Circle API Demos

See and Learn How to Use Circle to Secure Identity, Data and Privacy

Circle is reimagining cybersecurity. Using a unique next-gen architecture Circle secures identity, data and privacy for third-party applications using one unified API.

Here are some initial demos that demonstrate the power of Circle in the areas described. As we build out more demos and integrations, we will add them here.
Subscribe for Updates

Circle Access Desktop 

Your Device is Your Log-in

Stand-alone credential-free authentication powered by Circle Access Desktop API without any integrations.
Your device is your log-in
Secure Capsules to store secrets, tokens or keys for cryptographic validation.
Option for device-based biometrics for user identity verification
Add and manage multiple devices with out-of-band peer-to-peer cryptographic authentication. 
Go to the Demo

Circle Access Mobile

Your Smartphone is Your Log-in

Frictionless authentication with unrivaled security for the cloud-centric, distributed, BYOD modern workplace.  This live demo contains real examples of an application communicating with Circle Access APIs to authenticate and request credential-free 2FA (Two Factor Authentication) on the end user's smartphone for a variety of needs.
Restrict access to trusted devices with no credentials, 2FA codes, additional user actions or second devices required
Uses Circle Access App:  Your Smartphone is You, and authenticates your log-in for any mobile or Web application
Positively verify user identity on every device with biometric scans
Go to the Demo

Circle Access 360

Total Convenience with Unrivaled Security

In this demo, you will see how Circle Access 360 provides frictionless device-based authentication for your desktops and laptops that works together with frictionless credential-free authentication on your moible.
Optimize your app for user experience and privacy, lower user friction and speed up the registration, login and auth factors.
Completely frictionless cryptographic credential-free authentication that binds user access to authorized, registered devices.
Enable biometric-powered continuous authentication when needed for real-time security monitoring.
Go to the Demo

Circle-of-Trust

Circle-of-Trust (with Auth0)

Circle-of-Trust is a method of delegated step-up Identity Verification and authentication - in this case integrated and working with Auth0.
Simple admin to demonstrate setting up one or multiple human authenticators that know you.
Lock Secure Capsules containing Auth0 tokens to restrict access.
Perform a direct out-of-band multi-factor authentication with human authenticators to unlock Secure Capsules and restore access.
Go to the Demo

Circle Verite

Authorization Workflow Demo

Leverage Circle Authorization API to govern and implement protocols with bullet-proof cryptographic enforcement of approvals.  This demo shows a simple example of how you can easily build multi-party approvals of any workflow without compromising business agility.
Cryptographic authentication and biometric identity verification with Circle Access APIs and Circle Access Mobile App
Multi-party approvals with weighting, veto powers, and other options.
Frictionless UX with QR codes on smartphones
Complete record of all actions for auditing and compliance
Go to the Demo

Circle Guard

Safeguard your data on endpoint devices and in Cloud

This demo will show you how our AES 256 encrypted secure capsules can be used to secure data and communications end-to-end protecting data on the endpoint devices and in Cloud with the same encryption keys.
AES 256 encrypted secure capsules to store any kind, and any amount of data.
Keep private user data on endpoint devices but accessible to your applications
Cloud Back-up, Flexibility & Resilience - But No Keys
Go to the Demo

Circle Vault

Enterprise Data Visibility & Control

This demo will demonstrate client-side encryption can be used between multiple users.
The secure E2EE exchange of files and data between users and devices with zero attack surface in the cloud.
The creation of Circles, an cryptographically private network of devices defined by the possession of a unique AES 256 key, using our direct out-of-band P2P authentication process.
Go to the Demo

Circle Prive

Secure File Sharing with Circles

A demonstration of secure communications and exchange of data between users and devices in AES 256 encrypted private Circles and Secure Capsules with zero attack surface in the cloud.  Uses the Circle REST API and Circle Service.
AES 256 Encrypted Circles protect all user data, activities and communications
Out-of-band P2P multi-factor authentication ensures privacy
Private User Groups
Secure digital capsules
Go to the Demo

Auth0 + Circle Access + Circle-of-Trust

Your Device is Your Log-in

Credential-free authentication powered by Circle Access Desktop API that works together with Auth0.
Your device is your log-in.
Secure Capsules to store Auth0 tokens - and any additional data desired - to use any Federated Identity Provider.
Option for device-based biometrics for user identity verification.
Add and manage multiple devices with out-of-band peer-to-peer cryptographic authentication. 

Step-up Identity Verification with Circle-of-Trust

When desired, escalate to delegated Circle of Trust Human-in-the-loop identity verification and authentication.
Simple admin to demonstrate setting up one or multiple human authenticators that know you. 
Lock Secure Capsules containing Auth0 tokens to restrict access.
Perform a direct out-of-band multi-factor authentication with human authenticators to unlock Secure Capsules and restore access.
Go to the Demo

Get Started

For FREE!

Please contact us for a private consultation and quote, or sign-up below to receive an update when our standard pricing plans have been launched.