Free Trial

Circles of Trust

Secure Cross Border File Protection


Circles of Trust eliminates the risks associated with data breaches from an attack on network, cloud, device and emails, as well as data leaks through lost or stolen devices.


Circles enables the continued protection of sensitive data regardless of whether it is at rest or in motion. Encryption follows the data wherever it goes.


CoT is an easy to use security solution, that facilitates the creation of a designated “trusted group” of people, for secure sharing and collaboration of sensitive data.


Data stays protected as sharing is done via an email, USB, mobile device, in the cloud, or sitting on someone’s desktop. Only trusted members can access the encrypted data.

Circles of Trust
Features & Benefits

Secure Cross-border sharing

Circles of Trust provides a simple and intuitive workflow for collaborating within and outside your organization.


Convenient Security

No extra passwords, no interruption to workflow, no reworking of business processes.



Data can be shared securely on any device. Laptops, tablets, smartphones, Windows, Mac, iOS, Android.


Cloud compatibility

Supports the following cloud providers today.

Box, OneDrive, Dropbox, Google Drive, ShareFile, Apple iCloud.


Offline access

Functional offline -- access documents anywhere, anytime.


Varied levels of access

Level 1: Confidently share data with others in a limited, view-only sandbox.
Level 2: Empower your core group to edit and collaborate securely.


Control over access to sensitive data

Access can be revoked anytime.
Detailed audit and logging.


Supports all file formats

Documents, spreadsheets, images, videos, even your custom or legacy formats.


Easy on-boarding

Allows IT or end user (based on policy), to easily add members to Circles.


Multiple Levels

Of Access

Trust Edit


Seamless and transparent access to protected files, using whichever application you would normally use for that file type. Manage Circles, add/remove people, and protect files of your own.

View Encrypted Files


Edit Encrypted Files


Create Circles


Invite People


Encrypt Files


Works Offline

Trust View


A standalone program to view protected files. With nothing to install and no administrative privileges required, simply log in with your Circles of Trust account and drag & drop the desired file into the application.

View Encrypted Files


No Install Required

Web View

Access Circles of Trust protected files in a web browser. There is no install required or executable apps to run. Simply navigate to the Circles of Trust WebView website, log in with your Circles of Trust account and drag & drop the desired file.

View Encrypted Files


No Install Required

Breach, Hacks and Leaks


Law Enforcement



admits hack, customer details



trying to extort money


may be the BIGGEST cyber security threat in 2016




of records

likely stolen

191 million U.S. VOTERS EXPOSED on Internet: researcher


$1B despite $250M

annual spend on


Russian Cyber Criminal


elite Chicago


Hollywood HOSPITAL

hit with

only the latest in

trend of monetizing


Samsung Pay LoopPay

Circles of Trust

Secure Cross Border Sharing

Central Management

Persistent File Protection

On Premises Key Control

Mobile Device Reader

Multiple Device Sync

Protected Cloud Storage Support

Cryptographic Access Driven

Folder-Centric Classification

Seamless Access to Protected Files

Circles of Trust

For Enterprise

Protect Cloud Storage

Multiple cloud providers, such as Box, OneDrive, Dropbox, iCloud, ShareFile, Google Drive, and more, are supported by Circles of Trust. Encrypt your cloud files in the same manner as a local file, with the same seamless and transparent access. Information floating in the cloud will be encrypted and secure, allowing only Circle members to access their content in the case of theft or data leakage.

Data Protection Everywhere

Circles of Trust allows for secure cross-border sharing. This means any information that is encrypted will remain encrypted regardless of where it is stored or transferred. Data will be protected at rest and in motion; whether you are sending it through an email, FTP-transfer, or moving it onto a removable storage or mobile device, it will be protected.

File Level Encryption

With Circles of Trust, encryption occurs at the file level. This means you can choose which files to encrypt in a quick and easy way. You can encrypt files individually, or choose to protect a folder. Any data stored within a protected folder will automatically be encrypted. Only members of the Circle will be able to view and edit an encrypted file.

Seamless And Transparent

No additional steps or passwords are required to view or edit any encrypted data, allowing for no disruptions to your daily workflow. Any file moved into a protected folder will automatically be encrypted, and will not require password entry to view for any members of the Circle it belongs to. Circle information will be synchronized with all of your devices protected by Circles of Trust, meaning you only have to accept a Circle invitation once to gain access on all protected devices.

Secure Group Sharing

Files protected by Circles of Trust can be securely shared through any means, such as: email, cloud storage, or removable storage devices. Only members of a Circle will be able to view or edit a protected document. If any data is lost or stolen, it will remain fully encrypted and protected. Circle members do not need to enter any passwords to view encrypted content – once you are a member of a Circle, you can view encrypted data seamlessly and transparently.

No Additional Passwords

Circles of Trust integrates with the Windows operating system, using your existing Windows login credentials to operate. This means you do not have to enter or create any additional passwords to protect your data. Encrypted information can be accessed seamlessly. Password entry is not required to access encrypted information once you have logged in to your Windows machine, causing no disruptions to your daily workflow.

No Interruption To Work Flow

No additional steps or passwords are required to view or edit any CoT encrypted data. If you are a member of a Circle, any files protected within it can be accessed without any disruptions to your daily workflow. CoT encrypted files can still be opened in their native applications for editing in the same manner as before they were encrypted and without entering any passwords. Files can also be encrypted simply by moving them into a CoT folder, without entering any passwords.

Stay Connected

Mobile applications are available for Android, iOS, and Windows Phone. All of your Circles will be synchronized across all of your devices, allowing you to accept a Circle invitation once for access to encrypted data on all of your devices. Mobile devices maintain full functionality and are capable of accepting Circle invitations, creating new Circles, encrypting new files, and reading encrypted files.

We Support All File Formats

When it comes to encrypting a file, you don't need to worry about what format it's in. We support all file formats. This creates ease of mind and keeps the work flow seamless.

Trust View

Not everyone you send an encrypted file to will be using  Circles of Trust. CoT's Trust View makes it easy for you to let those people only read encrypted files as well as block screen capture software. It doesn't require installation or administrative privileges. It's as easy as drag and drop.


Circles of Trust flexible architecture supports private clouds, hybrids or multi-tenant public clouds.

Flexible deployment includes:


No Keys in the Cloud

Private Cloud


Public Cloud

Hybrid Cloud

Minimum Technical Specifications

Circles of Trust Client Supported OS




On-prem KMS Supported OS





Proudly Canadian