START FREE TRIAL
IntactDialog - Encrypted Communications
Total Mobile Security and Productivity
IntactDialog

IntactDialog provides encrypted communications for both calls and messages on IntactPhone Android and iPhone devices. It protects your calls and messages with high-grade encryption.

Why choose IntactDialog?
  • Secure communications – voice calls, messaging and attachments
  • Military-grade encryption and security protocols
  • Always-safe user side via end-to-end or midway encryption
  • Central management console with a simple and intuitive interface
  • Regulation-compliant recording and archiving
Who is it good for?

Security-minded organizations that wish to secure their mobile voice calls, messaging, and content exchange, by providing employees with trusted high-grade mobile communication encryption.

Core Capabilities
Encrypted Calls

Communicate securely with your contacts anywhere in the world with crystal clear voice over IP audio. The latest ZRTP encryption technologies ensure that no eavesdropping or hacking is possible on your calls with others.

Semi-secure Calls

Call anytime and anywhere across the globe to mobile and landline phones on your network. Your leg of the call is always protected, even when talking with a contact that does not have the IntactDialog app, keeping you safe from local eavesdropping threats.

Encrypted Messages

Exchange completely safe messages. Share in real-time private information without concern about interception threats. Ensure safe communication and group chat within a contained environment. Perform end-to-end encrypted messaging based on AES256 message encryption with 256-bit key length, and RSA 2048. Avoid untrusted commercial instant messaging apps without compromise.

Image Transfer and Attachments

Transfer confidential documents, and sensitive images with high-grade end-to-end encryption. Define sharing policies ensuring they do not end up in the wrong hands.

Bi-directional Message Burn

Choose when your messages get deleted on both ends. Purge information not only from your device but from all your recipients’ devices too. Once wiped, it leaves no trail that communication ever existed.

Anonymous Phonebook Centrally Controlled

Use a built-in phonebook to maintain a secret identity. Define flexible contacts’ exposure policies across organizational groups. Avoid hooks into personal contact lists ensuring complete control over communications in your organization.

Intuitive Management Console

Manage users and devices via a user-friendly, web-based console from anywhere in the world. Provision secure communications use statistics. Leverage Multi-Factor Authentication to secure your administrator credentials. Remotely locate and lock the device and wipe messages and content when the device is stolen or lost.

Communications Recordings & Archiving

Gain the flexibility to activate recordings and archiving across your organization’s communications. Ensure compliance with regulations as your industry dictates.

Device Agnostic. Flexible deployment

Deploy IntactDialog on IntactPhone and any Android and iOS device. Secure communications with flexible deployment to fit your organization’s requirements. Utilize hosted environment or privately deployed environment on your own infrastructure. On-premises installation enables you locked internal network for your organization.

FIPS & Common Criteria (CC) compliance

IntactDialog adheres to strict guidelines such as FIPS and Common Criteria for implementing cryptographic software. By this, it meets international guidelines for information security products suited for governmental deployments.

Privacy Preference Center

Necessary

These cookies are used to guarantee site logged-in to the server and proper site operation.

wordpress_e0e89334ac52a69b56ac8982b9a3784d wordpress_logged_in_e0e89334ac52a69b56ac8982b9a3784d, wp-settings-2, wp-settings-time-2, wpe-auth

Advertising

These Google cookies are used for re-targeting, optimization, reporting, and attribution of online adverts and remarketing activity.

IDE, NID

Analytics

These third party cookies are used to collect information about how visitors use the site. The information is used to compile reports to improve the site. The cookies collect information in an anonymous form, including the number of visitors to the site, where visitors have come to the site from and the pages they visited.

1P_JAR, APISID, APISID, DSID, DV, HSID, OTZ, __ncuid, _ga, __utmx, __utmxx

Preferences

Various unique identifiers by Google, which stores your preferred use options.
Google sets a number of cookies on any page that includes a Google product such as Google Map and YouTube. While we have no control over the cookies set by Google, they appear to include a mixture of pieces of information to measure the number and behavior of Google tools users. This may include information that links your visits to our website with your Google account if you are signed in to one. Information about your use of our website, including your IP address, may be transmitted to Google and stored on their servers. These cookies may not identify you personally unless you are logged into Google, in which case it is linked to your Google account.

APISID, DSID, DV, HSID, SAPISID, SID, SIDCC, SSID