www.securecircle.com Open in urlscan Pro
3.248.8.137  Public Scan

Submitted URL: https://www.securecircle.xyz/
Effective URL: https://www.securecircle.com/
Submission: On April 12 via automatic, source certstream-suspicious — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Powered by Cookiebot
 * Consent
 * Details
 * [#IABV2SETTINGS#]
 * About


THIS WEBSITE USES COOKIES

We use cookies to personalize content, provide social media features and analyze
our traffic. We also share information about your use of our site with our
social media, advertising and analytics partners who may combine it with other
information that you’ve provided to them or that they’ve collected from your use
of their services. You consent to our cookies if you continue to use our
website.

 

Continued usage of our website without opting out of the cookies listed and
described here will be considered consent.

 

 

Consent Selection
Necessary

Preferences

Statistics

Marketing

Show details
Necessary 6

Necessary cookies help make a website usable by enabling basic functions like
page navigation and access to secure areas of the website. The website cannot
function properly without these cookies.
Cookiebot
1
Learn more about this provider
CookieConsentStores the user's cookie consent state for the current domain
Expiry: 1 yearType: HTTP
Google
1
Learn more about this provider
test_cookieUsed to check if the user's browser supports cookies.
Expiry: 1 dayType: HTTP
LinkedIn
1
Learn more about this provider
li_gcStores the user's cookie consent state for the current domain
Expiry: 2 yearsType: HTTP
play.google.com
youtube.com

2
CONSENT [x2]Used to detect if the visitor has accepted the marketing category in
the cookie banner. This cookie is necessary for GDPR-compliance of the website.
Expiry: 2 yearsType: HTTP
ws.zoominfo.com
1
visitorIdPreserves users states across page requests.
Expiry: 1 yearType: HTTP
Preferences 2

Preference cookies enable a website to remember information that changes the way
the website behaves or looks, like your preferred language or the region that
you are in.
LinkedIn
2
Learn more about this provider
lang [x2]Remembers the user's selected language version of a website
Expiry: SessionType: HTTP
Statistics 10

Statistic cookies help website owners to understand how visitors interact with
websites by collecting and reporting information anonymously.
Google
4
Learn more about this provider
_gaRegisters a unique ID that is used to generate statistical data on how the
visitor uses the website.
Expiry: 2 yearsType: HTTP
_ga_#Used by Google Analytics to collect data on the number of times a user has
visited the website as well as dates for the first and most recent visit.
Expiry: 2 yearsType: HTTP
_gatUsed by Google Analytics to throttle request rate
Expiry: 1 dayType: HTTP
_gidRegisters a unique ID that is used to generate statistical data on how the
visitor uses the website.
Expiry: 1 dayType: HTTP
Leadfeeder
1
Learn more about this provider
https://#.#/Registers statistical data on users' behaviour on the website. Used
for internal analytics by the website operator.
Expiry: SessionType: Pixel
LinkedIn
1
Learn more about this provider
AnalyticsSyncHistoryUsed in connection with data-synchronization with
third-party analysis service.
Expiry: 29 daysType: HTTP
Microsoft
4
Learn more about this provider
c.gifCollects data on the user’s navigation and behavior on the website. This is
used to compile statistical reports and heatmaps for the website owner.
Expiry: SessionType: Pixel
_clckCollects data on the user’s navigation and behavior on the website. This is
used to compile statistical reports and heatmaps for the website owner.
Expiry: 1 yearType: HTTP
_clskRegisters statistical data on users' behaviour on the website. Used for
internal analytics by the website operator.
Expiry: 1 dayType: HTTP
_cltkRegisters statistical data on users' behaviour on the website. Used for
internal analytics by the website operator.
Expiry: SessionType: HTML
Marketing 32

