www.itpro.com
Open in
urlscan Pro
151.101.66.114
Public Scan
URL:
https://www.itpro.com/mobile/mobile-phones/360024/5-most-secure-smartphones
Submission: On June 27 via manual from US — Scanned from DE
Submission: On June 27 via manual from US — Scanned from DE
Form analysis
2 forms found in the DOMGET https://www.itpro.com/search
<form class="search-box" action="https://www.itpro.com/search" method="GET" data-analytics-id="search-submit" data-before-rewrite-localise="/search" data-component-tracked="19">
<label for="search-input" class="sr-only">Search IT Pro</label>
<input tabindex="0" type="search" name="searchTerm" placeholder="Search IT Pro" class="search-input" id="search-input">
<button type="submit" class="search-submit" aria-label="Search">
<span class="search-icon">
<svg class="icon-svg" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 1000 1000">
<path d="M720 124a422 422 0 1 0-73 654l221 222 132-131-222-222a422 422 0 0 0-58-523zm-92 504a291 291 0 1 1-412-412 291 291 0 0 1 412 411z"></path>
</svg> </span>
</button>
</form>
POST https://newsletter-subscribe.futureplc.com/v2/submission/submit
<form data-hydrate="true" class="newsletter-form__form newsletter-form__form--inbodyContent" method="POST" action="https://newsletter-subscribe.futureplc.com/v2/submission/submit"><input data-hydrate="true" type="hidden"
class="form__hidden-input form_input form__hidden-input form__hidden-input--inbodyContent" name="NAME"><input data-hydrate="true" type="email" class="form__email-input form_input form__email-input form__email-input--inbodyContent" name="MAIL"
required="" placeholder="Your Email Address"><input data-hydrate="true" type="hidden" class="form__hidden-input form_input form__hidden-input form__hidden-input--inbodyContent" name="NEWSLETTER_CODE" value="ITP_STD"><input data-hydrate="true"
type="hidden" class="form__hidden-input form_input form__hidden-input form__hidden-input--inbodyContent" name="LANG" value="EN"><input data-hydrate="true" type="hidden"
class="form__hidden-input form_input form__hidden-input form__hidden-input--inbodyContent" name="SOURCE" value="60"><input data-hydrate="true" type="hidden"
class="form__hidden-input form_input form__hidden-input form__hidden-input--inbodyContent" name="COUNTRY"><label class="form__checkbox-label"><input data-hydrate="true" type="checkbox"
class="form__checkbox-input form_input form__checkbox-input form__checkbox-input--inbodyContent" name="CONTACT_OTHER_BRANDS">Contact me with news and offers from other Future brands</label><label class="form__checkbox-label"><input
data-hydrate="true" type="checkbox" class="form__checkbox-input form_input form__checkbox-input form__checkbox-input--inbodyContent" name="CONTACT_PARTNERS">Receive email from us on behalf of our trusted partners or sponsors</label><input
data-hydrate="true" type="submit" class="form__submit-input form_input form__submit-input form__submit-input--inbodyContent" required="" value="Sign me up"></form>
Text Content
Skip to main content Open menu Close menu ITPro IT Pro Search Search IT Pro Subscribe RSS US Edition US Australia UK Technology Magazines Why subscribe? * The best tech tutorials and in-depth reviews * Try a single issue or save on a subscription * Issues delivered straight to your door or device From€8 View * * Business * Cloud * Hardware * Infrastructure * Security * More * Zero Trust * Software * Technology * Resources * ITPro newsletter Cloud Pro Channel Pro Trending * HPE Discover 2024 * Pure Accelerate 2024 * Artificial intelligence in business * The best business servers for 2024 * Subscribe to the ITPro newsletter When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works. 1. Security 2. Privacy THE BEST SECURE SMARTPHONES Buying Guides By Rene Millman last updated February 14, 2024 Finding the most secure phone for your business helps keep your data and privacy protected * * * Jump to: * Purism Librem 5 * Apple iPhone 15 Pro Max * Google Pixel 8 Pro * Bittium Tough Mobile 2C * Silent Circle Blackphone 2 Finding the most secure phone can be beneficial for any individual, but it’s especially useful for businesses looking to equip their employees with the safest devices they can. Because phones are inherently connected devices, it can be all too easy to expose data. Personally identifiable information such as financial details, or sensitive work documents can be stolen unless you take precautions in your device choices. THE BEST SECURE SMARTPHONES PURISM LIBREM 5 (Image credit: Librem) Swipe to scroll horizontally ProsConsOpen source OSNot the most energy efficientUnique level of repairability$999 is expensive for an obscure brand While the Purism Librem 5 is fairly old, having launched in 2020, it’s a great example of a secure smartphone that doesn’t lose itself in other fancy features. It runs an open source operating system grounded in Linux called PureOS, which frees it from the update cycle and legacy bugs of Android. Based on the Debian OS – a popular mix of GNU Linux – the source code for PureOS can be fully audited for security purposes. What's more, if you don't have to use PureOS, the phone allows for other operating systems to be involved, which just requires some technical knowledge. The team behind PureOS, known as the "free desktop" community according to Purism's website, has put technical excellence before quick profits. Developers claim they took their time to make sure everything worked and was safe to use before putting it on the market. One of the most effective security tools on the Librem 5 is its 'kill switches', three of which are built into the hardware to disable the camera, microphone, Wi-Fi, Bluetooth, and all network connectivity – including GPS – instantly. LATEST VIDEOS FROM itproITPro While other phones on this list have combined SoC solutions, the Librem 5 has six distinct chips to improve manufacturing freedom and is an attempt by its creators to prevent planned obsolescence. APPLE IPHONE 15 PRO MAX (Image credit: Apple) Swipe to scroll horizontally ProsConsFantastic all-rounderRelatively expensive at $1,199Lockdown Mode fights the toughest threatsClosed iOS ecosystem The iPhone 15 Pro Max is arguably the most secure iPhone ever. It takes all the best features and designs of the most recent models and melds them into one super secure device. Apple has made great strides in recent years, in terms of on-device security. Taking on the likes of Pegasus spyware, iOS 16 comes with a Lockdown Mode that provides "extreme protection", according to Apple. This is an optional feature, but once it's switched on it blocks most file attachments and also rejects non-secure Wi-Fi networks – that also includes some web technologies that might be exploitable by attackers, keeping your iPhone uncompromised. What's more, the Lockdown Mode comes with a host of robust security features that work to keep all the user's data safe. For example, Face ID technology lets users unlock their phones with facial recognition. This is thanks to the A17 Pro chip that maps out the user's face but keeps that specific data encrypted on the device – it's also secured in an 'enclave' subsystem. While it is one of the most popular brands around, the latest iPhone is also a security-heavy device that should also appeal to business users who handle sensitive data. GOOGLE PIXEL 8 PRO (Image credit: Google) Swipe to scroll horizontally ProsConsSeven years of supportQuite poor battery lifeBuilt-in VPNNo Lockdown Mode equivalent Android users have s breadth of choice when it comes to smartphones, but they might be best served, from a security perspective, by opting for the device made by the parent company of Android, Google. The Pixel 8 Pro is arguably the best of the tech giant's handsets, and also one of the first to get the latest updates (and security patches). Inside the Pixel 8 Pro is Google's latest in-house processor, the Tensor G3, which is an ARM-based chip that uses TrustZone technology. TrustZone has been designed to store sensitive data in a more heavily secured part of the phone. What's more, the Pixel 8 Pro has a dedicated security chip in the Titan M2. This is where encrypted data, such as fingerprints, or facial scans are kept. That information is also stored in its own dedicated area. Other Google-specific features include VPN for Google One, the company's own virtual private network, which shields user data when on a public Wi-Fi network – a handy feature when working remotely. BITTIUM TOUGH MOBILE 2C (Image credit: Bittium) Swipe to scroll horizontally ProsConsPhysically ruggedHard to purchaseAlways-on VPNNo biometric login The Bittium Tough Mobile 2C is a rugged and secure smartphone that boasts two operating systems for complete data separation. One OS is a hardened version of Android 9, and the other is the company’s Secure OS. Users can switch between the two with the device’s dual boot functionality. It also comes with a free YubiKey 5 NFC security key to support two-factor authentication. There is also an always-on VPN and the company’s mobile device management software. The rugged phone has an IP67 rating and MIL-STD-810G, meaning it is waterproof to a degree and resists breakage. SILENT CIRCLE BLACKPHONE 2 (Image credit: Silent Circle / EncryptedOS) Swipe to scroll horizontally ProsConsUnparalleled encryptionNo longer supported by manufacturerStrong privacy controlsDifficult to purchase For those who are seeking ultimate encryption for their phone, the Blackphone 2 from Silent Circle isn’t a bad option. This device has been custom-built for security, with a modded version of Android titled Silent OS in which all app permissions are editable. Its flagship feature is its integrated AES encryption, which keeps phone calls, messages, and shared files secure. Like some other phones on the list, it also comes with its own VPN. Silent Circle acknowledges the usefulness of secure phones for enterprises with built-in compatibility for mobile device management (MDM) solutions and Android for Work. Users can also create multiple user profiles on the phone. The downside to the Blackphone 2, which launched in 2015, is that it is no longer supported by Silent Circle. It is now only available from registered partners. GET THE ITPRO. DAILY NEWSLETTER Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024. Contact me with news and offers from other Future brandsReceive email from us on behalf of our trusted partners or sponsors By submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over. Rene Millman Social Links Navigation Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter. More about privacy Euro police chiefs rekindle end-to-end encryption battle amid continued rollouts Google forced to delete billions of incognito browsing records after privacy controversy Latest Pure Storage founder: Flash drive efficiency will “flatten out” but still has a clear role for AI See more latest ► TOPICS Buying Guides RESOURCES HOW IDENTITY THREAT PROTECTION SOLVES MODERN BUSINESS CHALLENGES Posted whitepaper GLOBAL THREAT REPORT 2024 Posted whitepaper CHICANES AND TUNNELS: THE RACE TO SECURELY CONNECT REMOTE USERS Posted Webinar PROTECT YOUR ATTACK VECTORS FROM EMERGING THREATS Posted Webinar VIEW MORE WHITEPAPERS MOST READ 1. 1 Pure Storage founder: Flash drive efficiency will “flatten out” but still has a clear role for AI 2. 2 "New challenges require new ways of thinking" – and Pure Storage is backing simplicity as its big selling point 3. 3 HPE Discover 2024: Can businesses finally turn AI hype into results? 4. 4 Oracle expands Spanish cloud offerings with $1 billion investment 5. 5 Thousands of procedures canceled at London hospitals as Qilin releases blood test data IT Pro is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site. * Terms and conditions * Contact Future's experts * Privacy policy * Cookies policy * Accessibility statement * Careers * About Us * Contact Us © Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.