Listing Thumbnail

    Wickr [Private Offer Only]

     Info
    Sensitive military communications need complete security from both foreign and domestic cyber threats. Wickr RAM recognizes those threats and provides uncompromising security for your collaboration needs whether your team is in the field, at the base, or back at home.
    4

    Overview

    Wickr [Private Offer Only] combines the benefits of the Private Offer feature along with Carahsoft's contract vehicles in providing customers a seamless acquisition process for their cloud-based products and solutions from AWS Marketplace.

    Wickr RAM bridges the connectivity gap between your NIPRNet desktop and your mobile device. Wickr RAM is accessible from personal and government issued devices offering an End-to-end encrypted application built on a zero trust network.

    AWS Wickr ATAK Plugin The AWS Wickr ATAK Plugin integrates AWS Wickr's end-to-end encrypted communication solution with the Android Team Awareness Kit (ATAK), a map-based situational awareness application (also known as the Android Tactical Assault Kit for military use). The plugin enables secure backhaul communications. ATAK operators are provided with a Wickr Enterprise (self-hosted) or AWS Wickr (SaaS) account to utilize within ATAK, so they no longer need to toggle between applications to send messages, initiate calls, and share files. Communications are integrated into the ATAK operator pinwheel; burn-on-read and expiration timers allow sensitive information to be deleted from the device, while messages and files can be retained in a secure, customer-controlled data store for regulatory and auditing purposes.

    Wickr Enterprise Wickr Enterprise is a self-hosted, end-to-end encrypted service that helps public and private-sector organizations protect communications from unauthorized access, retain data in accordance with legal and regulatory requirements, and safeguard collaboration with external partners. One-to-one and group messaging, voice and video calling, file sharing, screen sharing, and location sharing are protected with 256-bit AES encryption. Information can be logged to a private, customer-controlled data store for retention and auditing purposes. Users have comprehensive administrative control over data, which includes setting permissions, configuring ephemeral messaging options, and defining security groups. Wickr Enterprise integrates with additional services such as Active Directory (AD), single sign-on (SSO) with OpenID Connect (OIDC), and more. You can quickly create and manage networks through the AWS Management Console, and securely automate workflows using Wickr bots.

    Wickr Open Access Wicker Open Access (WOA) is a feature that provides end-to-end encrypted communications that are more resilient to Internet traffic restrictions and censorship attempts. It uses domain fronting as well as SSH and VPN technology to mask connections to Wickr services, direct encrypted traffic around blocking attempts and identify the best path for your data, so you can share messages, calls, and files securely and reliably in restricted environments.

    This listing is for Private Offers ONLY. Please reach out for more details. Thank you.

    Highlights

    • The most secure collaboration platform, designed for and accredited by the DoD.
    • Secure collaboration with anyone, anywhere, anytime between Wickr RAM & Wickr Pro users from other networks.
    • End-to-end encrypted chat messaging, audio and video calling, screen share, large file transfer, and secure file storage.

    Details

    Categories

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Wickr [Private Offer Only]

     Info
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    1-month contract (4)

     Info
    Dimension
    Description
    Cost/month
    Wickr
    Wickr Platinum
    $30.00
    Wickr Enterprise
    per user/year;minimum population of 50 users
    $420.00
    Wickr ATAK PlugIn
    per user/year in addition to Enterprise base license
    $60.00
    Wickr Open Access
    per user/per year in addition to Enterprise base license
    $120.00

    Vendor refund policy

    Reference EULA

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    850-374-5853, 833-847-0457

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    4
    1 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    100%
    0%
    0%
    0%
    1 AWS reviews
    reviewer2799099

    Secure messaging has transformed how our teams coordinate confidential incidents and decisions

    Reviewed on Feb 04, 2026
    Review from a verified AWS customer

    What is our primary use case?

    AWS Wickr  serves as the primary tool for secure internal communication, specifically for high-sensitivity teams, including security operations, compliance, and executive communications. In practice, we use AWS Wickr  for conversations and file exchanges that cannot exist on standard collaboration tools because of confidentiality and regulatory risk.

    When we use AWS Wickr for confidential conversations and file exchanges, we typically share a targeted set of artifacts, including incident artifacts and forensic reports and analysis, legal and compliance documents and executive-level materials, along with access credentials and secrets—items we would not want circulating on email or generic collaboration tools.

    Beyond the obvious incident response and executive scenarios, AWS Wickr has become the out-of-band channel for decisions that require confidentiality plus a minimized audit surface, such as rapid approvals and sign-offs when legal or compliance input is necessary, coordinating with external vendors or auditors on a need-to-know basis, and secure one-to-one escalations when an analyst needs to ask legal counsel a sensitive question.

    What is most valuable?

    From my experience running AWS Wickr in a mid-sized financial services environment, several features consistently stand out as the most valuable. End-to-end encryption minimizes exposure even if infrastructure is compromised. During a sensitive incident, we once had to share PCACs and credentials with a DFIR vendor, and knowing the channel was E2EE meant we could share those artifacts without creating long-lived, easily accessible copies on corporate email or file shares.

