The Circle of Trust is essentially a user-defined perimeter to draw the lines around which data may be shared, and with whom it may be shared.  Implementing a multi-tiered approach within the Circle of Trust, allows for maximum flexibility with varying degrees of trust for accessibility to shared network resources. Regardless of a tool’s particular function, or where that tool sits within the Circle of Trust, it is increasingly imperative for organizations to implement a comprehensive, multi-tiered approach to secure their IT environments.