Silent Circle is an encrypted communications firm based in Fairfax, Virginia. Silent Circle provides multi-platform secure communication services for mobile devices and desktop. Launched October 16, 2012, the company operates under a subscription business model. The encryption part of the software used is free software/open source and peer-reviewed. For the remaining parts of Silent Phone and Silent Text, the source code is available on GitHub, but under proprietary software licenses.

Wikipedia
Silent Circle
Silent Circle
Blog Post
  • As originally reported in ZDNet, in a letter to United States Sen. Ron Wyden (D-Oregon), DHS official Christopher Krebs acknowledged that the DHS National Protection and Programs Directorate (NPPD) “has observed anomalous activity in the National Capital Region (NCR) that appears to be consistent with International Mobile Subscriber Identity (IMSI) catchers.” Krebs went on to […] The post Homeland...

Silent Circle
Silent Circle
Blog Post
  • When it comes to cybersecurity threats, the size and complexity of this growing problem is enormous. Ignoring it is akin to going out in a downpour without an umbrella and hoping you’ll stay dry. Here are some statistics that convey the scope of this issue: $6 trillion – Estimated cost of cybercrime damages projected for […] The post Risk Management And Next-Generation Firewalls: Detection Vs. Pro...

Silent Circle
Silent Circle
Blog Post
  • Now more than ever, enterprises are under pressure to think about how data is collected, handled, stored and transmitted. Effective May 2018, an organization failing to meet the General Data Protection Regulation (GDPR) could face fines of up to €10 million. GDPR was intended to strengthen data protection for people within the European Union (EU), […] The post GDPR, Security And Privacy By Design ...

Silent Circle
Silent Circle
Blog Post
  • In March 2018, Silent Circle was named a finalist for the prestigious Cyber Defense Magazine Awards. Each year, the editors at Cyber Defense Magazine spend many months seeking out and reviewing companies in the information security space. This year, nearly 3,000 companies were reviewed from all parts of the world. They ranged from large, well-known […] The post Silent Circle Is A Finalist For The ...

Silent Circle
Silent Circle
Blog Post
  • At the 14th annual Info Security Products Guide Global Excellence Awards in San Francisco, California, Silent Circle was honored with awards for excellence for cutting-edge cybersecurity products and services. Silent Circle’s GoSilent mobile VPN was named the Gold Winner for the Best Security Hardware Product category as well as for the Wireless, Mobile, or Portable […] The post Silent Circle Wins...

Silent Circle
Silent Circle
Blog Post
  • Today, there are an estimated 23.14 billion connected devices online. By 2025, that number is expected to expand to 75.44 billon. According to PwC, $6T will be spent on IoT solutions between 2015 and 2020. Every industry enjoys the operational advantages of the Internet of Things (IoT), but the security danger is not even close […] The post Has The IoT Explosion Made It Impossible To Stay Secure? ...

Silent Circle
Silent Circle
Blog Post
  • Owned and produced by the Consumer Technology Association (CTA), the annual CES Conference and Tradeshow was held in Las Vegas, Nevada in January and featured the latest, next-generation breakthroughs of both business and consumer technologies. The buzz around home assistant devices such as Amazon Alexa and Apple HomePod brought related technologies with a large presence […] The post Technology In...

Silent Circle
Silent Circle
Blog Post
  • In a recent article for Medium, Joshua Konowe, Chief Marketing & Strategy Officer of Silent Circle, addresses the implications of the recent ban on personal devices at the White House. In January of this year, White House press secretary Sarah Sanders told members of the press that both employees and White House visitors would be […] The post Implications Of The BYOD Ban In The White House appeare...

Silent Circle
Silent Circle
Blog Post
  • Security firms sometimes find themselves caught in a tug of war between client security and compliance with government or regulatory agencies. We caught up with Lori Rangel, Silent Circle’s Director of Products, to get her take on the current state of affairs. How do you see the current security and compliance landscape? While the goal […] The post Balancing Compliance and Governance With Encrypti...

Silent Circle
Silent Circle
Blog Post
  • Recently, ABI Research and Silent Circle collaborated on a project to research and produce a guide to help chief information security officers secure their enterprise communications. The CISO’s Guide To Securing Enterprise Communications addresses the exponential expansion of the use of digital devices and the challenges that come with ensuring that those devices are secure. […] The post CISO’s Gu...

Silent Circle
Silent Circle
Blog Post
  • In February 2018, GoSilent, a portable firewall and VPN device that prevents data compromise and communication hacks on connected devices from anywhere in the world, was nominated and named a finalist for the Cybersecurity Excellence Awards in the category of mobile security. The annual awards are produced by Cybersecurity Insiders in partnership with the Information […] The post GoSilent Is A Fin...

