Glacier's cloud based immutable VPN infrastructure is launched unique for each organization. Glacier controls change across multiple system dimensions in order to increase uncertainty for attackers, reduce their window of opportunity, increase the costs of their attack efforts, and keep end user devices anonymous.
With a tap of a button, all of your data leaving your device is encrypted and exits a temporary server you control. We’ve designed the Glacier Core VPN with four major features:
Strong Crypto
Supports only IKEv2 with strong crypto (AES-GCM, SHA2, and P-256). Does not support legacy cipher suites or protocols like L2TP, IKEv1, or RSA.
Moving Target
Reduce your digital footprint by enabling Core VPN. Tear it down when you no longer need it.
Dynamic Filtering
Blocks ads, malware, and unwanted content with daily blacklist updates.
Modern Design
Designed on current versions of Ubuntu and StrongSwan.