Silent Circle SA is an encrypted communications firm based in Le Grand-Saconnex, Switzerland. Silent Circle provides multi-platform secure communication services for mobile devices and desktop. Launched October 16, 2012, the company operates under a subscription business model. The encryption part of the software used is free software/open source and peer-reviewed. For the remaining parts of Silent Phone and Silent Text, the source code is available on GitHub, but under proprietary software licenses.

Wikipedia
Silent Circle
Silent Circle
Blog Post
  • The Internet of Things (IoT) for the healthcare sector was worth $60 billion in 2014, and is estimated to reach a net worth $136 billion by 2021. Today, a typical hospital utilizes hundreds of connected devices including implantables, wearables, monitors, workflow, imaging and patient data systems. These touchpoints offer several advantages for better patient care; […] The post Medical IoT Device ...

Silent Circle
Silent Circle
Blog Post
  • Silent Circle will exhibit at InfoSecurity Europe in Olympia London on June 5-7, 2018. InfoSecurity Europe is one of Europe’s most notable information security events. This comprehensive information technology conference features more than 400 exhibitors from around the world and showcases the newest and most innovative information security solutions for information security professionals and doze...

Silent Circle
Silent Circle
Blog Post
  • Can you identify your most sensitive call or meeting? It is when your board convenes. Mergers and acquisitions, financial results, product roadmaps, pricing discussions and most key strategic initiatives are discussed either in person or on the phone. Is this an opportunity for a bad actor or a state-sponsored attack to take place…. Absolutely! A […] The post An Open Message To CISOs: What Is Your...

Silent Circle
Silent Circle
Blog Post
  • Silent Circle recently announced the release the GoSilent Server, which provides an alternate deployment and additional security for the GoSilent, Silent Circle’s Silent Circle’s portable integrated firewall, Top Secret Level VPN with Wi-Fi and threat analytics database. The GoSilent Server is the latest in  high-grade security solutions developed to help enterprises and government entities protec...

Silent Circle
Silent Circle
Blog Post
  • During the 2018 RSA Conference held in San Francisco, California, Francis Knott, VP of Business Development with Silent Circle, was interviewed by the HelpNet Security Podcast. In the interview, he discussed the state of the current security landscape, as well as news of federal agencies being compromised by Stingrays and highlighted some of Silent Circle’s […] The post Francis Knott, VP Of Busine...

Silent Circle
Silent Circle
Blog Post
  • We are pleased to announce that our CTO, Hamilton Turner, will present at the 2018 FinCyberSec event, hosted by the Stevens Institute of Technology in partnership with the New Jersey Chapter of the Information Systems Audit and Controls Association (ISACA), and with the support of the CME Group Foundation. The one-day conference will discuss the […] The post Hamilton Turner, CTO, to Speak at FinCy...

Silent Circle
Silent Circle
Blog Post
  • Imagine a life threatening situation in a large urban center, and you need to call 911 fast. You dial, wait… and nothing. This may have happened to 911 callers in Baltimore when a ransomware attack recently crippled emergency call operations. The city had to resort to manual resources to manage calls until the problem was […] The post Local Police Department 911 Lines Being Hacked appeared first o...

Silent Circle
Silent Circle
Blog Post
  • According to a survey conducted by the IHS Markit Video Surveillance Group, some 98 million network surveillance cameras were shipped in 2017 along with almost 30 million HD CCTV (high-definition closed-circuit television) cameras. These impressive numbers are likely no surprise: Video surveillance equipment is everywhere. In parking lots, hospitals, shopping malls, local businesses such as […] Th...

Silent Circle
Silent Circle
Blog Post
  • The Facebook – Cambridge Analytica fiasco may have grabbed headlines, but in reality this is but one example of the data misuse and data privacy issues that are currently impacting nearly every industry sector. Consider for a moment, the potential impact of a cyberattack on a federal government agency. In the face of ever-evolving sophisticated […] The post Data Privacy & Federal Government Priori...

Silent Circle
Silent Circle
Blog Post
  • Fortunately, Silent Circle has been GDPR compliant from the start. Call it luck, good fortune or great insight, since our inception six years ago, Silent Circle has led the privacy crusade with our Silent Phone application. What is GDPR? The General Data Protection Regulation (GDPR) is a legal framework that sets guidelines for the collection […] The post Privacy Becomes Law – Hello GDPR appeared ...

Silent Circle
Silent Circle
Blog Post
  • Silent Circle’s GoSilent portable firewall and VPN was named a 2018 InfoSec winner in the category of Most Innovative Wireless, Mobile or Portable Device Security. GoSilent was recognized for its easy portability and unique ability to encrypt all data before it reaches the Internet. This product negates any concerns about in-transit data loss and protecting […] The post Silent Circle Wins 2018 Cyb...

Silent Circle
Silent Circle
Blog Post
  • As originally reported in ZDNet, in a letter to United States Sen. Ron Wyden (D-Oregon), DHS official Christopher Krebs acknowledged that the DHS National Protection and Programs Directorate (NPPD) “has observed anomalous activity in the National Capital Region (NCR) that appears to be consistent with International Mobile Subscriber Identity (IMSI) catchers.” Krebs went on to […] The post Homeland...

Silent Circle
Silent Circle
Blog Post
  • When it comes to cybersecurity threats, the size and complexity of this growing problem is enormous. Ignoring it is akin to going out in a downpour without an umbrella and hoping you’ll stay dry. Here are some statistics that convey the scope of this issue: $6 trillion – Estimated cost of cybercrime damages projected for […] The post Risk Management And Next-Generation Firewalls: Detection Vs. Pro...

Silent Circle
Silent Circle
Blog Post
  • Now more than ever, enterprises are under pressure to think about how data is collected, handled, stored and transmitted. Effective May 2018, an organization failing to meet the General Data Protection Regulation (GDPR) could face fines of up to €10 million. GDPR was intended to strengthen data protection for people within the European Union (EU), […] The post GDPR, Security And Privacy By Design ...

Silent Circle
Silent Circle
Blog Post
  • In March 2018, Silent Circle was named a finalist for the prestigious Cyber Defense Magazine Awards. Each year, the editors at Cyber Defense Magazine spend many months seeking out and reviewing companies in the information security space. This year, nearly 3,000 companies were reviewed from all parts of the world. They ranged from large, well-known […] The post Silent Circle Is A Finalist For The ...

Silent Circle
Silent Circle
Blog Post
  • At the 14th annual Info Security Products Guide Global Excellence Awards in San Francisco, California, Silent Circle was honored with awards for excellence for cutting-edge cybersecurity products and services. Silent Circle’s GoSilent mobile VPN was named the Gold Winner for the Best Security Hardware Product category as well as for the Wireless, Mobile, or Portable […] The post Silent Circle Wins...

Silent Circle
Silent Circle
Blog Post
  • Today, there are an estimated 23.14 billion connected devices online. By 2025, that number is expected to expand to 75.44 billon. According to PwC, $6T will be spent on IoT solutions between 2015 and 2020. Every industry enjoys the operational advantages of the Internet of Things (IoT), but the security danger is not even close […] The post Has The IoT Explosion Made It Impossible To Stay Secure? ...

Silent Circle
Silent Circle
Blog Post
  • Owned and produced by the Consumer Technology Association (CTA), the annual CES Conference and Tradeshow was held in Las Vegas, Nevada in January and featured the latest, next-generation breakthroughs of both business and consumer technologies. The buzz around home assistant devices such as Amazon Alexa and Apple HomePod brought related technologies with a large presence […] The post Technology In...

Silent Circle
Silent Circle
Blog Post
  • In a recent article for Medium, Joshua Konowe, Chief Marketing & Strategy Officer of Silent Circle, addresses the implications of the recent ban on personal devices at the White House. In January of this year, White House press secretary Sarah Sanders told members of the press that both employees and White House visitors would be […] The post Implications Of The BYOD Ban In The White House appeare...

Silent Circle
Silent Circle
Blog Post
  • Security firms sometimes find themselves caught in a tug of war between client security and compliance with government or regulatory agencies. We caught up with Lori Rangel, Silent Circle’s Director of Products, to get her take on the current state of affairs. How do you see the current security and compliance landscape? While the goal […] The post Balancing Compliance and Governance With Encrypti...

Silent Circle
Silent Circle
Blog Post
  • Recently, ABI Research and Silent Circle collaborated on a project to research and produce a guide to help chief information security officers secure their enterprise communications. The CISO’s Guide To Securing Enterprise Communications addresses the exponential expansion of the use of digital devices and the challenges that come with ensuring that those devices are secure. […] The post CISO’s Gu...

Silent Circle
Silent Circle
Blog Post
  • In February 2018, GoSilent, a portable firewall and VPN device that prevents data compromise and communication hacks on connected devices from anywhere in the world, was nominated and named a finalist for the Cybersecurity Excellence Awards in the category of mobile security. The annual awards are produced by Cybersecurity Insiders in partnership with the Information […] The post GoSilent Is A Fin...

Silent Circle
Silent Circle
Blog Post
  • Bug bounty programs are crowdsourcing initiatives that reward experienced independent researchers for identifying and reporting on bugs or vulnerabilities in technology and software programs. In 2014, Silent Circle became the first mobile security company to introduce a bug bounty program when it announced that it would pay a reward per bug identified for its Blackphone […] The post The Importance...

Silent Circle
Silent Circle
Blog Post
  • This is a quick update to let everyone using Silent Phone for Android, iOS, Accounts Web and Silent Manager know that Silent Phone is now translated into Spanish and German.  If you speak Spanish or German, or others on your staff do, the system has been localized to meet those needs. Please check for the […] The post Now Available In Spanish And German – Ja! Sí! appeared first on Silent Circle.

Silent Circle
Silent Circle
Blog Post
  • “I’d rather talk about this on the phone. It’s safer.” If you’ve ever said this, you could be exposing your enterprise to a huge security risk. The reality is, modern chat and email communications are often more secure than traditional voice communications. Keep reading to learn more about the vulnerabilities of traditional voice communications and […] The post Should Voice Be Secure By Default? a...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.