Silent Circle
Silent Circle
Blog Post
  • Bug bounty programs are crowdsourcing initiatives that reward experienced independent researchers for identifying and reporting on bugs or vulnerabilities in technology and software programs. In 2014, Silent Circle became the first mobile security company to introduce a bug bounty program when it announced that it would pay a reward per bug identified for its Blackphone […] The post The Importance...

Silent Circle
Silent Circle
Blog Post
  • This is a quick update to let everyone using Silent Phone for Android, iOS, Accounts Web and Silent Manager know that Silent Phone is now translated into Spanish and German.  If you speak Spanish or German, or others on your staff do, the system has been localized to meet those needs. Please check for the […] The post Now Available In Spanish And German – Ja! Sí! appeared first on Silent Circle.

Silent Circle
Silent Circle
Blog Post
  • “I’d rather talk about this on the phone. It’s safer.” If you’ve ever said this, you could be exposing your enterprise to a huge security risk. The reality is, modern chat and email communications are often more secure than traditional voice communications. Keep reading to learn more about the vulnerabilities of traditional voice communications and […] The post Should Voice Be Secure By Default? a...

Silent Circle
Silent Circle
Blog Post
  • Yesterday, researchers from Google exposed two vulnerabilities, known as “Meltdown” and “Spectre”, that affect nearly every modern computer across the globe. These bugs allow programs to steal any data that is being processed or saved on the computer, including passwords and sensitive personal information. Both of these attacks make use of a modern CPU architecture […] The post Blackphone 2 Evades...

Silent Circle
Silent Circle
Blog Post
  • For the past 18 years, the Last Gadget Standing Competition has been a much-anticipated event for Consumer Electronics Show (CES) attendees. In advance of the show, judges evaluate the nominated products for innovation and broad appeal and select ten finalists. This year, Silent Circle’s newest product offering – GoSilent – has been selected as a […] The post GoSilent Competes As Finalist In 2018 ...

Silent Circle
Silent Circle
Blog Post
  • Effective mobile security for federal agencies continues to be one of the biggest challenges that federal enterprises face today. In an official announcement on December 14, 2017, Silent Circle, a leader in enterprise mobile security and compliance, and WidePoint Corporation, a leading provider of Trusted Mobility Management (TM2) and cybersecurity solutions, launched a new partnership […] The pos...

Silent Circle
Silent Circle
Blog Post
  • On October 20, 2017, Silent Circle’s Chief Marketing & Strategy Officer, Joshua Konowe, led a session entitled “Rethinking Security” at the Unleashing Innovation in Cyber Security 2017 Summit in Amsterdam. Konowe’s presentation highlighted many of the data security and privacy concerns facing enterprises today. Here are some comments from the delegates in response to Konowe’s […] The post Silent C...

Silent Circle
Silent Circle
Blog Post
  • Silent Circle is pleased to announce the newest member of its team, Karen Milligan, a high-energy business developer who is committed to offering customers business solutions that will help their organizations thrive. With more than a decade of sales experience for both enterprise data security companies and online communication platform businesses, Milligan will be in […] The post Introducing Sil...

Silent Circle
Silent Circle
Blog Post
  • On November 3, 2017, GoSilent, one of Silent Circle’s newest cybersecurity solutions, was featured in an article in the digital version of Inc. Magazine. The article in Inc. Magazine highlighted nine of the newest, most innovative tech gadget gift ideas for the most devoted tech fans. Excerpt from Inc. Magazine: Surf safely: GoSilent is a […] The post GoSilent Featured In Inc. Magazine’s Hottest T...

Silent Circle
Silent Circle
Blog Post
  • The 12th Annual Cybersecurity Conference for the Oil & Natural Gas Industry will be held November 7-8, 2017 in Woodlands, Texas. The conference provides an opportunity for IT, corporate security and data privacy professionals to learn more about state-of-the-art practices and leading edge technology for securing their organization’s intellectual property, private communications and data warehouse....

Silent Circle
Silent Circle
Blog Post
  • The Unleashing Innovation in Cyber Security 2017 Summit will be held October 19-20, 2017 in Amsterdam. Threats from cyber criminals have never been so sophisticated or so prevalent. The Summit aims to provide organizations from all industries with innovative strategies and techniques, in order to help them stay ahead of constantly evolving cyber threats. Speakers […] The post Silent Circle To Pres...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.