The importance of resiliency and redundancy on the battlefield

Command and Control

The U.S. keeps losing in simulated wars with Russia and China. In these simulations, our enemies don’t just sink ships and burn bases. They knock out America’s nerve center by hacking, jamming, or ultimately destroying our communications satellites, wireless networks, data networks, and command-and-control systems. Survival in the cyber domain against a peer competitor will require the ability to leverage multiple communication paths while retaining resiliency and redundancy that support command and control in distributed and disruptive operating environments. At REDCOM, we engineer our solutions to do just that.

What is Low-SWaP?

Low SWaP Solutions from REDCOM

In the past, deploying a full suite of comms gear to the tactical edge required equipment that was prohibitively large in size, weight, and power (SWaP). However, new solutions on the market today from companies such as REDCOM are overcoming those challenges with small form factor equipment and light, flexible software.

Sectera Wireline Terminal (SWT) Alternative

SWT alternative

REDCOM acknowledges recent industry statements regarding end of support for the Sectera Wireline Terminal (SWT). We’d like to take this time to reaffirm our support for secure voice communications. REDCOM continues to support a proven solution using the L3 Secure Terminal Equipment – Remote (STE-R) that is ACC capable.

When is the network not really the network?

DISA is moving forward with the idea of using remote browser technologies to provide isolation between DoD networks and the Internet. While this cyber strategy won’t eliminate the risk altogether, the new architecture will increase security posture.

Evaluating Encryption Schemes for Use in Secure Multi-Party VoIP Conferencing

REDCOM Research Assistant Collin Sweeney has authored a provoking white paper on different encryption schemes for secure, multi-party VoIP conferencing products. He addresses the current failure of the market to secure, real-time, n-party VoIP teleconferencing for private and commercial use. Interested in learning more? Download the white paper!

Quantum Computing and Secure Voice Encryption

Post Quantum Encryption White Paper

As new advancements are beginning to allow quantum computers to approach market-readiness, cybersecurity professionals are beginning to address their security frameworks and the potential for post-quantum resistant encryption schemes.