Frequently Asked Questions

FAQ Category: Enterprise Data Visibility & Control

Cryptographic Credential-Free Authentication
The Circle Data APIs power Zero Trust Data Protection, Privacy & Control
Safeguard your data on endpoint devices and in Cloud
Put Your Enterprise in Charge of its Data While Respecting Your Employees' Privacy
With Circle, NOBODY other than the Data Owner has access to their data - or metadata - EVER
FAQ Categories (Buttons)
  • All
  • Circle Access Desktop (15)
  • Credential Free MFA (15)
  • Circle Access Mobile (9)
  • Circle Access (5)
  • Circle Access Lite (4)
  • Circle-of-Trust (3)
  • End-to-End Data Protection (3)
  • Enterprise Data Visibility & Control (3)
  • Data Privacy & Compliance (2)
  • Digital Trust (2)
How Is Circle Access CCFA Different than Using an X.509 Certificate for Email?
The architecture and approach of Circle Access differs from a certificates in several significant ways. There are two common use cases for X.509 certificates: securing emails and; securing authentication for access to Web server. We will focus here on securing email. Securing Email 1. X.509 certificates tie identity to an email address whereas Circle ties […]
Read more
What is the difference between Circle DLT versus Blockchain?
"Blockchain" and "Distributed Ledger Technology" (or "DLT") are too very big buzzwords today that are often misunderstood, or misused. Here is where Circle fits. A Simple Definition to Blockchain Technology Blockchain is a decentralized, distributed and often public database type where data is saved in blocks, such that the hashcode present in any block is […]
Read more
How does a Secure Capsule compare to an X.509 certificate
A cert, like X.509, binds an identity to a device; whereas a circle tie is linked to a mobile device via the application. The same cert (and, unless exceptional steps are taken, it must be used on every device generating or reading email for that email address) may be used on many devices. As a […]
Read more
How Is Circle Guard Different than Using an X.509 Certificate for Email?
The architecture and approach of Circle Access differs from a certificates in several significant ways. There are two common use cases for X.509 certificates: securing emails and securing authentication for access to Web server. We will focus here on securing email. Securing Email 1. X.509 certificates tie identity to an email address whereas Circle ties […]
Read more
What is the difference between Circle DLT versus Blockchain?
"Blockchain" and "Distributed Ledger Technology" (or "DLT") are too very big buzzwords today that are often misunderstood, or misused. Here is where Circle fits. A Simple Definition to Blockchain Technology Blockchain is a decentralized, distributed and often public database type where data is saved in blocks, such that the hashcode present in any block is […]
Read more
What does it mean when I get the error "Object reference not set to an instance of an object"
This error is due to an issue with the Authentication likely on the server side. This issue can commonly be attributed to an improperly defined API key. To fix this, navigate to your config.php file in your site project files. And keep note of your API Keys. Next, Login to your Circle Console at https://console.gocircle.ai/dashboard/web/login […]
Read more
How Does Circle Enterprise Data Control Benefit Businesses?
There are many benefits that businesses can enjoy when they make use of Circle Vault. Some of these benefits include: -Unrivaled Visibility and Control: With Circle Vault, businesses have complete visibility and control over their enterprise data. This means that businesses can easily manage access to their data and ensure that it remains safe and […]
Read more