SecureCircle Description

SecureCircle's Zero Trust data security protects all data, even those that are not hosted on SaaS. This eliminates data breaches and insider threat. SecureCircle's Data Access Security Broker protects and monitors data. This includes data egressing via enterprise cloud services and managed repositories. SecureCircle enforces access controls on all data locations, including cloud and endpoint devices. SecureCircle provides the only Zero Trust data protection in the world, ensuring data is protected transparently and consistently at scale.

Pricing

Pricing Information:
per user per year
Free Trial:
Yes

Integrations

API:
Yes, SecureCircle has an API
No Integrations at this time

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
SecureCircle
Year Founded:
2015
Headquarters:
United States
Website:
www.securecircle.com
Update This Listing

Media

Recommended Products
Secure your business by securing your people. Icon
Secure your business by securing your people.

Over 100,000 businesses trust 1Password

Take the guesswork out of password management, shadow IT, infrastructure, and secret sharing so you can keep your people safe and your business moving.

Product Details

Platforms
SaaS
Windows
Mac
Linux
iPhone
iPad
Android
Type of Training
Documentation
Live Online
Webinars
In Person
Customer Support
Phone Support
24/7 Live Support
Online

SecureCircle Features and Options

Computer Security Software

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Data Security Software

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance