Circle Access

Circle Access

Access Verification

Circle-of-Trust: When You Have to be Sure

All traditional MFA is just a best guess that the user on the device is the user you have authorized. Cloud infrastructure and communications channels are both vulnerable. For many use cases involving access to critical, valuable resources, this simply is not good enough.
Configure your access policies to trigger zero-trust identity verification
No external certificate authority or exposure
All operations performed within AES 256 encrypted circles

Circle-of-Trust enables step-up escalation to a breakthrough Zero Trust unspoofable human-in-the-loop identity verification to absolutely protect your most sensitive digital resources, actions and powers.

Start Securing Now
Circle-of-Trust Level 2

Spoof-proof your actions, events, and data requiring the highest level of security

Enable direct identity verification of a user via other trusted and known users who are cryptographically added to the Circle-of-Trust. Developers can easily integrate the API calls to Circle-of-Trust into their workflows in minutes.

Authorized members of a Circle-of-Trust operate entirely as an encrypted user group without any external avenues for attack.

With the available API hooks and guidance, enterprises can implement their own variations of Circle-of-Trust, while ensuring the security and integrity of the system is maintained.
Circle-of-Trust

Human-in-the-Loop Verification

When You Have to be Sure, Circle-of-Trust executes:

  1. unspoofable decentralized cryptographic MFA;
  2. that is delegated to authorized humans who can verify the identity of the end user on the device; and
  3. is cryptographically fused to the authorization of any digital action, transaction or workflow.

Trusted Restore & Recovery

With Circle-of-Trust, any verified member can restore access and recover the Circle-of-Trust owner without any possibility of gaining access to the owner's secrets themselves.

The Circle-of-Trust owner invites and verifies members that have the power to restore his/her encryptions keys and access.

The number of members for identity verification to authorize recovery can be set by the Circle-of-Trust owner.

Super Powers are Always Super Safe

To ensure a smooth recovery process there should be specific set of users which super accesses or in other words super powers who can override and when needed recover and protect the system . With Circle these super users will be reinforced by people who know each other personally and beyond machines!

  • Circle-of-Trust solves this problem, enabling Super User access to be reinforced by humans that know each other beyond machines.

Cloud Back-up Without Access to Keys

Worried about users that do silly things? Application developers can easily offer a cloud back-up that is automatically created when users create a Circle-of-Trust.

Recovery keys are stored on the cloud, but in secure capsules that can only be opened when downloaded to an authorized device of an authenticated user. So, your support staff can recover a user, but never get access themselves.

Built-in Immutable Audit Trail

Circle's internal immutable Distributed Ledger ensures that a bullet-proof audit trail can be maintained for compliance and regulatory investigations.

Ditch MFA and Hardware Token Hassles and Headaches

Easy to Deploy & Maintain
Easy to Deploy

Faster Deployment i.e. within minutes

  • Deploy the application in minutes that allows users to self provision and enroll devices
  • Enabling features super powers to Circle of Trust Members without any support from helpdesk
Easy to Use

No more unnecessary login friction!

  • Get the security of hardware tokens and physical world processes with the fluidity and ease of all digital execution.
  • Integrated encrypted video conference option.
  • QR Codes and other instant scan options for person-to-person verifications
Easy to Support

No VPN, Firewalls or SDP needed.

  • Only authorized devices, with end users identities verified by Circle-of-Trust, can access the protected cloud server, device, or resource.
  • Eliminate help desk ticket and support for password resets and credentials breach.

Works with Your SSO & IAM Platforms

Leverage our out-of-the box integrations with leading SSO & IAM platforms - with more coming soon - to extend Zero Trust protection to your data.
Active Directory

Featured Partners

Circle and Auth0 Integration Powers Credential-Free Authentication and Delegated MFA with Circle-of-Trust

Security is Imperative for Enterprises to Operate and Compete in Today's Hyper-connected World The cloud is ubiquitous because it has simplified development and automation exponentially over the years, and emerging tech such as AI and IoT will only accelerate this. The catch though, is that the very same foundational architectures which drive the cloud’s efficiency, […]
Read more

ForgeRock + Circle Power 360 Protection for Identity, Access and Data Security While Maximizing Efficiency and User Experience

Security is Essential for Organizations to Operate and Compete in Today's Hyper-connected World The cloud is ubiquitous because it has simplified development and automation exponentially over the years, and emerging tech such as AI and IoT will only accelerate this. The catch though, is that the very same foundational architectures which drive the cloud’s efficiency, […]
Read more

Be amazed by the

No Compromise

promise of Circle.

See how Circle secures access and data.