Transparent and flexible pricing that meets your needs and supports your growth

Free Plan

Get Circle All-Inclusive Plan for free with up to 100 MAUs (same company domain) and 5K customer MAUs
Start Securing Now

Have Unique Requirements?

We will work with you to configure Circle the right way and have you up and running rapidly!
Contact Our Experts
Free SubscriptionSiver SubscriptionGold Subscription

Workforce

Consumer

Developer

Key Capabilities
Identity Security
Data Security
Privacy  Security
ALL INCLUSIVE


$6 / MAU
$8 / MAU
$10 / MAU
$15/ MAU

Secure Identity

Credential-free Access
Frictionless MFA via Circle Access
Simple QR code based onboarding and access
Windows, MacOS, iOS, Android, Linux
Supports web applications and device native applications
Mobile-only, Desktop-only, and Hybrid Deployment options
Out-of-band exchange of cryptographic keys
End User Self Management
Manage My Devices
Manage Multiple Profiles
Self provisioning and enrollment
Administration
Credential-free SSO Access
SSO Integrations
User and Device Management
Event Logs and Audit Trail
Remote Wipe
Continous Authentication
Device biometric based tracking of identity during sessions
Context-aware Step-Up Identity Verification
Circle-of-Trust Identity Verification
Risk policy-driven step-up verification

Secure Data

Credential-free Access
Frictionless MFA via Circle Access
Simple QR code based onboarding and access
Windows, MacOS, iOS, Android, Linux
Supports web applications and device native applications
Mobile-only, Desktop-only, and Hybrid Deployment options
Out-of-band exchange of cryptographic keys
Digital Trust
Cryptographic signing of every user action, interaction, and transaction
Multi-party authorization and approvals
Immutable logging and audit trails
Circle-of-Trust Identity Verification
Data Protection
End-to-end data encryption
Secure data sharing between authorized devices
User and Device Management
Private keys bound to device
Data Visibility & Control
Visibility into enterprise data on endpoint user devices
Encryption of enterprise data on endpoint user devices with full control of the enterprise
Remote wipe of enteprise data on endpoint user devices by the enterprise at any time
Secure download of enterprise data on to authorized endpoint user devices

Secure Privacy

Private Messaging & Collaboration
Decentralized communication with trusted and verified parties
No leakage of user activity, user data or user meta data. No visibility for Circle as well
Secure information sharing among trusted groups with the additional option of going anonymous
Immutable logging and audit trails
Personal Data Capsule
Encrypted personal data storage on device designed to secure PII
Keys bound to device
Zero Knowledge Identity Confirmation
Identity confirmation via cryptographic sharing of PII with third parties
Secure Information Exchange
Secure and consensual sharing of personal data with third parties
Data sharing with end-to-end encryption
Secure & Private Recovery of Personal Data
Fail-safe recovery of access to personal data via Circle-of-Trust
Device Management
Secure and encrypted replication of personal data across multiple owned devices
Personal Data Control
Ownership and control of personal data shared with third parties with full ability to revoke their access remotely
Tab Content #2
Tab Content #3

Not sure where to get started?

Contact Our Expert
cartcross