REDCOM Secure Voice Gateway use cases

Data Encryption Cyber Protect

Over the past 18 months, REDCOM has seen an uptick in requests from Federal Agencies and DoD organizations that need to replace non-compliant legacy encryptors with new CryptoMod Standards. Customers have articulated the same problems about their current Type-1 Secure Conferencing systems: they are not ACC compliant; they suffer from poor voice quality; or they frequently do not work, forcing them to rely on another agency’s conferencing bridge.

REDCOM and Exacom successfully demonstrate interoperability

REDCOM is proud to announce the successful interoperability test between REDCOM Sigma and Exacom HindSight. This interoperability test demonstrates a proven and secure call recording solution ideally suited for sensitive government and military networks.

Are your multi-party secure comms ACC compliant?

You can communicate securely and be ACC compliant by using General Dynamics Sectéra® vIPer™ phones, however, this is only point-to-point.
If you need to conference together multiple parties anywhere in the world using ACC-compliant Type 1 encryption, then you need the REDCOM Secure Voice Gateway (SVG). The REDCOM SVG enables any number of conferees to easily communicate securely whether they are on the red side or black side of the network.

REDCOM launches the first release of ZKX, cybersecurity authentication software built for Zero Trust government and military networks

REDCOM Laboratories, Inc. has announced that the first release of its market-disrupting cybersecurity authentication software, ZKX, is now ready for field exercises and laboratory testing. The ZKX software will provide government and military organizations with the authentication technology required to migrate their existing IT infrastructures to Zero Trust networks.

What is a Cybersecurity Expert?

The term cybersecurity expert is overplayed. There is no official or legal definition, and between companies, the meaning of “cybersecurity expert” can vary greatly. As we talk to others, what attributes do we use to signal that we are cybersecurity experts?

REDCOM ZKX FAQ

SWT alternative

In November 2021 REDCOM and AFCEA hosted a webinar where the current state of the Zero Trust Architecture at the tactical edge was discussed along with our newest solution, ZKX. We had lots of audience questions, but we weren’t able to get to them all in the allotted time. So, we decided to form this FAQ.