Blaze is Available in two versions
Desktop Client No-Install
Browser-Based Web App
Cyberthreats Addressed
External Hackers
• Attacks on email servers, content servers, mobile, or cloud • Ransomware attacks with extortion
Lingering Data – Inaccessible
• Internal data leaks from current and former employees and consultants
Threats to Data Sovereignty
• Project conclusion, or discontinuation, leading to data being compromised
Lost/Stolen Device
• Files on misplaced phones remain secure and are inaccessible to members outside of their Circle
Misdirected E-mails
• Data leakage of documents, if sent to wrong recipients, remains secure by the Circle
Supply Chain Vulnerabilities
• Data shared with third parties remains secure