How to protect data when a device is lost or stolen? SecureCircle transparently protects data ensuring end users do not have to change their workflow. SecureCircle works with any file type, file size, application, and does not rename or change the file extension.
Customers ensures data is protected when a device is lost or stolen by following three simple steps.
1. SecureCircle must be installed and active on every device.
2. All confidential and internal data must be protected.
3. Educate employees to report lost or stolen devices to IT/Security as soon as possible. When a device is lost or stolen, employees notify IT/Security that the device is no longer in their physical possession. IT admin will remove the device from all associated Circles. IT admin reviews logs to determine what data was accessed from the time the device was lost. While ensuring a login credential is required after reboot and sleep, security cannot assume the device wasn’t stolen at a time when the device was already logged info. An employee working at a local Starbucks gets up and walks away for a minute. If the device is stolen while already logged in, the password is no longer a defense mechanism. Thieves can try brute force password attacks to gain access to the devices. Even if the device were to lock after a specified number of failed login attempts, the thieves have physical access to the device. They can remove the storage device and try mounting on another machine. If a disk encryption solution is deployed, the thieves have one master password to crack to gain access to all the data. With SecureCircle each file has a unique encryption key. A brute force attack would take hundreds of years with a super computer to break.
SecureCircle secures data for the lost or stolen device case while not impacting end user or business workflow. Customers have stopped deploying full disk encryption as SecureCircle achieves the same protections as full disk encryption with the additional benefits of granular file level access control and individual encryption keys per file instead of a single key for the device.
Additionally, SecureCircle is able to control application level permissions to ensure secured data is not being accessed by unwanted or unknown applications which is a common source of data loss.
SecureCircle’s Data Access Security Broker (DASB) delivers a SaaS-based cybersecurity service that extends Zero Trust security to data on the endpoint. At SecureCircle, we believe frictionless data security drives business value for our customers. Instead of relying on complex reactive measures, we simply secure data persistently in transit, at rest, and even in use. End users operate without obstacles, while data is continuously secured against breaches and insider threats.