Circle Data

End-to-End Data Protection

With our End-to-End Data Protection, encryption keys used to authenticate identities and their actions can be used to secure data and communications across on endpoint devices and on Cloud.

Leverage AES 256 encrypted Secure Capsules to power game changing client-side data security and control
Register Now - It's FREE

Secure private capsules controlled by your application

Highlights

  • AES 256 encrypted Secure Capsules to store any kind, and any amount of data
  • Keep private user data on endpoint devices but accessible to your applications
  • Cloud Back-up, Flexibility & Resilience - But No Keys

End-to-end data protection has a unique hybrid P2P + Cloud architecture that powers its capabilities for data security, privacy and control

Setup and implement Circle's End-to-End Data Protection 

Get started

The implementation of End-to-End Data Protection will require

  1. Circle Desktop to enable Circle Service
  2. Circle Data API
  3. Circle Github
  4.  

6 easy steps to enable Circle's End-to-End Data Protection: 

1

Setup Circle Rest API

2

Initiate one time authentication with Circle Server to start Circle Service on your local machine

3

Setup your application and confirm by verifying communication

4

Get a Bearer Token for managing API sessions

5

Generate signatures for devices/ users

6

Add Secure Capsules and manage them with Circle Rest API and Topic operations

For detailed step by step integration and implementation of End-to-End Data Protection capabilities of Circle Data refer to

Circle Data Demo CTA

Demo: A secure way to do encrypted email

Most encrypted emails system claim to be secure since they leverage an external key store to hold the keys that were used to encrypt and decrypt the email. The problem is, when the message needs to be displayed, the ‘server’ needs to ask the external key store for the decryption key; which means that while the server doesn’t store the key locally, it can still get it.
Go to our demo page for video recording of an integration with Microsoft Outlook along with code samples and explanations of how to implement.
Get Circle Access Desktop
Circle Access Desktop

You need Circle Service, which is part of the Circle Access Desktop thin client, in order to leverage its unique and powerful functionalities that run on the endpoint device.

  • AES 256 encrypted secure capsules to store any kind, and any amount of data.
  • Keep private user data on endpoint devices but accessible to your applications
  • Cloud Back-up, flexibility & resilience - but no keys.
Download now
Circle Data API
Circle Data API
You use the Circle Data API to integrate and implement Data Protection, Privacy and control capabilities.
Learn More
Circle Github
View the code on Github
Go to our Github for code downloads, examples, modules and more. 

Note:  Circle Service is also available as a separate library for direct integration into your own applications or thin clients.  If that is of interest, please contact us for a free consultation.
Learn More

Support & Learning

The End-to-End Data Protection capabilities of Circle Data are implemented with Circle Data API. More advanced and customer capabilities can leverage the Circle Data API with Circle Service and Secured Capsules on endpoint devices. Please contact us with your use case for a free consultation.

Support

Check our FAQs and Troubleshooting tips, or post on our Forum

Learning

Learn more about the breakthrough architecture and principles of Circle Data, and the amazing ways it delivers End-to-End Data Protection