    Ephemeral messaging and configurable message expiration are features I find especially valuable because they force minimal data retention by design. In incident response or M&A chatter, we do not want long-lived copies circulating. We standardized IR rooms to 48 hours, meaning everything we shared expired automatically after a 72-hour incident window, reducing risk and simplifying post-incident compliance checks.

    AWS Wickr has had a clear, measurable, positive impact on how we handle high-risk communications, including reduced security risk and data exposure. Sensitive artifacts that previously traveled by email or ad-hoc file shares during incidents are now securely managed, leading to faster and more secure incident response coordination with better auditability without sacrificing privacy.

    After we adopted AWS Wickr, the biggest change I noticed was how we handle sensitive incidents and escalations, with communication becoming much faster and more focused. Earlier, discussions were fragmented across email and traditional chat tools, which slowed decision-making. With AWS Wickr, the security and compliance team could spin up secure, short-lived rooms immediately, reducing back-and-forth and helping us resolve incidents noticeably faster.

    What needs improvement?

    In my experience with AWS Wickr, the most noticeable pain point is usability. While the security model is strong, the user interface feels dated compared to modern collaboration tools, and non-technical users often need onboarding and guidance, which slows adoption. Improving the UI and UX and simplifying common actions would make a significant difference.

    Regarding the mobile experience with AWS Wickr, while the apps are secure, they feel less polished than mainstream messaging apps. Navigation is unintuitive and actions require more steps than necessary, along with notification reliability issues. There is limited flexibility for short-term users.

    Several additional improvements for AWS Wickr could enhance the platform, such as guest or external user management, analytics and reporting, change management and release communication, disaster recovery transparency, policy simulation or testing, and better documentation for advanced scenarios, which are major areas that could see improvement.

    For how long have I used the solution?

    I have been using AWS Wickr in an enterprise context for just over two years, during which time I have been responsible for the cloud-based enterprise deployment at mid-sized financial services companies, supporting security operations, compliance, and executive teams.

    What do I think about the stability of the solution?

    In my experience, AWS Wickr has been very stable and reliable, with no major downtime and only minor transient issues, such as occasional delays in message sync or notification delivery.

    What do I think about the scalability of the solution?

    AWS Wickr's scalability has been solid. Scaling users up or down is straightforward, with easy additions and removals. Guest temporary scaling is more challenging due to limited temporary licensing options for short-term spikes involving external users.

    How are customer service and support?

    Customer support for AWS Wickr has been responsive overall. When we reached out with technical usage or configuration questions, the support team was generally helpful, though complex queries about specific enterprise configurations may require more patience for a response.

    How would you rate customer service and support?

    Which solution did I use previously and why did I switch?

    Before AWS Wickr, we primarily relied on a mix of email, Microsoft Teams , and occasional encrypted messaging tools. We switched due to the security gaps in email and collaboration tools, which were not ideal for highly sensitive discussions and had risks of over-retention.

    How was the initial setup?

    The onboarding process for AWS Wickr was fairly smooth, but it was not completely frictionless, as I needed someone to guide me through the process. While provisioning the tenant through AWS  and configuring basic security policies did not take much time, the initial setup still required some effort.

    What was our ROI?

    Regarding the return on investment with AWS Wickr, I can say that faster incident coordination during security incidents and response coordination is noticeably quicker, leading to reduced compliance risk, which significantly contributes to overall ROI by limiting data retention and using end-to-end encryption communication.

    What's my experience with pricing, setup cost, and licensing?

    The procurement process for AWS Wickr via AWS Marketplace  was straightforward, aligning with our existing AWS  billing and procurement process. While there were no major setup costs and a per-user licensing model worked well, limited flexibility for short-term users required careful planning to avoid over-provisioning.

    Which other solutions did I evaluate?

    We evaluated secure messaging solutions including Signal Enterprise, Threema Work, and Wire Enterprise, along with Microsoft Teams , before choosing AWS Wickr. AWS Wickr stood out for being purpose-built for security and compliance-driven communication with ephemeral messaging and strict retention enforcement.

    What other advice do I have?

    To ensure user training and adoption for AWS Wickr, we implement role-based onboarding. Different teams receive short, role-specific guidance focused on when and why to use AWS Wickr, along with clear usage guidelines and internal quick-start documentation.

    In handling incident response workflows with AWS Wickr, we create dedicated incident rooms with restricted access, allowing only SOC members, incident owners, or required stakeholders to be added. This leads to faster coordination, high trust, and low metadata exposure.

    We manage guest and external users in AWS Wickr very cautiously, limiting external access to specific, purpose-built rooms rather than granting broad access. We only add external users such as auditors or incident response consultants when there is a clear business need with tightly scoped access.

    We monitor and audit AWS Wickr usage using a mix of built-in administrative controls and external governance processes, relying on the admin dashboard and logs, policy-based auditing, user lifecycle tracking, periodic access reviews, and supplementary governance tools to ensure compliance and security.

    My advice for others looking at AWS Wickr is to be clear about the use case, start with a targeted rollout, invest in user education early, define retention policies upfront, prepare for limited integrations, and plan licensing carefully.

    AWS Wickr excels as a secure, compliance-oriented communication tool, and when used in the right context, it delivers strong value. However, it requires organizations to adapt their expectations and workflows to fully utilize it. I would rate this review an 8 overall.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Amazon Web Services (AWS)
    View all reviews