Circle Deployment Best Practices
  • 26 Mar 2021
  • 1 Minute to read
  • Dark
  • PDF

Circle Deployment Best Practices

  • Dark
  • PDF

What is a Circle?

A Circle is a collection of devices and users with access to a set of data governed by policies. Files, Users, and Devices can be added or removed from the Circle at any time. An employee lost their laptop? Remove the device from the Circle, and the computer will no longer have access to any of the protected files stored within it.

A Circle is similar to a centralized file server with permissions for users and devices. A Circle doesn't limit the location of the files to a central location. Store secured files anywhere, including file servers, endpoints, portable storage, and cloud storage. Regardless of location, the secured files retain their security permissions. Only users and devices within the Circle can access the data within a file.

How many Circles do I need?

SecureCircle recommends starting the deployment with one Circle to keep all internal data within the company. Deploying SecureCircle with one Circle meets compliance requirements for data protection, such as GDPR (General Data Protection Regulation) and CCPA (California Consumer Privacy Act). Access control mapping is straightforward. The entire company is a member of the one Circle.

One Circle will keep companies in compliance and assure company-internal data will not leave. For many companies, the one Circle deployment is the final state.

The limitation of the one Circle is internal segregation. If companies need to segregate data internally, multiple Circles will be required.

Some common business reasons to segregate data internally:

  • Keep functional data such as Sales, Finance, HR, Engineering in separate Circles.
  • Keep competitive customer data separate. Such as working on media advertising campaigns for both Coke and Pepsi. The customers may want to be assured internal employees cannot share data with other employees working on the competitive project.

Multiple Circles will prevent accidental and malicious sharing of data between users in different Circles.

Access control mapping is typically the same as existing Active Directory groups such as HR, Finance, Customer1 (Coke), Customer2 (Pepsi). Map the existing AD groups to the appropriate Circle.

SecureCircle Circle Deployment Best Practices


Users can be members of multiple Circles
Data (Files) can only be a member of one Circle

Was this article helpful?