Tired of unsafe mobile communication?

Secure mobile communication is ready now by

Swiss Protected Mobile Services offer more than just a smartphone.

If you make a voice call, a video call, a chat or a data transfer,
we ensure your data is protected from unauthorized access and tampering.

In today’s world, mobile communication is exposed

to a high risk of eavesdropping

Smartphones can easily be infected with viruses and other malware that spy, copy or misuse your information and data.

Swiss Protected Mobile Services are the ideal solution to protect yourself from these cyberattacks.

Our solutions guarantee privacy and protection from unpleasant consequences due to data leakage.

In today’s digital age, the line between convenience and vulnerability has never been so thin. With cybercrime inflicting costs up to a staggering €6 trillion annually, nearly one-third of all businesses have felt its sting. Your files, the lifeblood of your operations, are prime targets.

The Digital Battlefield

It’s not just about security; it’s about serenity. Dive into the digital realm with the confidence that your data, conversations, and every byte of information remain untouched by prying eyes.

Peace of Mind

Why be tethered to big corporations or governments lurking in the shadows? We empower you to communicate, share, and work with the freedom of knowing you’re not under someone’s constant microscope.

Sovereign Indipendence

The New Gold Standard
in Secure Mobile Communication

In a world flooded with claims of “secure communication”, only a few truly stand out.
Swiss Protected Mobile Services isn’t just another name on that list—it’s at the very top.

Holistic Communication Suite

From encrypted calls, video calls and file sharing to secure team collaborations and protected smartphones, Swiss Protected Mobile Services redefine what it means to be "comprehensive".

Data Sovereignty

Your data and conversation are yours— Swiss Protected Mobile Services make this possible and give you back control and ownership over your assets.

Unprecedented
Privacy

While others focus only on end-to-end encryption, Swiss Protected Mobile Services take data protection to the next level. Experience communication where you are not only user, but also protecter of your digital data.

Simplicity Meets Sophistication

Dive into an interface so intuitive, you'll forget you're operating one of the most advanced security platforms. With Swiss Protected Mobile Services, you don't need a tech manual; you just need a message to send.

SECURITY APPLICATIONS

FOR CONFIDENTIAL USE

End-to-end secure communication by installing our security applications on Android individual smartphones and provide therefore highest protected mobile communication for voice- and video calls, file sharing, chat and messaging.

HARDENED
SMARTPHONE

FOR TOP SECRET USE

Closed system for end-to-end secure communication that includes a hardened smartphone with proprietary Android OS and security applications that provide highest protected mobile communication for voice- and video calls, file sharing, chat and messaging.

CHF 350

/ Year

SECURITY APPLICATIONS
for confidential use

Administration Management, Key Generation and Licenses Fees for the Security Applications

Scope of delivery:

Info license:

Send us your request and we will provide you with further information and a corresponding offer.

CHF 2300

/ Initial Cost for the 1st Year

HARDENED SMARTPHONE
for top secret use

Google Pixel 6a or newer versions device, Proprietary Android OS, Security Applications

Scope of delivery:

Info license:

Send us your request and we will provide you with further information and a corresponding offer.

Need a custom solution?

FAQ

Frequently Asked Questions

For top secret means that you are completely protected. You get a specially hardened smartphone that does not allow any kind of installations. This means that you cannot install applications, even from APP stores. As a result, malware cannot install itself or be installed.

For confidential use the transfer of communication and data is completely secured as it is with the top secret version. However, you can install APPs but this means that you are responsible for the security of your smartphone. The advantage of this solution is that you can use your own Smartphone and your familiar application environment.

For confidential use the transport of the messages is completely secured as with the version top secret. However, you can install APPs but this means that you are responsible for the security of your smartphone. The advantage is that you can use your familiar APP environment.

The management system is the key element of our solution and must be protected in particular against:

  • Terrorism
  • Power failure
  • Internet failure
  • Warlike conflicts
  • Foreign interference
  • Interference of any kind
The Security Management Center is the heart of our services and must therefore be specially protected. That is why the SMC is installed in a bunker with limited access. The SMC manages in particular the following parts:
  • Management of the full security solution
  • Key generation/delivery and license management
  • Distribute/Manage licenses
  • Divide Messenger users into groups depending on their profile
  • Manage user accounts, devices etc.
  • Manage the Messenger Address Book

When you start the hardened smartphone, our proprietary operating system is loaded. It does not allow any more to install applications or programs that are not approved by us. Therefore, it is also not possible for malicious software to install itself or be installed.

Malware cannot install itself or be installed because our proprietary OS in the hardened smartphone does not allow it.

Software updates are delivered directly from the security management system in the bunker and are installed automatically on the user devices.

No malware or other unauthorized programs can be installed on the hardened smartphone. On clients demand we can install a verified Internet browser and an email client. The Internet traffic will be verified and controlled in the Security Management IT-environment. Emails and the Internet cannot cause security damage to the hardened smartphone.

These services come with an extra cost.