Once customers understand the values of SecureCircle, their attention focuses on implementation. This guide covers SecureCircle’s recommended deployment process. The deployment consists of three steps that map to our crawl, walk, run philosophy for success.
Deploy SecureCircle Agents
Organizations start deploying the SecureCircle agents to all devices that may be authorized to access secured data in the future. This process should be similar to how the organization installs and updates antivirus, EDR (Endpoint Detection Response), or any other software application. Agents are available for Microsoft Windows, Apple MacOS & iOS, Linux, and Android.
Customers deploy using MDM (Mobile Device Management) tools such as Microsoft Intune, Jamf, and VMware Workspace ONE to deploy agents. Customers can use any provisioning tools including Windows GPO (Group Policy Objects) or email.
SecureCircle recommends deploying a few agents initially and checking for compatibility with other security solutions during this stage. Occasionally, customer will need to add SecureCircle to the allowed exception list for antivirus or EDR solutions. Check the SecureCircle documentation website for additional details.
Identify Initial Data Set and Monitor
Once the SecureCircle agents are installed, initial data sets are identified and ingested in order to monitor workflows and application usage. Customers can add additional data sets to monitor at any time.
Customers should configure their SIEM (Security Information and Event Management) or log reporting tool at this time to collect all the monitoring data such as:
The initial data sets can be:
During this stage, the SecureCircle agent will secure the data in the initial data set, but data will be allowed to egress off the device without security. All applications will be enabled to access secured data. SecureCircle will log all access to secured data into reports viewable in a SIEM such as Splunk.
The SIEM reports will show interaction with the initial secured data set by users, devices, applications, and more. Reports will show many files SecureCircle was able to detect PII, PHI, PCI. The goal of this step is to monitor and collect data.
Finally, organizations will enable their security policies based on the data collected in during the walk stage. Organizations can roll policies out in phases or all at once. Apply security policies to users, devices, data sources, data types, applications, networks, and more. Examples below:
Employees will continue their work without any change to their workflow.
Deploying legacy DLP takes months to set up and requires significant resources to upkeep. With SecureCircle, companies see value within days or weeks. Since SecureCircle’s security is transparent, there is no training needed for employees. Ongoing maintenance doesn’t require creating new and updating existing DLP rules. SecureCircle policies only need to change when data egress policies need to change. SecureCircle Zero Trust data security for endpoints doesn’t impact users and workflows and protects data by default.
Learn more about how SecureCircle secures Source Code for customers.
Secure your data in transit, at-rest and in-use. SecureCircle is simple to deploy and no changes are necessary to your current workflow.
SecureCircle helps organizations meet over 40 controls and practices to obtain Level 3 certification.