Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Privacy

Silent Circle Launches Management Console

Silent Circle, a startup providing private encrypted communications solutions, this week released Silent Circle Management Console, a secure web-based portal that allows organizations to purchase, assign and manage licenses for employees using the company’s peer-to-peer encrypted communications tools on their devices.

Silent Circle, a startup providing private encrypted communications solutions, this week released Silent Circle Management Console, a secure web-based portal that allows organizations to purchase, assign and manage licenses for employees using the company’s peer-to-peer encrypted communications tools on their devices.

As background, SilentCircle was co-founded by former Navy SEAL sniper Mike Janke, and PGP creator Phil Zimmermann, and has created a platform for encrypted text, e-mail, mobile phone and video teleconferencing services through a secure, proprietary network and set of applications.

SilentCircle Logo

“Designed to enable quick, easy and centralized deployment of Silent Phone and Silent Text for organizations dealing with growing BYOD programs, Silent Circle’s new management console supports any size deployment of the company’s encrypted communications services, making it a natural complement to any organizations’ mobile device management (MDM) solutions while addressing the last mile of mobile data security,” the company explained.

The console enables administrators to upgrade and reassign licenses across different users and their devices, and offers the ability to delegate account management to team administrators within different departments.

For example, organizations can tailor and optimize license costs according to employees’ privacy risk factors, such as their job descriptions or frequent overseas travel.

Administrators can easily purchase additional licenses for Silent Phone, Silent Text and Out-Circle Access service for Silent Phone, which allows employees using Silent Phone to call “outside the circle” to “regular phone lines” routed with encryption in place between the Silent Phone user and the edge of Silent Circle’s private network.

While console administrators cannot access employees’ communications that take place through Silent Circle’s apps, administrators are able to deactivate accounts that were created and assigned through the console as needed.

“Businesses and government agencies continue to be our fastest-growing customer base and we’ve designed the Silent Circle Management Console to give these users a centralized, seamless means of provisioning our apps and services to support employees according to their specific roles and risks,” said Silent Circle Chief Technology Officer and Co-Founder, Jon Callas. “Now organizations can quickly turn to Silent Phone and Silent Text as key complements to existing mobile device management solutions and crucial safeguards for employees’ personal, unmanaged devices inevitably used for sensitive communications.”

Advertisement. Scroll to continue reading.
Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Privacy

Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...

Privacy

Employees of Chinese tech giant ByteDance improperly accessed data from social media platform TikTok to track journalists in a bid to identify the source...

Application Security

Open banking can be described as a perfect storm for cybersecurity. At one end, small startups with financial acumen but little or no security...

Mobile & Wireless

As smartphone manufacturers are improving the ear speakers in their devices, it can become easier for malicious actors to leverage a particular side-channel for...

Government

The proposed UK Online Safety Bill is the enactment of two long held government desires: the removal of harmful internet content, and visibility into...

Cloud Security

AWS has announced that server-side encryption (SSE-S3) is now enabled by default for all Simple Storage Service (S3) buckets.