Marketing cookies are used to track visitors across websites. The intention is
to display ads that are relevant and engaging for the individual user and
thereby more valuable for publishers and third party advertisers.
Google
4
Learn more about this provider
pagead/landing [x2]Collects data on visitor behaviour from multiple websites, in
order to present more relevant advertisement - This also allows the website to
limit the number of times that they are shown the same advertisement.
Expiry: SessionType: Pixel
ads/ga-audiencesUsed by Google AdWords to re-engage visitors that are likely to
convert to customers based on the visitor's online behaviour across websites.
Expiry: SessionType: Pixel
_gcl_auUsed by Google AdSense for experimenting with advertisement efficiency
across websites using their services.
Expiry: 3 monthsType: HTTP
LinkedIn
4
Learn more about this provider
bcookieUsed by the social networking service, LinkedIn, for tracking the use of
embedded services.
Expiry: 2 yearsType: HTTP
bscookieUsed by the social networking service, LinkedIn, for tracking the use of
embedded services.
Expiry: 2 yearsType: HTTP
lidcUsed by the social networking service, LinkedIn, for tracking the use of
embedded services.
Expiry: 1 dayType: HTTP
UserMatchHistoryUsed to track visitors on multiple websites, in order to present
relevant advertisement based on the visitor's preferences.
Expiry: 29 daysType: HTTP
Microsoft
9
Learn more about this provider
MUID [x2]Used widely by Microsoft as a unique user ID. The cookie enables user
tracking by synchronising the ID across many Microsoft domains.
Expiry: 1 yearType: HTTP
SRM_BTracks the user’s interaction with the website’s search-bar-function. This
data can be used to present the user with relevant products or services.
Expiry: 1 yearType: HTTP
ANONCHKRegisters data on visitors from multiple visits and on multiple websites.
This information is used to measure the efficiency of advertisement on websites.
Expiry: 1 dayType: HTTP
SMRegisters a unique ID that identifies the user's device during return visits
across websites that use the same ad network. The ID is used to allow targeted
ads.
Expiry: SessionType: HTTP
_uetsidCollects data on visitor behaviour from multiple websites, in order to
present more relevant advertisement - This also allows the website to limit the
number of times that they are shown the same advertisement.
Expiry: 1 dayType: HTML
_uetsid_expContains the expiry-date for the cookie with corresponding name.
Expiry: PersistentType: HTML
_uetvidUsed to track visitors on multiple websites, in order to present relevant
advertisement based on the visitor's preferences.
Expiry: 1 yearType: HTML
_uetvid_expContains the expiry-date for the cookie with corresponding name.
Expiry: PersistentType: HTML
YouTube
12
Learn more about this provider
VISITOR_INFO1_LIVETries to estimate the users' bandwidth on pages with
integrated YouTube videos.
Expiry: 179 daysType: HTTP
YSCRegisters a unique ID to keep statistics of what videos from YouTube the user
has seen.
Expiry: SessionType: HTTP
yt.innertube::nextIdRegisters a unique ID to keep statistics of what videos from
YouTube the user has seen.
Expiry: PersistentType: HTML
ytidb::LAST_RESULT_ENTRY_KEYStores the user's video player preferences using
embedded YouTube video
Expiry: PersistentType: HTML
yt-remote-cast-availableStores the user's video player preferences using
embedded YouTube video
Expiry: SessionType: HTML
yt-remote-cast-installedStores the user's video player preferences using
embedded YouTube video
Expiry: SessionType: HTML
yt.innertube::requestsRegisters a unique ID to keep statistics of what videos
from YouTube the user has seen.
Expiry: PersistentType: HTML
yt-remote-connected-devicesStores the user's video player preferences using
embedded YouTube video
Expiry: PersistentType: HTML
yt-remote-device-idStores the user's video player preferences using embedded
YouTube video
Expiry: PersistentType: HTML
yt-remote-fast-check-periodStores the user's video player preferences using
embedded YouTube video
Expiry: SessionType: HTML
yt-remote-session-appStores the user's video player preferences using embedded
YouTube video
Expiry: SessionType: HTML
yt-remote-session-nameStores the user's video player preferences using embedded
YouTube video
Expiry: SessionType: HTML
sc.lfeeder.com
3
_lfaUsed in context with Account-Based-Marketing (ABM). The cookie registers
data such as IP-addresses, time spent on the website and page requests for the
visit. This is used for retargeting of multiple users rooting from the same
IP-addresses. ABM usually facilitates B2B marketing purposes.
Expiry: 2 yearsType: HTML
_lfa_expiryContains the expiry-date for the cookie with corresponding name.
Expiry: PersistentType: HTML
_lfa_test_cookie_storedUsed in context with Account-Based-Marketing (ABM). The
cookie registers data such as IP-addresses, time spent on the website and page
requests for the visit. This is used for retargeting of multiple users rooting
from the same IP-addresses. ABM usually facilitates B2B marketing purposes.
Expiry: 1 dayType: HTTP
Unclassified 0
Unclassified cookies are cookies that we are in the process of classifying,
together with the providers of individual cookies.

