altOS Mobile Platform

Mission-Focused Secure Mobility

Re-engineered to meet the special security requirements of high risk and privacy focused organizations

Mobile devices are highly complex computing platforms containing components and software packages from hundreds of sources.

Security managers must think about how adversaries could subvert their smartphones. The problem is intensified by software updates made over the air. Glacier and CIS Mobile break the typical supply chain attack sequence by replacing the smartphone operating system with altOS.

altOS is developed from the original Android Open Source Project, then flashed to the phone in our secure facility. Replacing the original OEM operating system with a custom-built and secure alternative significantly increases the difficulty for adversaries to control the platform.

Secure Communications.

End-to-end encrypted and obfuscated text, voice, video, and file transfer.
Management Console.

Invite, manage users and control security settings from the web based management console.
Mission Focused.

Central management with secure isolation of work, personal, and mission environments.
Multiple Phones in One.

No more carrying multiple devices. Switch between work and personal with just a tap.
Procurement.

Procured by third party partners to eliminate linking device owners and customer organizations.
Support.

24/7/365 device monitoring and support. Instant alerts when behavioral anomalies occur.

Data obfuscation with Moving Target Defense


Moving Target Defense seeks to develop game-changing capabilities that dynamically shift the attack surface, making it more difficult for attackers to strike.

The Glacier communication network is configured uniquely for each customer and customer mission. Digital DNA is never left behind or shared between.

  • The Glacier network topology protects the anonymity of those connected to the network
  • Network transmissions are encrypted and never stored or archived on network servers
  • AltOS phones are Google Pixel devices pre-configured with SIM cards and security protocols that encrypt data, promote user anonymity and protect the device from infiltration

Compliance

  • Glacier's products satisfy HIPAA requirements for data encryption
  • Glacier aligns with guidance in NIST SP 800-52 Revision 2: "Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations"
  • Glacier meets the encryption requirements set by the NSA for Commercial National Security Algorithm (CNSA) suite
  • Glacier is compliant with GDPR requirements

DHS S&T Study on Mobile Device Security


The Department of Homeland Security (DHS) submitted a report to Congress that details current and emerging threats to the Federal government’s use of mobile devices and recommends security improvements to the mobile device ecosystem. The DHS Science and Technology Directorate (S&T) led the study in coordination with the National Institute of Standards and Technology and its National Cybersecurity Center of Excellence.

The Glacier DHS whitepaper provides a technical explanation of the five basic types of mobile threats and how Glacier solves these threats for government agencies.

Contact us today.
Your submission has been received.
Oops! Something went wrong.
A Glacier team member will contact you to set up a meeting to discuss secure mobile solutions.