Our Enterprise Privacy Platform is born from a
strong set of beliefs and built on a fundamentally
different mobile-first architecture designed by some
of the best minds in mobile technology, encryption,
security and privacy. Doing whatever it takes to
protect your business. That’s what we do.
In accordance with encryption best practices, we don’t hold or have access to the keys that encrypt our customers’ private communications data whenever possible. Accordingly, our secure communications products use “peer-to-peer” encryption. Any conversation, video, text, or video teleconference is encrypted from your device to the other party’s.
Silent Circle believes strongly in transparency. And because we value and encourage community input and review of our systems and services, Silent Circle hosts a bug bounty program for reporting qualifying security vulnerabilities.
At Silent Circle, we maintain a strict no backdoor policy. The encryption keys to private communications remain in your hands and your hands alone. Your enterprise stays at the highest level of security at all times.
Designed by the best minds in mobile technology, encryption, security and privacy, our fundamentally different technology sets the standard for enterprise privacy in today’s mobile-first world.
Enterprise mobile security should work silently and effectively in the background. It should also amplify business opportunities. Our devices and services focus on keeping your data secure at all times while simultaneously providing for the free flow of business communication. A pioneering “mobile first” vision of technology is present in all our offerings. Silent Circle maintains an industry leadership position in the rapidly changing world of mobile communications security.
When a Silent Circle subscriber makes a phone call or video chats with another Silent Circle member, that transmission is secured and encrypted end-to-end on our crystal-clear secure network. ZRTP provides true peer-to-peer key negotiation and management for secure VOIP communication.
ZRTP is a cryptographic key-agreement protocol to negotiate the keys for encryption between end points in a Voice over Internet Protocol (VoIP) call. ZRTP uses Diffie–Hellman key exchange and the Secure Real-time Transport Protocol (SRTP) for encryption.
ZRTP stands for “Zimmermann Real-time Transport Protocol” and was developed by Silent Circle’s own, Phil Zimmermann. This proprietary technology has perfect forward secrecy, meaning the keys are destroyed at the end of the call. This fully prevents compromising the call contents at a later date even if key material is somehow disclosed.
- End-to-end encryption.
- Enhanced ZRTP.
- Full time man-in-the-middle detection.
- All mobile endpoints secured.
- Rapid deployment, convenient central control.
- Easy web based management.
- No additional hardware or additional chips required for Silent Phone secure messaging.
- Secure Internet access from any WiFi with GoSilent