Public Safety

To speed up disaster relief, restoring communications should be a priority

September 4, 2019

Natural disasters like Hurricane Dorian are increasing in severity and frequency. Dorian reminds us yet again of the need for us all to be prepared for the worst. When a disaster of this magnitude strikes, it often knocks out the power grid and communications infrastructure. Without the ability to communicate, everything suffers: relief coordination efforts, medical evacuations, and the resupply of food and water. To speed up disaster relief, it is imperative that we make restoring communications a priority.
Read More

Government

FIPS 140-3: What you need to know

August 26, 2019

REDCOM is aware of what needs to be done to keep up to date with all security protocols. So, what do you need to know in order to begin the FIPS 140-3 validation process? We’ve got it all mapped out for you.
Read More

Government

Equivalencies in Security

August 13, 2019

When in an online environment, many utilize encryption to protect their communications and personal data. Any encryption method will make data inherently safer than letting it remain unencrypted. How could one make an informed decision as to which cryptographic technique is right for them? We can turn to bits of security – a hypothetical measure of an encryption’s functional strength.
Read More

Military

Face It, Warfighters Need an Intuitive User Interface

July 18, 2019 | By: Michael Scaravillo

Technology developers must strike a balance between an interface that is visually appealing and one that’s functional. A user interface is a gateway — it’s a visual path to information or functionality that results in an experience. Warfighters need a clear and concise interface to give them clear and concise direction that isn’t cluttered by unnecessary options.
Read More

Service Providers

The Security Triad

Many sources equate secure communications to encryption. While encryption certainly plays a key role in a secure communications solution, it is not the only required element. The cybersecurity industry uses a model referred to as the security triad to define the various domains that need to be addressed when securing a network. The triad – sometimes also known as CIA – includes Confidentiality, Integrity, and Availability. This paper will review and define these domains for a better understanding of what is required to provide a complete secure communications solution.
Read More

Government

Thwarting Cyber Attacks with Honeypot System for Sigma

June 4, 2019 | By: Sal Ceravolo

Every device that carries information is worth hacking – even if the device operates behind firewalls, intrusion detection systems, or session border controllers. At REDCOM, we develop secure VoIP platforms that are intended to withstand harsh cyber environments without the protection provided by typical front-facing equipment.
Read More

Announcements

REDCOM Secure Client for Android receives FIPS 140-2 Validation

May 29, 2019

REDCOM completed the FIPS 140-2 validation process, receiving certificate #3189 in May and #3229 in July of last year. The REDCOM Secure Client for Android is now available with U.S. government certified encryption, making it eligible to be procured by federal agencies, including the Department of Defense. It is also approved for use in regulated industries such as utilities, finance, and healthcare, opening doors to significant future revenue.
Read More

Government

A way forward for End-of-Support Sectera Wireline Terminal (SWT) & STE-R

May 17, 2019

In early 2019, National Security Agency (NSA) announcement was made declaring End of Support (EOS) for the Sectera Wireline Terminal (SWT) and STE-R. What comes next for securing non-IP networks?
Read More

Government

REDCOM at the Ready: Hardening communications for EMP protection

May 17, 2019

The President signed an Executive Order directing the Federal government to prepare the United States for an EMP (Electromagnetic Pulse) attack by hardening critical infrastructure as much as possible. After almost 20 years of studies, the Federal government is starting to pay attention and REDCOM is taking action.
Read More

Announcements

REDCOM to exhibit military-grade call control software on Mercury Systems low-SWaP servers at SOFIC 2019

May 16, 2019

REDCOM Laboratories is pleased to announce it will be a part of the Mercury Systems booth at the Special Operations Forces Industry Conference in Tampa, FL, May 20-23, 2019. Designed to support U.S. Army modernization strategies, REDCOM and Mercury Systems are working together to deliver an integrated solution for mobile Army communications applications that range from tactical command posts to national and strategic-level communications.
Read More

Government

What is UX Design and Why is it Good for Product Design at REDCOM?

May 13, 2019

Lately, there has been a lot of talk in the media about User Experience when it comes to the design of products. This is true of both physical goods like telephones or cars and digital interfaces like websites and software. So, you may find yourself asking, “what exactly is UX, and why is someone’s ‘experience’ important?” REDCOM's UX Specialist, Jim Parrillo explains UX design, and why it's necessary for product design at REDCOM.
Read More