Cleared for Conferencing

When connecting multiple co-workers and customers, conference calls are usually the platform for collective communications. If your conversations are sensitive or proprietary, protecting the call is of utmost importance.

Watch the webinar for:

  • Why a COTS solution for secure conferencing isn’t enough
  • DOTMLPF-P friendly software
  • How standards-based architecture maximizes operational flexibility
  • Live demo of REDCOM’s Conference Manager App

Communications at the Pace of Operations

The modern battlefield and demands of warfighters have greatly evolved in the last decade. See how the latest communications technology answers these demands and keeps the most important conversations connected and secure.


The Next-Generation Network: Are we there yet?

For years now we have been chasing the “Next Generation”, when in reality the network has been evolving all along. So the question is, are we there yet? Are we at the realization of Next-Generation? Are we close – maybe on the brink? And if so, now what?


Keeping up with the Standards and Mandates: STIR/SHAKEN and Beyond

As we all know, Robocalls, Telemarketers, and other nuisance calls continue to be the number one source of complaints at the FCC, FTC, CRTC, various European regulators, Australia’s ACMA and I’m sure several others globally.

Recently, both the FCC and CRTC have put in place regulatory mandates for Carriers to address this problem. Specifically, the implementation of STIR/SHAKEN has become strongly recommended/required to address the problem of un-trusted call originators.

In the scramble to address the regulatory mandates, carriers need to understand and balance:

  • The technical hurdles introduced
  • The behavior this will (or will not) force on the average consumer
  • The impacts to the premium subscribers (enterprises, hospitals)
  • The overall architecture of the network