Company

Employee Feature: Collin Sweeney

October 18, 2019

With October the official month of cybersecurity awareness, REDCOM is proud to feature one of its Cybersecurity Researchers, Collin Sweeney.
Read More

Company

REDCOM partners with RIT Department of Computer Science to revolutionize encryption and authentication

October 14, 2019

REDCOM recently formed a partnership with the Rochester Institute of Technology and the Golisano College of Computing and Information Sciences to help us dig deeper into blockchain and Zero-Knowledge Proof (ZKP) technology. These advancements would give REDCOM its own modifiable and controllable authentication system that is distributed.
Read More

Announcements

REDCOM successfully demonstrates interoperability with Software Defined Radio technology at Air Force Research Labs

October 9, 2019

REDCOM Laboratories Inc., a leading developer of advanced communications solutions, has successfully completed extensive interoperability testing following a week-long exercise at the Air Force Research Lab (AFRL) in Rome, NY and Stockbridge, NY. The exercise involved multiple test scenarios leveraging the AFRL high-capacity software-defined radio (SDR) network, a flexible, high capacity network running on Commercial-off-the-Shelf (COTS) hardware.
Read More

Announcements

REDCOM announces partnership and reseller agreement with Mykrodyne

October 1, 2019

REDCOM Laboratories Inc. is pleased to announce a partnership and reseller agreement with Mykrodyne, a subsidiary of Intergraph Corporation. Mykrodyne will be reselling the entire portfolio of REDCOM products. Given the already intense Hurricane season in the Caribbean this year, of particular interest to Mykrodyne and potential customers is REDCOM’s solution set for disaster recovery communications.
Read More

Government

FIPS 140-2: Validation versus Compliance

When considering products or services for handling an agency’s information, it is common to see two variations of FIPS accreditation: FIPS validated and FIPS compliant. Although they seem similar, there are different implications with these two labels. 
Read More

Public Safety

To speed up disaster relief, restoring communications should be a priority

September 4, 2019

Natural disasters like Hurricane Dorian are increasing in severity and frequency. Dorian reminds us yet again of the need for us all to be prepared for the worst. When a disaster of this magnitude strikes, it often knocks out the power grid and communications infrastructure. Without the ability to communicate, everything suffers: relief coordination efforts, medical evacuations, and the resupply of food and water. To speed up disaster relief, it is imperative that we make restoring communications a priority.
Read More

Government

FIPS 140-3: What you need to know

August 26, 2019

REDCOM is aware of what needs to be done to keep up to date with all security protocols. So, what do you need to know in order to begin the FIPS 140-3 validation process? We’ve got it all mapped out for you.
Read More

Government

Equivalencies in Security

August 13, 2019

When in an online environment, many utilize encryption to protect their communications and personal data. Any encryption method will make data inherently safer than letting it remain unencrypted. How could one make an informed decision as to which cryptographic technique is right for them? We can turn to bits of security – a hypothetical measure of an encryption’s functional strength.
Read More

Military

Face It, Warfighters Need an Intuitive User Interface

July 18, 2019 | By: Michael Scaravillo

Technology developers must strike a balance between an interface that is visually appealing and one that’s functional. A user interface is a gateway — it’s a visual path to information or functionality that results in an experience. Warfighters need a clear and concise interface to give them clear and concise direction that isn’t cluttered by unnecessary options.
Read More

Service Providers

The Security Triad

Many sources equate secure communications to encryption. While encryption certainly plays a key role in a secure communications solution, it is not the only required element. The cybersecurity industry uses a model referred to as the security triad to define the various domains that need to be addressed when securing a network. The triad – sometimes also known as CIA – includes Confidentiality, Integrity, and Availability. This paper will review and define these domains for a better understanding of what is required to provide a complete secure communications solution.
Read More

Government

Thwarting Cyber Attacks with Honeypot System for Sigma

June 4, 2019 | By: Sal Ceravolo

Every device that carries information is worth hacking – even if the device operates behind firewalls, intrusion detection systems, or session border controllers. At REDCOM, we develop secure VoIP platforms that are intended to withstand harsh cyber environments without the protection provided by typical front-facing equipment.
Read More