Convenient SecurityNo extra passwords, no interruption to workflow, no reworking of business processes
MobilityData can be shared securely on any device or OS: laptops, tablets, smartphones, Windows, Mac, iOS, Android, and more
Offline AccessOffline access ensures that you can access data within a Circle no matter where you are in the world
Secure Cross-Border SharingNations can securely communicate as long as they are a part of a Circle
Varied Levels Of AccessLevel 1: Confidently share data with others in a limited, view-only sandbox <br> Level 2: Empower your core group to edit and collaborate securely
Strong SecurityCryptoMill uses AES 256-bit encryption to ensure that all your data remains protected with the highest level of security
The Circles Of Trust ModelThe key to securing data is protecting it both while in the application and after it leaves the application. With Circles we create an impenetrable cryptographic Circle around groups authorized to work with sensitive assets. Administrative roles enables tracking of all internal activity.
Holistic Data ProtectionCircles of Trust™ is a disruptive, on-premise, data-centric security software suite that protects data across the entire organization and when shared with other organizations. CoT's security suite has a much smaller infrastructural and economic footprint. Circles offer disruptive security to address today's evolving cyberthreats.
Offline AccessMultiple cloud providers such as Box, OneDrive, Dropbox, iCloud, ShareFile, Google Drive, and more, are supported by Circles of Trust™. Encrypt your cloud files in the same manner as a local file with the same seamless and transparent access. Information floating in the cloud will be encrypted and secure, allowing only Circle members to access their content in the case of theft or data leakage.
Data Protection Everywhere
Circles of Trust™ allows for secure cross-border sharing. This means any information that is encrypted will remain encrypted regardless of where it is stored or transferred. Data will be protected at rest and in motion; whether you are sending it through an email, FTP-transfer, or moving it onto a removable storage or mobile device, it will be protected.
File Level Encryption
With Circles of Trust™, encryption occurs at the file level. This means you can choose which files to encrypt in a quick and easy way. You can encrypt a folder or individual files. Any data stored within a protected folder will automatically be encrypted. Only members of the Circle will be able to view and edit an encrypted file.
Seamless And Transparent
No additional steps or passwords are required to view or edit any encrypted data, allowing for no disruptions to your daily workflow. Any file moved into a protected folder will automatically be encrypted, and will not require password entry to view for any members of the Circle it belongs to. Circle information will be synchronized with all of your devices protected by Circles of Trust™, meaning you only have to accept a Circle invitation once to gain access on all protected devices.
Secure Group Sharing
Files protected by Circles of Trust™ can be securely shared through any means. Only members of a Circle will be able to view or edit a protected document. If any data is lost or stolen it will remain fully encrypted and protected. Circle members do not need to enter any passwords to view encrypted content – once you are a member of a Circle, you can view encrypted data seamlessly and transparently.
All File Formats Supported
When it comes to encrypting a file, you don't need to worry about what format it's in - we support all file formats. This gives ease of mind and keeps the workflow seamless.