Not just what they do, but how they do it
Circleback captures meetings and delivers recaps via email. The Supernormal app runs on your desktop, capturing conversations without bots and surfacing actionable suggestions. Here's the breakdown.
How they capture
The Supernormal app runs on your desktop and uses system audio to detect when a call or meeting is happening. It captures automatically when audio is live, or you can trigger captures manually for in-person conversations. No bots or browser tabs needed.
Circleback captures meetings automatically via calendar detection. On the desktop app, it does not need a bot. You get transcripts, AI summaries, and insights to review after the call.
What they produce
Supernormal generates transcripts and summaries in the Mac app, editable and paired with action suggestions. Your meeting context then syncs to the web app, where agents can produce client deliverables – decks, spreadsheets, images, copy, and more.
Circleback generates concise AI summaries of your meetings and delivers them via email or notifications. The summaries are designed for quick review and basic recall. You get the highlights, but limited context for completing actual work.
How you follow up
Supernormal identifies follow-ups and drafts them with you, then opens them in Gmail, Slack, or Linear for quick sending. Need other work done? The web app's agents can handle presentations, research briefs, and more.
Circleback can draft follow-up emails using its meeting assistant based on conversation context. You can set up automations to generate emails after meetings, but you need to copy the draft and send it from your email client.
Circleback reminds you what was said. Supernormal helps you act on it with meeting summaries, suggested next steps, and agents that complete deliverables.
Enterprise-grade security standards
Supernormal is built with security at its core. We follow industry standards such as SOC2, encrypt data both in transit and at rest, enforce strict access controls, and maintain secure, automated backups — so your information stays protected, reliable, and accessible at all times.

SOC2
Stop digging through notes. Automatically draft and update from key points discussed in your meetings.ent
Encryption
Data in-transit is encrypted using TLS 1.2+ and at-rest using the industry standard AES-256 algorithm.
Access and Permissions
All content has permission rights and authentication requirements, enabling you to safely share your content.
Automatic and Secure Backups
Content is automatically and securely stored through cloud backups with advanced encryption and robust storage protocols.










