REDCOM’s Secure Conferencing

As SCIP-compatible ports’ voice streams are encrypted, they cannot use standard conference circuits. But by switching them to a REDCOM system equipped with the SWT-R interface, the remote SCIP-compatible terminals can use REDCOM’s Extreme Conferencing capabilities.

Extreme Conferencing gives you the ability to teleconference with more than a thousand people at the same time. Extreme Conferencing provides a powerful tool for training, motivating, or educating, in applications that range from business to government and defense to education. Several conferencing styles are available with this technology, including “progressive” (participants added one at a time), “meet-me” (participants meet at a valid number at a specified time), and “preset” (conference controller initiates the event, adding participants as they answer). Some or all of these elements can be combined into a single conference.

Organizations routinely protect their corporate computing networks with firewalls. Now, with a REDCOM system equipped with SWT-R, they can protect voice communications with SWT-R equipped sites as well. As an additional benefit, ordinary subscribers in their REDCOM SWT-R equipped systems can communicate securely with SWT compatible terminals at remote locations. This allows organizations ranging from defense communicators to banking and financial networks to discuss their operations with comfort that they are not overheard. With the REDCOM TRANSip, VoIP voice communications can be secured as well.

REDCOM SWT-R Interface & Secure device module

To create the SWT remote capability, each REDCOM SWT-R Interface Board connects a REDCOM system to 4 SWT voice encryptors (made by General Dynamics C4 Systems). SWT-R encryptors allow any HDX line or trunk port (and using REDCOM TRANSip®, any VoIP port) to conduct secure voice communications with any SWT compatible terminal in the world. On the SLICE or SLICE 2100, a REDCOM Secure Device Module can also be installed into any empty module bay. This module enables any SLICE line or trunk port (and using REDCOM TRANSip®, any VoIP port) to conduct secure voice communications with any SCIP-compatible terminal in the world. The voice path from the REDCOM system to the external SWT compatible terminal is completely secure. SCIP encryptors, such as the General Dynamics Sectéra Wireline Terminal (SWT) and the L-3 Omni, are compatible with any SCIP device.

GUI conference control

To provide operators with a complete, user-friendly overview of network services, REDCOM offers the REDCOM Link Command System (LCS) —a GUI call management system that delivers extensive conferencing, call control and handling capabilities. Operators can also control held calls, active conferences, directory assistance requests, and call queue management. The LCS contains a complete graphical user interface for controlling and managing conferences. All of the conference control features are available in the “Individual Conference” window.

Among the conferencing features are the ability to:

  • Add a calling party to a conference
  • Drop a party from a conference
  • Mute/un-mute a party in a conference
  • Visualize talking parties within a conference

Conference Bridge Features:

  • Loudest Party Talks: the technology dynamically selects the dominant speaking voice and excludes all other voices and sounds to the other conference attendees.
  • Additive: Much like a traditional phone conference, each party hears all voices speaking within the conference.
  • Multiple Loudest Party: combines elements of both of the above. The technology selects the loudest voices, or a pre-selected group of voices, or a combination of both.
  • This collection of features allows you to easily facilitate a large phone conference.

Extreme Conferencing Capabilities

  • The conference initiator has the option to join or not join the conference.
  • Members can join as “listen only” members
  • The audio of one member can be isolated from selected other members
  • Radio Push To Talk (PTT) signals can be transmitted through a conference
  • Conferences can be password protected
  • Members can be given priority status, with highest priority becoming loudest voice heard

REDCOM Secure device module

The Secure Device Module can be installed into any empty module bay in the REDCOM SLICE or SLICE 2100. To create the SWT remote capability, each REDCOM Secure Device Module connects a SLICE or SLICE 2100 to 4 SWT voice encryptors (made by General Dynamics C4 Systems). This module enables any SLICE line or trunk port (and using REDCOM TRANSip®, any VoIP port) to conduct secure voice communications with any SCIP-compatible terminal in the world. The voice path from the REDCOM system to the external SCIP compatible terminal is completely secure. SCIP encryptors, such as the General Dynamics Sectéra Wireline Terminal (SWT) and the L-3 Omni, are compatible with any SCIP device.

Secure inter-site communications

Organizations routinely protect their corporate computing networks with firewalls. When it comes to protecting voice communications, a REDCOM SLICE or SLICE 2100 equipped with the Secure Device Module can provide inter-site security. As an additional benefit, ordinary subscribers in their REDCOM Secure Device equipped networks can communicate securely with SCIP-compatible terminals at remote locations. This allows organizations ranging from defense communicators to banking and financial networks to discuss their operations with the assurance that they are not overheard. On a system equipped with REDCOM’s TRANSip IP technology suite, VoIP voice communications can be secured as well.

 
^ Back to Top