THE THINKING BEHIND THE BARRIERS WE BUILD

Enterprise Mobile Privacy Platform

Our Enterprise Privacy Platform is born from a strong set of beliefs and built on a fundamentally different mobile-first architecture designed by some of the best minds in mobile technology, encryption, security and privacy. Doing whatever it takes to protect your business.
That’s what we do.

contact sales

THE THINKING BEHIND THE BARRIERS WE BUILD

Enterprise Mobile Privacy Platform

Our Enterprise Privacy Platform is born from a strong set of beliefs and built on a fundamentally different mobile-first architecture designed by some of the best minds in mobile technology, encryption, security and privacy. Doing whatever it takes to protect your business.
That’s what we do.

contact sales

Built on a fundamentally different protocol

When a Silent Circle subscriber makes a phone call or video chats with another Silent Circle member, that transmission is secured and encrypted end-to-end on our crystal-clear secure network. ZRTP provides true peer-to-peer key negotiation and management for secure VOIP communication.
learn more

Our users own the keys

In accordance with encryption best practices, we don’t hold or have access to the keys that encrypt our customers’ private communications data whenever possible. Accordingly, our secure communications products use “peer-to-peer” encryption. Any conversation, video, text, or video teleconference is encrypted from your device to the other party’s.

Open source advocacy

Silent Circle believes strongly in transparency. And because we value and encourage community input and review of our systems and services, Silent Circle hosts a bug bounty program for reporting qualifying security vulnerabilities.

Proprietary technology lets business thrive

Enterprise mobile security should work silently and effectively in the background. It should also amplify business opportunities. Our devices and services focus on keeping your data secure at all times while simultaneously providing for the free flow of business communication. A pioneering “mobile first” vision of technology is present in all our offerings. Silent Circle maintains an industry leadership position in the rapidly changing world of mobile communications security.

Proprietary military-grade technology

ZRTP is a cryptographic key-agreement protocol to negotiate the keys for encryption between end points in a Voice over Internet Protocol (VoIP) call. ZRTP uses Diffie–Hellman key exchange and the Secure Real-time Transport Protocol (SRTP) for encryption.

ZRTP stands for “Zimmermann Real-time Transport Protocol” and was developed by Silent Circle’s own, Phil Zimmermann. This proprietary technology has perfect forward secrecy, meaning the keys are destroyed at the end of the call. This fully prevents compromising the call contents at a later date even if key material is somehow disclosed.

Advantages

  • End-to-end encryption.
  • Enhanced ZRTP.
  • Full time man-in-the-middle detection.
  • All mobile endpoints secured.
  • Rapid deployment, convenient central control.
  • Easy web based management.
  • No additional hardware or additional chips required for Silent Phone secure messaging.
  • Secure Internet access from any WiFi with GoSilent

No backdoor policy

At Silent Circle, we maintain a strict no backdoor policy. Ther encryption keys to private communications remain in your hands and your hands alone. Your enterprise stays at the highest level of security at all times.

Private by Design

Designed by the best minds in mobile technology, encryption, security and privacy, our fundamentally different technology sets the standard for enterprise privacy in today’s mobile-first world.

Additional Information

Please visit the links below for a complete explanation of our policies, compliance and protocols.