11:12 AM
Dark Reading
Dark Reading
Products and Releases

Silent Circle Announces New Service Bundles

Apps include Silent Phone for secure mobile voice and video calls

WASHINGTON, D.C. – September 9, 2013 – Silent Circle, the global encrypted communications firm revolutionizing mobile device security for organizations and individuals alike, today announced new bundled service offerings for customers turning to the company's unique peer-to-peer encryption platform as a secure alternative to traditional calling, mobile messaging and file transfer tools susceptible to escalating privacy threats. The new bundle options help businesses, government agencies and individuals in Silent Circle's fast-growing customer segments secure their preferred means of communication, from mobile calling and messaging to desktop videoconferencing.

"As demand for our service increases daily, we have updated our service offerings with new bundle options to accommodate customers' secure communications priorities – offering easy to use apps that enable peer-to-peer encrypted calling, messaging and file transfer on employees' smartphones and tablets," said Silent Circle Chief Revenue Officer Spencer Snedecor. "Nearing our first full year of operation as the trusted provider of private and secure communications services, our business continues to experience explosive growth as we meet the urgent privacy needs of demanding users in over 100 countries, including government agencies and Fortune 500 & FTSE 100 leaders across defense, manufacturing, aerospace, energy, finance, media, healthcare and many other sectors worldwide."

To ensure complete privacy, Silent Circle's comprehensive set of peer-to-peer encrypted apps and services never log user metadata and manage encryption keys exclusively on users' devices. These apps include Silent Phone for secure mobile voice and video calls, Silent Text for encrypted mobile messaging with attachments up to 100MB and "Burn Notice" auto-delete protection and encrypted voice and videoconferencing on Windows PCs through Silent Phone for Desktop. Options in Silent Circle's service bundles include Out-Circle Access, which lets Silent Phone users place calls to conventional phone numbers* and the Silent Circle Management Console, a secure Web portal letting customers rapidly purchase, organize and disseminate Silent Circle's apps for employees' devices. The new bundles include:

Silent Circle Mobile (for business and personal use)

Silent Phone and Silent Text for $9.95/month or $99.95/year, per subscriber

Optional Out-Circle Access for an additional $23.95/month or $249.95/year, per subscriber

Silent Circle Enterprise (for business use only)

Silent Circle Mobile with Silent Circle Management Console for $139.95/year, per subscriber

Optional Out-Circle Access for an additional $249.95/year, per subscriber

Optional Silent Circle Desktop for an additional $69.95/year, per subscriber

Silent Circle Desktop (for business and personal use)

Silent Phone for Desktop for Windows PCs for $69.95/year

"Greater awareness of privacy threats and business losses linked to global surveillance is prompting more organizations to pull back from vulnerable communications mediums and seek alternatives that are inherently more secure, enterprise-ready and flexible enough to cover corporate and employee-owned devices," Snedecor continued. "Anticipating these demands, our breakthrough peer-to-peer encrypted platform protects a host of executives' and officials' private communications through the devices they already carry without the need for additional infrastructure, IT overhead costs or usability trade-offs."

*Currently limited to PSTN calls in U.S., Canada and Puerto Rico.


Silent Circle is a global encrypted communications service headquartered in Washington D.C. providing a revolutionary peer-to-peer platform for encrypted voice, video, text and file transfer on mobile devices via a secure, proprietary network, software and mobile apps. Silent Circle was co-founded by Mike Janke, former Navy SEAL and best-selling author and Phil Zimmermann, the world famous Silicon Valley creator of Internet encryption for voice and data and 2012 inductee into the Internet Hall of Fame. For more on Silent Circle, go to:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
Most Malware Arrives Via Email
Dark Reading Staff 10/11/2018
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2018-10-15
Teltonika RUT9XX routers with firmware before 00.04.233 provide a root terminal on a serial interface without proper access control. This allows attackers with physical access to execute arbitrary commands with root privileges.
PUBLISHED: 2018-10-15
NoMachine before 5.3.27 and 6.x before 6.3.6 allows attackers to gain privileges via a Trojan horse wintab32.dll file located in the same directory as a .nxs file, as demonstrated by a scenario where the .nxs file and the DLL are in the current working directory, and the Trojan horse code is execute...
PUBLISHED: 2018-10-15
Stored XSS has been discovered in version 1.0.12 of the LUYA CMS software via /admin/api-cms-nav/create-page.
PUBLISHED: 2018-10-15
In the 2.4 version of Camaleon CMS, Stored XSS has been discovered. The profile image in the User settings section can be run in the update / upload area via /admin/media/upload?actions=false.
PUBLISHED: 2018-10-15
Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges.