ProtonBlog(new window)
An illustration of Proton Calendar beta for web and Android

Proton Calendar beta is now available for everyone who uses Proton Mail

Proton Calendar(new window), our privacy-focused calendar app, is now available in beta on Android and web for everyone who has a Proton Account. Protected by the same end-to-end encryption used in Proton Mail, this simple, easy-to-use, and intuitive calendar will help you stay on top of your schedule while securing your data.

If you already have Proton Mail, you can try Proton Calendar beta on the web and Android devices (with the beta app for iOS coming soon).

You can access Proton Calendar beta on the web by going to calendar.proton.me(new window) and logging in with your Proton Mail credentials. Or you can log in to mail.proton.me(new window) and use the App Selector.

An illustration of the App Selector

You can download the Proton Calendar Android app beta from the Play Store.

Stay on top of your schedule with Proton Calendar beta

We’ve built Proton Calendar from the ground up, so you can spend less time managing your day and more time enjoying it. It takes a lot of work to stay on top of your schedule, which is why we’ve made Proton Calendar simple and easy to use with seamless integration across your devices. With the Proton Calendar beta, you can:

  • Create, edit, and delete events across devices
  • Set reminders
  • Send and respond to event invitations (web only for now)
  • Set up recurring events annually, monthly, weekly, daily, or on an interval of your choice
  • Also available in dark mode!

Proton Calendar is integrated with Proton Mail. You can respond to event invitations you receive in Proton Mail web, including invitations from Google or Microsoft calendars. 

You can also import your existing calendar to Proton Calendar with only a couple of clicks.

Make every day safer with our end-to-end encryption

Millions of people around the world use Proton Mail every day to protect the privacy and security of their messages. That’s why we are using the same end-to-end encryption to keep your life events private, safe, and secure. 

When you create an event in the Proton Calendar, your event’s details, including the title, description, location, and people you invite, are encrypted on your device so no one, not even us, can see them. Whether you’ve scheduled a doctor’s appointment, a bank visit, or a meet-up with old friends, you control who gets access to that information.

Learn more about how Proton Calendar protects your data(new window)

Thank you for choosing Proton Calendar beta, and don’t forget to share your feedback(new window).


Feel free to share your feedback and questions with us via our official social media channels on Twitter(new window) and Reddit(new window).

Keep your life’s events private
Get Proton Calendar free

Related articles

Is WeTransfer safe?
WeTransfer is a popular service used by millions worldwide to send large files. You may have wondered if it’s safe or whether you should use it to share sensitive files. We answer these questions below and present a WeTransfer alternative that may su
what is a dictionary attack
Dictionary attacks are a common method hackers use to try to crack passwords and break into online accounts.  While these attacks may be effective against people with poor account security, it’s extremely easy to protect yourself against them by usi
Data breaches are increasingly common. Whenever you sign up for an online service, you provide it with personal information that’s valuable to hackers, such as email addresses, passwords, phone numbers, and more. Unfortunately, many online services f
Secure, seamless communication is the foundation of every business. As more organizations secure their data with Proton, we’ve dramatically expanded our ecosystem with new products and services, from our password manager to Dark Web Monitoring for cr
what is a brute force attack
On the subject of cybersecurity, one term that often comes up is brute force attack. A brute force attack is any attack that doesn’t rely on finesse, but instead uses raw computing power to crack security or even the underlying encryption. In this a
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as the legal justification allowing federal agencies like the NSA, CIA, and FBI to perform warrantless wiretaps, which sweep up the data of hundreds of thousands of US citi