient Security

No extra passwords, no interruption to workflow, no reworking of business processes.

 

Mobility

Data can be shared securely on any device. Laptops, tablets, smartphones, Windows, Mac, iOS, Android.

 

Cloud compatibility

Supports the following cloud providers today.

Box, OneDrive, Dropbox, Google Drive, ShareFile, Apple iCloud.

 

Offline access

Functional offline -- access documents anywhere, anytime.

 

Varied levels of access

Level 1: Confidently share data with others in a limited, view-only sandbox.
Level 2: Empower your core group to edit and collaborate securely.

 

Control over access to sensitive data

Access can be revoked anytime.
Detailed audit and logging.

 

Supports all file formats

Documents, spreadsheets, images, videos, even your custom or legacy formats.

 

Easy on-boarding

Allows IT or end user (based on policy), to easily add members to Circles.

 

Multiple Levels

Of Access

Trust Edit

 

Seamless and transparent access to protected files, using whichever application you would normally use for that file type. Manage Circles, add/remove people, and protect files of your own.

View Encrypted Files

 

Edit Encrypted Files

 

Create Circles

 

Invite People

 

Encrypt Files

 

Works Offline

Trust View

 

A standalone program to view protected files. With nothing to install and no administrative privileges required, simply log in with your Circles of Trust account and drag & drop the desired file into the application.

View Encrypted Files

 

No Install Required

Web View

Access Circles of Trust protected files in a web browser. There is no install required or executable apps to run. Simply navigate to the Circles of Trust WebView website, log in with your Circles of Trust account and drag & drop the desired file.

View Encrypted Files

 

No Install Required

Breach, Hacks and Leaks
2016

BREACH FBI's

Law Enforcement

Portal

Vodaphone

admits hack, customer details

STOLEN

Goldcorp
BREACHED by
HACKERS

trying to extort money

HACKED MEDICAL DEVICES

may be the BIGGEST cyber security threat in 2016

BRITISH AIRWAYS
frequent-flyer
accounts

HACKED

HEARTLAND Payment
Systems

ANTHEM
hacked MILLIONS
of records

likely stolen

191 million U.S. VOTERS EXPOSED on Internet: researcher

JPMorgan

$1B despite $250M

annual spend on

CYBER SECURITY

Russian Cyber Criminal

TARGETS

elite Chicago

LAW FIRMS

Hollywood HOSPITAL

hit with

RANSOMWARE
only the latest in

trend of monetizing

CYBER ATTACKS

Samsung Pay LoopPay
HACKED

Circles of Trust
Features

Secure Cross Border Sharing

Central Management

Persistent File Protection

On Premises Key Control

Mobile Device Reader

Multiple Device Sync

Protected Cloud Storage Support

Cryptographic Access Driven

Folder-Centric Classification

Seamless Access to Protected Files

Circles of Trust

For Enterprise

Protect Cloud Storage

Multiple cloud providers, such as Box, OneDrive, Dropbox, iCloud, ShareFile, Google Drive, and more, are supported by Circles of Trust. Encrypt your cloud files in the same manner as a local file, with the same seamless and transparent access. Information floating in the cloud will be encrypted and secure, allowing only Circle members to access their content in the case of theft or data leakage.

Data Protection Everywhere

Circles of Trust allows for secure cross-border sharing. This means any information that is encrypted will remain encrypted regardless of where it is stored or transferred. Data will be protected at rest and in motion; whether you are sending it through an email, FTP-transfer, or moving it onto a removable storage or mobile device, it will be protected.

File Level Encryption

With Circles of Trust, encryption occurs at the file level. This means you can choose which files to encrypt in a quick and easy way. You can encrypt files individually, or choose to protect a folder. Any data stored within a protected folder will automatically be encrypted. Only members of the Circle will be able to view and edit an encrypted file.

Seamless And Transparent

No additional steps or passwords are required to view or edit any encrypted data, allowing for no disruptions to your daily workflow. Any file moved into a protected folder will automatically be encrypted, and will not require password entry to view for any members of the Circle it belongs to. Circle information will be synchronized with all of your devices protected by Circles of Trust, meaning you only have to accept a Circle invitation once to gain access on all protected devices.

Secure Group Sharing

Files protected by Circles of Trust can be securely shared through any means, such as: email, cloud storage, or removable storage devices. Only members of a Circle will be able to view or edit a protected document. If any data is lost or stolen, it will remain fully encrypted and protected. Circle members do not need to enter any passwords to view encrypted content – once you are a member of a Circle, you can view encrypted data seamlessly and transparently.

No Additional Passwords

Circles of Trust integrates with the Windows operating system, using your existing Windows login credentials to operate. This means you do not have to enter or create any additional passwords to protect your data. Encrypted information can be accessed seamlessly. Password entry is not required to access encrypted information once you have logged in to your Windows machine, causing no disruptions to your daily workflow.

No Interruption To Work Flow

No additional steps or passwords are required to view or edit any CoT encrypted data. If you are a member of a Circle, any files protected within it can be accessed without any disruptions to your daily workflow. CoT encrypted files can still be opened in their native applications for editing in the same manner as before they were encrypted and without entering any passwords. Files can also be encrypted simply by moving them into a CoT folder, without entering any passwords.

Stay Connected

Mobile applications are available for Android, iOS, and Windows Phone. All of your Circles will be synchronized across all of your devices, allowing you to accept a Circle invitation once for access to encrypted data on all of your devices. Mobile devices maintain full functionality and are capable of accepting Circle invitations, creating new Circles, encrypting new files, and reading encrypted files.

We Support All File Formats

When it comes to encrypting a file, you don't need to worry about what format it's in. We support all file formats. This creates ease of mind and keeps the work flow seamless.

Trust View

Not everyone you send an encrypted file to will be using  Circles of Trust. CoT's Trust View makes it easy for you to let those people only read encrypted files as well as block screen capture software. It doesn't require installation or administrative privileges. It's as easy as drag and drop.

Deployment

Circles of Trust flexible architecture supports private clouds, hybrids or multi-tenant public clouds.

Flexible deployment includes:

On-Premise

No Keys in the Cloud

Private Cloud

Multi-Tenant

Public Cloud

Hybrid Cloud

Minimum Technical Specifications

Circles of Trust Client Supported OS

2GHz

2GB

2GB

On-prem KMS Supported OS

 

2GHz

4GB

30GB

Proudly Canadian