Connected Circles of Trust is an enterprise application that provide file based protection. It enables the protection of high value data regardless of whether it is at rest or in motion. It is an easy to use security solution that allows end users to create a trusted group of people for simple and secure sharing. Encryption follows the data wherever it goes whether on an email, USB or sitting on someones desktop - only people in the Circle can access the file. Connected Circles of Trust is available as a managed enterprise version. It supports mobile devices and are compatible with all major cloud devices. Threat models that Connected Circles of Trust addresses include: external hackers, lost or stolen devices, and accidental data exposure.