Enhancing Unity of Effort for C2 at the Tactical Edge

Future operating concepts across all branches of the U.S. military outline the need to:

  • Modernize the network
  • Make technology easier to use
  • Become more efficient and mobile
  • Improve the integration with Joint and Coalition forces
  • Reduce training and lifecycle costs

In line with these directives, REDCOM developed Sigma®, a warfighter C2 platform deployed and proven in multiple programs within the U.S. Army PEO C3T.

This webinar introduces Sigma XRI, a small and ruggedized communications platform that brings voice, video, chat, and radio interoperability to all echelons of the tactical edge. This new platform minimizes the equipment and logistics required to bring disparate radio and IP devices together and enables full stand-alone C2 comms in Disconnected, Intermittent, and Limited Bandwidth (DIL) environments.


Secure Voice Gateway & Conferencing

REDCOM and General Dynamics Mission Systems are collaborating to provide the only viable solution for ACC compliant Type-1 voice communications and conferencing. In this webinar, REDCOM’s Jerry Totsline teams up with Chris Hubbard of GDMS to discuss the following:

  • Upcoming cryptographic requirements
  • Modernization considerations for ACC compliance
  • How to leverage next-generation technology for dynamic secure voice conferencing needs

This video was hosted by General Dynamics Mission Systems, please click this link to register and view the webinar.


Command and Control for the Tactical Edge

The United States Army is currently undergoing a massive network modernization effort spanning multiple programs. REDCOM’s C2 communication solutions are a critical part of these programs at the battalion down to the squad. In this webinar, REDCOM’s Courtney Stiles and Michael Scaravillo outline how REDCOM technology is being implemented by the Army to improve efficiency, mobility, resiliency, and interoperability.


Securing the Mission

In today’s information-intense domain, security is absolutely critical to the success of the mission. But what exactly does the term “security” mean? While encryption is important and very much central to security, we believe mission security hinges on three other factors working together with encryption and validation: interoperability, ease of use, and resiliency.


Cleared for Conferencing

When connecting multiple co-workers and customers, conference calls are usually the platform for collective communications. If your conversations are sensitive or proprietary, protecting the call is of utmost importance.

Watch the webinar for:

  • Why a COTS solution for secure conferencing isn’t enough
  • DOTMLPF-P friendly software
  • How standards-based architecture maximizes operational flexibility
  • Live demo of REDCOM’s Conference Manager App

Communications at the Pace of Operations

The modern battlefield and demands of warfighters have greatly evolved in the last decade. See how the latest communications technology answers these demands and keeps the most important conversations connected and secure.


Expanding the Role of the IMS Application Server (IMS AS) to Address 2020 Challenges

In this webinar, REDCOM will share case studies, highlighting the experiences from our Carrier partners with using the IMS AS to fulfill new demands and regulations from this year.

Watch the demo for:

Specific use cases from real carriers
Addressing the March 2020 mandate for Rip & Replace
Augmenting the mandate for STIR/SHAKEN
Providing specialized functions specific to growing and changing subscriber usage


The Next-Generation Network: Are we there yet?

For years now we have been chasing the “Next Generation”, when in reality the network has been evolving all along. So the question is, are we there yet? Are we at the realization of Next-Generation? Are we close – maybe on the brink? And if so, now what?


Keeping up with the Standards and Mandates: STIR/SHAKEN and Beyond

As we all know, Robocalls, Telemarketers, and other nuisance calls continue to be the number one source of complaints at the FCC, FTC, CRTC, various European regulators, Australia’s ACMA and I’m sure several others globally.

Recently, both the FCC and CRTC have put in place regulatory mandates for Carriers to address this problem. Specifically, the implementation of STIR/SHAKEN has become strongly recommended/required to address the problem of un-trusted call originators.

In the scramble to address the regulatory mandates, carriers need to understand and balance:

  • The technical hurdles introduced
  • The behavior this will (or will not) force on the average consumer
  • The impacts to the premium subscribers (enterprises, hospitals)
  • The overall architecture of the network