We do not use cookies of this type.

Cross-domain consent[#BULK_CONSENT_DOMAINS_COUNT#] [#BULK_CONSENT_TITLE#]
List of domains your consent applies to: [#BULK_CONSENT_DOMAINS#]
Cookie declaration last updated on 07.04.22 by Cookiebot


[#IABV2_TITLE#]

[#IABV2_BODY_INTRO#]
[#IABV2_BODY_LEGITIMATE_INTEREST_INTRO#]
[#IABV2_BODY_PREFERENCE_INTRO#]
[#IABV2_LABEL_PURPOSES#]
[#IABV2_BODY_PURPOSES_INTRO#]
[#IABV2_BODY_PURPOSES#]
[#IABV2_LABEL_FEATURES#]
[#IABV2_BODY_FEATURES_INTRO#]
[#IABV2_BODY_FEATURES#]
[#IABV2_LABEL_PARTNERS#]
[#IABV2_BODY_PARTNERS_INTRO#]
[#IABV2_BODY_PARTNERS#]

Cookies are small text files that can be used by websites to make a user's
experience more efficient.  The law states that we can store cookies on your
device if they are strictly necessary for the operation of this site. For all
other types of cookies, we need your permission.

This site uses different types of cookies. Some cookies are placed by
third-party services that appear on our pages.  You can at any time change or
withdraw your consent from the Cookie Declaration on our website.

Learn more about who we are, how you can contact us, and how we process personal
data in our legal guidelines. 
[#OOI_PERSONAL_INFORMATION#]
Use necessary cookies only Allow selection Customize

OK
Powered by Cookiebot by Usercentrics
Solutions
CMMCData Security on EndpointsInsider ThreatsRansomwareSource Code
Resources
BlogCase StudiesCustomersDASBData SheetsDeploymentDocumentationVideosWhite
Papers
Company
Leadership TeamNewsPartners

Free Trial




CROWDSTRIKE ACQUIRES SECURECIRCLE

Setting a new standard in endpoint-based data protection by enforcing Zero Trust
at the device, identity, and data level.
Learn More


ABOUT SECURECIRCLE

SecureCircle delivers a SaaS-based cybersecurity service that extends Zero Trust
security to data on the endpoint. At SecureCircle, we believe frictionless data
security drives business value for our customers. End users operate without
obstacles, while data is continuously secured against breaches and insider
threats. Instead of relying on complex reactive measures, we simply secure data
persistently in transit, at rest, and even in use.


USE CASES


SOURCE CODE PROTECTION

Development teams who deploy SecureCircle to protect source code are able to
keep the source code secure as it leaves code repositories and is pulled onto
developer endpoints. The code is kept transparently encrypted on the device even
while it is in-use by sanctioned IDEs and compilers. SecureCircle provides
protection against insider threats, without impacting development teams and
their tools.

Read the Whitepaper




ZERO TRUST DATA SECURITY FOR SAAS APPLICATIONS

Most modern SaaS applications allow end users to pull data out of the browser
onto the device. More often than not, end users leverage these features for
productive reasons. The challenge most businesses face with modern SaaS
applications is identifying the difference between productive activity and a
security threat. With SecureCircle, all data is kept secure as it comes out of
SaaS applications, which allows users to leverage data that comes out of these
applications, at the same time allowing businesses to retain control of their
data.

Read the Whitepaper




PROTECTION FOR USER GENERATED IP

Many of our customers tell us that intellectual property is generated on the
endpoint. Content such as architectural designs, engineering drawings, and video
content are all generated on endpoints and are of high value to the companies
that produce them. As SecureCircle is completely agnostic to file type, data
size, or application, our customers often use our solution to protect data as it
is generated on user endpoints.

Read the Case Study


WHY DO CUSTOMERS USE SECURECIRCLE?

REMOVE USERS FROM THE SECURITY PROCESS

SecureCircle transparently and persistently secures data as it leaves
applications. Data is always encrypted regardless of whether it is at rest, in
transit, or in use. At no point do users need to make decisions on what data is
important or sensitive; data is simply protected by default.

TRANSPARENT AND FRICTIONLESS TO USERS AND APPLICATIONS

When data moves onto endpoints, SecureCircle transparently encrypts the data in
a way that is invisible to both users and applications. This transparent
approach means that user behavior does not need to change, and applications do
not need to integrate in any way to take advantage of the control and security
that SecureCircle delivers.

RAPID AND SIMPLE DEPLOYMENT

Unlike many traditional solutions, SecureCircle works on a simple cloud to agent
delivery model, which means a fast and simple deployment, which allows our
customers to implement security for their most sensitive data rapidly

REDUCE COST AND COMPLEXITY

SecureCircle has a simple per user pricing model that reduces our customers’
cost. SecureCircle further reduces cost and reduces complexity by avoiding the
need for multiple products, software integrations, and ongoing security controls
administration


HOW IT WORKS


DEFINE DATA

Identify the data source, pattern, or content you want to secure as it moves to
endpoints.




SECURE DATA

SecureCircle transparently encrypts all the bytes within files you have
identified to create a common perimeter of security for data independent of
application filetype and operating system.




MOVE DATA

File data can safely move via any channels as the bytes within are always in an
encrypted state. This means data is not exposed even when is transported over
USB or public cloud storage.




CONTROL ACCESS

The secured data within files is only accessible by approved users, devices, and
processes.




MONITOR ACCESS

All interactions with secured data are logged for analytics and reporting.




REVOKE ACCESS

Once a user, device or process is no longer allowed it can never access a copy
of the data again.









OUR CUSTOMERS

“With SecureCircle, we finally have the ability to continuously manage and
protect source code after it has left our servers, something no other data
security tool delivers to us.”

CHIEF INFORMATION SECURITY OFFICER

Forescout

“Avalon Healthcare Solutions chose SecureCircle DASB as part of our layered
security approach and ‘Encrypt Everything’ initiative to protect our
unstructured data in what must be the most user-friendly approach to transparent
encryption. The SecureCircle design is powerful, allowing Avalon to define the
users, the applications, and the locations that are allowed to access our data.”

VP, SECURITY AND TECHNOLOGY OFFICER

Avalon Healthcare Solutions

“SecureCircle is the breakthrough information rights and data loss prevention
technology we were looking for.”

CHIEF SECURITY OFFICER

Inspirage


READY TO GET STARTED?

SECURE YOUR SOURCE CODE

Learn more about how SecureCircle secures Source Code for customers.


Read the Case Study

BOOK A DEMO

Secure your data in transit, at-rest and in-use. SecureCircle is simple to
deploy and no changes are necessary to your current workflow.


Book a Demo

CYBERSECURITY MATURITY MODEL CERTIFICATION

SecureCircle helps organizations meet over 40 controls and practices to obtain
Level 3 certification.


Learn More

SecureCircle is a SOC 2 Type 2 certified company.

BlogTerms of usePrivacy PolicyCookie PolicyBrand Assets+1 408-827-9100


©2021 SecureCircle All Rights Reserved. All names, logos, brands are property of
their respective owners. All company, product, and service names used are for
identification purposes only. Use of these names, logos, and brands does not
imply endorsement. SecureCircle and the SecureCircle logo are marks owned by
SecureCircle LLC and registered with the United States Patent and Trademark
Office, and in other countries.