Monthly Archives: March 2018

REDCOM Call Control Portfolio Recertified by DoD’s Joint Interoperability Test Command

REDCOM® today announced that three of its products focused on Cyber Security (CS) and Interoperable (I/O) communications have been officially recertified by the Joint Interoperability Test Command (JITC) and placed on the Department of Defense Information Network Approved Products List (APL).

HDX V4.0AR5P0, SLICE® V4.0AR5P0, and Sigma® Core 2.0.3 have all been carefully evaluated and approved as Local Session Controllers (LSC). All three products deliver powerful capabilities highly relevant to the military, including support for the Assured Services Session Initiation Protocol (AS-SIP), IPv4/IPv6 dual stack, Multi-Level Precedence and Preemption (MLPP), conferencing, and secure communications.

HDX and SLICE® are REDCOM’s hybrid hardware platforms that enable seamless interoperability between IP, TDM, and radio networks. Sigma Core is REDCOM’s flagship military-grade software call control platform that delivers robust call control, media handling, and encrypted communications.

REDCOM systems can function as a stand-alone Local Session Controller (LSC) or as an adjunct to an existing Enterprise Session Controller (ESC) to deliver advanced voice services such as transcoding and conferencing for red and black networks.

An Introduction to Cryptography and the Public Key Infrastructure

A White Paper by Mike Gates, Sales Engineer, REDCOM

Like it or not, we are living in a virtual world and using the internet for everyday tasks has become commonplace. We can visit a virtual branch of our bank and pay our bills, stream the latest episode of our favorite television program, or even take our credit card on a spending spree at a virtual mall. The internet is a major component of our lives today and provides an extremely convenient service. We sometimes need to be cautious when using that service, however. What if your bank account or credit card information was available to others during your stroll through the virtual world?

While this document won’t provide specific details on protecting your bank account, the methods used to protect this type of information are applicable to protecting other types of data. Much like the security used by a web browser to protect your bank account information the same methods can be used to protect other types of information, such as the signaling and media transmitted during a voice over internet protocol (VoIP) call.

Without a doubt, the methods and tools used to secure information that is transmitted across a network are complex subjects. Entire textbooks are devoted to each of these areas. This document is not intended to provide a comprehensive study of these subjects. Rather, a brief overview with enough information to understand the fundamentals of the subject is the goal here. Sources of additional reading will be provided at the end of the document should you wish to dig deeper into these topics.

Download the White Paper