Circle of Trust

Circle-of-Trust

Zero trust context-aware identity verification that is unspoofable to absolutely protect your highly sensitive actions

Now enterprises can activate delegated identity verification when needed for high risk use cases, contexts and user behaviors. At the highest level, you can configure Circle-of-Trust in your policies engine to step up to the unspoofable human-in-the-loop Identity Verification .
Configure your access policies to trigger zero-trust identity verification
No external certificate authority or exposure
All operations performed within AES 256 encrypted circles
Circle of Trust Level 2

Spoof-proof your actions, events, and data requiring the highest level of security

Enable direct identity verification of a user via other trusted and known users who are cryptographically added to the Circle-of-Trust. Developers can easily integrate the API calls to Circle-of-Trust into their workflows in minutes.

Authorized members of a Circle-of-Trust operate entirely as an encrypted user group without any external avenues for attack.

With the available API hooks and guidance, enterprises can implement their own variations of Circle-of-Trust, while ensuring the security and integrity of the system is maintained.

Trusted Restore & Recovery

Anyone who has ever used a password manager, crypto wallets, etc. has also read all the horror stories. What happens if you LOSE the critical hardware token, passphrase or other recovery mechanism? You are locked out, and there is no recovery.

With Circle-of-Trust, any verified member can restore access and recover the Circle-of-Trust owner without any possibility of gaining access to the owner's secrets themselves.

The Circle-of-Trust owner invites and verifies members that have the power to restore his/her encryptions keys and access.

The number of members for identity verification to authorize recovery can be set by the Circle-of-Trust owner.

Super Powers are Always Super Safe

We all read the headlines. Not a day goes by without another catastrophic breach of data, networks or sensitive systems and infrastructure. Why does this keep happening? Partly because the super user or the privileged access user has the keys to the kingdom. And those keys are usually stored in the place where they are most vulnerable – on the cloud!

Circle-of-Trust solves this problem, enabling Super User access to be reinforced by humans that know each other beyond machines.

Cloud Back-up Without Access to Keys

Worried about users that do silly things? Application developers can easily offer a cloud back-up that is automatically created when users create a Circle-of-Trust.

Recovery keys are stored on the cloud, but in secure capsules that can only be opened when downloaded to an authorized device of an authenticated user. So, your support staff can recover a user, but never get access themselves.

Built-in Immutable Audit Trail

Circle's internal immutable Distributed Ledger ensures that a bullet-proof audit trail can be maintained for compliance and regulatory investigations.

Ditch MFA and Hardware Token Hassles and Headaches

Easy to Deploy & Maintain
Easy to Deploy
Deploys in minutes, allows users to self provision and enroll devices and Circle-of-Trust members with ZERO support needed by the application developer or IT.
Easy to Use
No more unnecessary login friction!
No VPN, Firewalls or SDP needed.
Only authorized devices, with end users identities verified by Circle-of-Trust, can access the protected cloud server, device, or resource.
Eliminate help desk ticket and support for password resets and credentials breach.
Easy to Support
Get the security of hardware tokens and physical world processes with the fluidity and ease of all digital execution.
Integrated encrypted video conference option.
QR Codes and other instant scan options for person-to-person verifications

Featured Partners

Circle and Auth0 Integration Powers Credential-Free Authentication and Delegated MFA with Circle-of-Trust

Security is Imperative for Enterprises to Operate and Compete in Today's Hyper-connected World The cloud is ubiquitous because it has simplified development and automation exponentially over the years, and emerging tech such as AI and IoT will only accelerate this. The catch though, is that the very same foundational architectures which drive the cloud’s efficiency, […]
Read more

ForgeRock + Circle Power 360 Protection for Identity, Access and Data Security While Maximizing Efficiency and User Experience

Security is Essential for Organizations to Operate and Compete in Today's Hyper-connected World The cloud is ubiquitous because it has simplified development and automation exponentially over the years, and emerging tech such as AI and IoT will only accelerate this. The catch though, is that the very same foundational architectures which drive the cloud’s efficiency, […]
Read more

Be amazed by the

No Compromise

promise of Circle.

Get Circle API to secure your identity, data and privacy: