Skip to main content
TrustRadius
SecureCircle

SecureCircle

Overview

What is SecureCircle?

SecureCircle delivers a SaaS-based cybersecurity service that extends Zero Trust security to data on the endpoint. SecureCircle believes frictionless data security drives business value; end users operate without obstacles, while data is continuously secured against breaches and insider threats. Instead…

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate Zero Trust Security Solutions Software

Be the first one in your network to review SecureCircle, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is SecureCircle?

SecureCircle delivers a SaaS-based cybersecurity service that extends Zero Trust security to data on the endpoint. SecureCircle believes frictionless data security drives business value; end users operate without obstacles, while data is continuously secured against breaches and insider threats.…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

5 people also want pricing

Alternatives Pricing

What is Hyper Private Access?

HPA is a Business VPN, or Virtual Private Network, presented as a secret, safe tunnel on the internet that companies can use to keep their online stuff private and secure.

What is Twingate?

Twingate allows businesses to secure remote access to their private applications, data, and environments, whether they are on-premise or in the cloud. Built to make the lives of DevOps teams, IT teams, and end users easier, it replaces outdated corporate VPNs which were not built to handle a world…

Return to navigation

Product Demos

SecureCircle Promotional Video

YouTube
Return to navigation

Product Details

What is SecureCircle?

SecureCircle Video

SecureCircle instantly creates an invisible virtual-perimeter that includes any device and any cloud service for files within the Circle. Organizations simply identify their important files and a set of user devices. Important data is then free to take different forms, move th...
 Show More

SecureCircle Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation