11:12 AM
Dark Reading
Dark Reading
Products and Releases

Silent Circle Announces New Service Bundles

Apps include Silent Phone for secure mobile voice and video calls

WASHINGTON, D.C. – September 9, 2013 – Silent Circle, the global encrypted communications firm revolutionizing mobile device security for organizations and individuals alike, today announced new bundled service offerings for customers turning to the company's unique peer-to-peer encryption platform as a secure alternative to traditional calling, mobile messaging and file transfer tools susceptible to escalating privacy threats. The new bundle options help businesses, government agencies and individuals in Silent Circle's fast-growing customer segments secure their preferred means of communication, from mobile calling and messaging to desktop videoconferencing.

"As demand for our service increases daily, we have updated our service offerings with new bundle options to accommodate customers' secure communications priorities – offering easy to use apps that enable peer-to-peer encrypted calling, messaging and file transfer on employees' smartphones and tablets," said Silent Circle Chief Revenue Officer Spencer Snedecor. "Nearing our first full year of operation as the trusted provider of private and secure communications services, our business continues to experience explosive growth as we meet the urgent privacy needs of demanding users in over 100 countries, including government agencies and Fortune 500 & FTSE 100 leaders across defense, manufacturing, aerospace, energy, finance, media, healthcare and many other sectors worldwide."

To ensure complete privacy, Silent Circle's comprehensive set of peer-to-peer encrypted apps and services never log user metadata and manage encryption keys exclusively on users' devices. These apps include Silent Phone for secure mobile voice and video calls, Silent Text for encrypted mobile messaging with attachments up to 100MB and "Burn Notice" auto-delete protection and encrypted voice and videoconferencing on Windows PCs through Silent Phone for Desktop. Options in Silent Circle's service bundles include Out-Circle Access, which lets Silent Phone users place calls to conventional phone numbers* and the Silent Circle Management Console, a secure Web portal letting customers rapidly purchase, organize and disseminate Silent Circle's apps for employees' devices. The new bundles include:

Silent Circle Mobile (for business and personal use)

Silent Phone and Silent Text for $9.95/month or $99.95/year, per subscriber

Optional Out-Circle Access for an additional $23.95/month or $249.95/year, per subscriber

Silent Circle Enterprise (for business use only)

Silent Circle Mobile with Silent Circle Management Console for $139.95/year, per subscriber

Optional Out-Circle Access for an additional $249.95/year, per subscriber

Optional Silent Circle Desktop for an additional $69.95/year, per subscriber

Silent Circle Desktop (for business and personal use)

Silent Phone for Desktop for Windows PCs for $69.95/year

"Greater awareness of privacy threats and business losses linked to global surveillance is prompting more organizations to pull back from vulnerable communications mediums and seek alternatives that are inherently more secure, enterprise-ready and flexible enough to cover corporate and employee-owned devices," Snedecor continued. "Anticipating these demands, our breakthrough peer-to-peer encrypted platform protects a host of executives' and officials' private communications through the devices they already carry without the need for additional infrastructure, IT overhead costs or usability trade-offs."

*Currently limited to PSTN calls in U.S., Canada and Puerto Rico.


Silent Circle is a global encrypted communications service headquartered in Washington D.C. providing a revolutionary peer-to-peer platform for encrypted voice, video, text and file transfer on mobile devices via a secure, proprietary network, software and mobile apps. Silent Circle was co-founded by Mike Janke, former Navy SEAL and best-selling author and Phil Zimmermann, the world famous Silicon Valley creator of Internet encryption for voice and data and 2012 inductee into the Internet Hall of Fame. For more on Silent Circle, go to:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
It Takes an Average of 3 to 6 Months to Fill a Cybersecurity Job
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/12/2019
763M Email Addresses Exposed in Latest Database Misconfiguration Episode
Curtis Franklin Jr., Senior Editor at Dark Reading,  3/11/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: LOL  Hope this one wins
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-03-18
An unquoted search path vulnerability was identified in Lenovo Dynamic Power Reduction Utility prior to version that could allow a malicious user with local access to execute code with administrative privileges.
PUBLISHED: 2019-03-18
Five9 Agent Desktop Plus 10.0.70 has Incorrect Access Control (issue 2 of 2).
PUBLISHED: 2019-03-17
Phamm (aka PHP LDAP Virtual Hosting Manager) 0.6.8 allows XSS via the login page (the /public/main.php action parameter).
PUBLISHED: 2019-03-15
CircuitWerkes Sicon-8, a hardware device used for managing electrical devices, ships with a web-based front-end controller and implements an authentication mechanism in JavaScript that is run in the context of a user's web browser.
PUBLISHED: 2019-03-15
An Integer overflow vulnerability exists in the batchTransfer function of a smart contract implementation for CryptoBotsBattle (CBTB), an Ethereum token. This vulnerability could be used by an attacker to create an arbitrary amount of tokens for any user.