Data Security

Don't Think Outside the Box, Think Inside the Secure Circle

Approach

‘Zero Trust’ Approach to Data Security

Today’s businesses want it all; secure data, documents and applications accessible from anywhere and the freedom to work on any device. It’s possible with cloud technology, but there are pressing security challenges to make it a reality. 

We believe in a zero-trust approach to data security, a term first coined by Forrester; whereby you assume that everything is untrusted, regardless of whether they are inside or outside the perimeter (aka Secure Circle), and all data must be protected by default.

What is a Secure Circle?

A Secure Circle is a set of devices and users that have access to a set of files.  Files, Applications, Users, and Devices can be added or removed from the Secure Circle at any time.

Unlike existing data security technologies, this approach protects data at all times, whether it is in use, transit or rest, without affecting the end user’s workflow.  Keep scrolling down the page to download a comparison guide. 

By adding this layer of security, files can be moved securely from computer to cloud, cloud to computer and cloud to cloud, helping organisations meet data security and compliance requirements effectively in today’s cloud-first environment.

Our mission is to help organisations safeguard the security, visibility and control of unstructured data from threats both internally and externally, irrespective of format or storage location.

Business

Benefits and Features

Business benefits are abundant when it comes to the Secure Circle approach to data security.

Always Tracked; Retractable; and Portable

Always Encrypted

Network and Application Aware

Invisible Encryption Layer Doesn't Impact User Behaviour

i

Meet Encryption, Access and Auditing/Reporting Requirements

HOW DOES THE SECURE CIRCLE APPROACH COMPARE?

Discover how the 'Secure Circle' approach to data protection compares to other data security and access control solutions across three key IT considerations. Download Now

Business

Use Cases

Our mission is to help organisations safeguard the security, visibility and control of unstructured data from threats both internally and externally, irrespective of format or storage location.

Lost your laptop?

Simply remove the device from the Secure Circle and the laptop will no longer have access to any of the protected files stored within it.

Cloud storage provider compromised?

Access rights follow the content regardless of where the content goes so users and devices outside of the Secure Circle will not have access to the protected files stored with the cloud.

Mistakenly sent sensitive information to the wrong person?

Unless the recipient has been added to the Secure Circle, they will not have access to the file.

Disgruntled ex-employee?

Because files are always encrypted, the Secure Circle approach mitigates an employee’s ability to
misuse critical data.

Victim of a Ransomware Attack?

Ransomware will never be able to access the contents of protected files. Files and content are allowed to flow while protected, and centralised control is retained. 

Struggle to on-board sensitive customer data securely?

The Secure Circle approach can be utilised to protect data at the initial egress point when customers FTP data to your organisation.

Solutions

Industry Insights

Legal

As a sector that thrives on confidentiality, loss of client information can leave lasting damages. Top threats to the legal industry include fund transfer fraud; ransomware; malicious insiders; w-2 phishing scams; and data breaches.

In a 2018 report by, The National Cyber Security Centre (NCSC), insiders were revealed to cause over half of data breaches. The NCSC also reported that, according to Action Fraud, from March 2016 to March 2018, 18 law firms reported hacking attempts.

The legal sector will remain an attractive target for cyber criminals because of the wealth of sensitive information the legal sector can offer, including material on mergers and acquisitions.

Manufacturing

Loss of sensitive data, manufacturing espionage and disruption of access, through tactics such as Distributed Denial of Service, can all be a result of successful exploitation.

According to EEF and AIG and The Royal United Services Institute (RUSI), the manufacturing sector is now the third most targeted for attack. Alongside this, two-thirds of manufacturers admitted they are not insured against cyber attacks.

Keeping Intellectual Property (IP), and classified information safe is critical to stay ahead of the competition, and investment in cyber security will reduce the likelihood of an attack taking place.

Financial Services

The financial services sector is built on trust, and a successful data breach can result in customers cutting all ties with that organisation. Distributed Denial of Service (DDoS) and social engineering, such as spear phishing, are just a couple of ways cyber criminals can gain access.

UK Finance, which represents just under 300 leading firms, claims that cyber security is now second only to political risk as one of the main challenges facing the UK financial sector.

Due to the potential value of information within financial IT systems, the industry will remain one of the most popular targets for cyber criminals.

Want to Learn More?

Sign-Up For a Demo