Circle’s security architecture addresses the fundamental weaknesses of today’s cloud-native application and network architectures with multiple breakthrough innovations – all without sacrificing the efficiency and innovation of the cloud, while ensuring data security and privacy. We present here an overview of the key technology pillars and how they are applied to power identity, data security and privacy as a REST API.

Technology Pillars

These are the fundamental technology pillars that enable Circle to deliver its unique combination of capabilities.
Cryptographic Private Network of Devices
Encrypted Secure Digital Capsules
Circle Service
Web Services
Immutable Internal Distributed Ledger
Patented P2P Multi-factor Authentication

Meet the Challenges of the New Normal

Circle Beats Both Traditional MFA and Hardware Tokens

>
Superior UX and Security vs. traditional MFA
>
Equal of better security and superior UX vs. Hardware Tokens
This ensures that customers and users can deploy and use it universally to achieve security without sacrificing efficiency
Key Capabilities
Hardware Tokens
Traditional MFA
Circle
Complies with MFA Requirements
Eliminates Credentials-Based Attacks
Removes Friction for user
Uses Only Trusted Factors
Supports Continuous Authentication
Restricts Access to Authorized Users that are bound to Auhtorized Devices
Single User Auth Across Browser, Devices and Contexts
Escalation to Unspoofable Human-in-the-loop Identity Verification
E2EE Zero Trust Data Protection on Demand

Cryptographic Authentication Protection for Cloud Data and Resources

Eliminate Credentials-based Attacks
Eliminate phishing and other breaches caused by stolen or lost credentials. Cryptographically bind authentication to the specific user and device that has been authorized.
Bind Users to their Devices
Circle replaces insecure passwords with private keys created and stored in Secure Capsules that are bound to each device and cryptographically validated during each login.
Validate Users with Biometrics
Biometric checks prior to log-in - or when desired continuously during sessions - can ensure the authorized user is actually in control of the device. Scans can be stored in Secure Capsules to prevent device co-opting by attackers.
Escalate to Human-in-the-loop Identity Verification
When needed, Circle-of-Trust provides an unspoofable method of distributed, peer-to-peer multifactor identity verification + authentication.
Enforce and Prove Compliance
Ensure adherence to regulations like HIPAA to protect PHI via restricting access to authorized persons. Optionally capture immutable records of device security posture and other metadata at the exact time of authentication for every user and every device requesting access.

Secure Authentication that Delights Users

Easy to Deploy
Deploys in minutes, allows users to self provision and enroll devices, and requires little maintenance.
Easy to Use
No more unnecessary login friction!
>
Eliminate tedious two-step authentication processes.
>
No need for users to choose lengthy passwords or change them every 90 days.
Easy to Support
Save costs, overhead and distractions by eliminating password resets, lockouts and help desk tickets.

Flexible Levels of Security

Traditional MFA relies on passwords and other weak factors that cannot counter the sophistication of attackers. Remote working is the new normal, and demands that companies ensure the identity of the user behind every device.

See Circle in action

Cryptographic Credential Free Authentication
Eliminate phishing and other breaches caused by stolen or lost credentials. Cryptographically bind aut
Cryptographic Credential 
Eliminate phishing and other breaches caused by stolen or lost credentials. Cryptographically bind aut
Cryptographic Credential Free Authentication
Eliminate phishing and other breaches caused by stolen or lost credentials. Cryptographically bind aut
Eliminate phishing and other breaches caused by stolen or lost credentials. Cryptographically bind aut
"With Circle Trust, we were able to have agents quickly transition from the contact center to home office and were able to seamlessly continue assisting our customers during this difficult period."
Christina Palinksy, Head of Opperations

Trusted Partners to help you deploy with confidence

experienced technology partners or design and build your contact center with our top-tier consulting partners.
Get in touch

Select a package designed with your needs in mind

Start for free
Eliminate phishing and other breaches caused by stolen or lost credentials. Cryptographically bind aut
Join now
Start for free
Eliminate phishing and other breaches caused by stolen or lost credentials. Cryptographically bind aut
Join now
Start for free
Eliminate phishing and other breaches caused by stolen or lost credentials. Cryptographically bind aut
Eliminate phishing and other breaches caused by stolen or lost credentials. Cryptographically bind aut
Join now
cartrocketcheckmark-circlecross-circle