End-to-end data protection has a unique hybrid P2P + Cloud architecture that powers its capabilities for data security, privacy and control
The implementation of End-to-End Data Protection will require
6 easy steps to enable Circle's End-to-End Data Protection:
Setup Circle Rest API
Initiate one time authentication with Circle Server to start Circle Service on your local machine
Setup your application and confirm by verifying communication
Get a Bearer Token for managing API sessions
Generate signatures for devices/ users
Add Secure Capsules and manage them with Circle Rest API and Topic operations
For detailed step by step integration and implementation of End-to-End Data Protection capabilities of Circle Data refer to
You need Circle Service, which is part of the Circle Access Desktop thin client, in order to leverage its unique and powerful functionalities that run on the endpoint device.
The End-to-End Data Protection capabilities of Circle Data are implemented with Circle Data API. More advanced and customer capabilities can leverage the Circle Data API with Circle Service and Secured Capsules on endpoint devices. Please contact us with your use case for a free consultation.
Check our FAQs and Troubleshooting tips, or post on our Forum
Learn more about the breakthrough architecture and principles of Circle Data, and the amazing ways it delivers End-to-End Data Protection