Secure devices, text, voice and more

Full mobile security platform for government

Communication security at the highest level

In today’s world of cyber espionage, government organizations require more than an encrypted messaging app. Privacy and security starts before the first message or call. Glacier provides the tools to securely communicate and manage devices globally.      

Glacier was launched in 2015 by a group of engineers and developers with backgrounds from the National Security Agency. Our goal was to solve mobility pain points we experienced first hand in the government.

We empower our government customers to work in nations throughout the world with confidence their associations, communications, data, and devices are secure and protected. Our secure, virtual communications and VPN infrastructure span globally and ensures all communications and collaboration is encrypted, private, and anonymous.

Secure Communications.

End-to-end encrypted and obfuscated text, voice, video, and file transfer.
Management Console.

Invite, manage users and control security settings from the web based management console.
Threat detection.

Unparalleled visibility into devices, apps, and networks to detect emerging threats with high fidelity.
Device Management.

Device hardening, tracking, security policies and alerts.

Procured by third party partners to eliminate linking device owners and customer organizations.

24/7/365 device monitoring and support. Instant alerts when behavioral anomalies occur.

Moving Target Defense

Moving Target Defense seeks to develop game-changing capabilities that dynamically shift the attack surface, making it more difficult for attackers to strike.

The Glacier communication network is configured uniquely for each customer and customer mission. Digital DNA is never left behind or shared between.

  • The Glacier network topology protects the anonymity of those connected to the network
  • Network transmissions are encrypted and never stored or archived on network servers
  • Glacier phones are leading brand models that are pre-configured with SIM cards and security protocols that encrypt data, promote user anonymity and protect the device from infiltration

Use cases for gov & military.

Mobile to Mobile.

End-to-end encrypted text, calls and file transfer between Glacier enabled devices

Mobile to VoIP.

Secure calls from Glacier enabled mobile devices to intranet connected land lines

External Communications.

Secure external calls and SMS from temporary virtual phone numbers.


Secure conferences from Glacier enabled devices to a conference bridge

Group Messaging.

End-to-end encrypted messaging between multiple devices

Device Management.

Monitor all your devices for threats and security misconfigurations


  • Glacier's products satisfy HIPPA requirements for data encryption
  • Glacier aligns with guidance in NIST SP 800-52 Revision 2: "Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations"
  • Glacier meets the encryption requirements set by the NSA for Commercial National Security Algorithm (CNSA) suite
  • Glacier is compliant with GDPR requirements

DHS S&T Study on Mobile Device Security

The Department of Homeland Security (DHS) submitted a report to Congress that details current and emerging threats to the Federal government’s use of mobile devices and recommends security improvements to the mobile device ecosystem. The DHS Science and Technology Directorate (S&T) led the study in coordination with the National Institute of Standards and Technology and its National Cybersecurity Center of Excellence.

The Glacier DHS whitepaper provides a technical explanation of the five basic types of mobile threats and how Glacier solves these threats for government agencies.

Get started.

Build your secure mobile program with Glacier.