REDCOM Secure Voice Gateway use cases

Data Encryption Cyber Protect

Over the past 18 months, REDCOM has seen an uptick in requests from Federal Agencies and DoD organizations that need to replace non-compliant legacy encryptors with new CryptoMod Standards. Customers have articulated the same problems about their current Type-1 Secure Conferencing systems: they are not ACC compliant; they suffer from poor voice quality; or they frequently do not work, forcing them to rely on another agency’s conferencing bridge.

Code Talkers: Transmitting messages in Choctaw

The need for secure communication is as old as tactical communication itself. When the US Army entered combat during World War One, the communications gear of the 1918 era was crude by today’s standards but still highly effective within the prevailing combat environment in France. German forces quickly developed ways to listen in on American tactical communications. In response, the Army leveraged a unique element of American culture and diversity to create a highly effective and uniquely American solution for secure tactical communication.  

C2 comms in one platform: improving interoperability while lowering lifecycle costs

Blue mesh network MANET

Today’s C2 communications are more complex and expensive than they need to be. All branches of the U.S. Military — and many coalition partners — are seeking next-gen technology to improve resiliency and mobility while simultaneously reducing costs and training time. REDCOM has always emphasized interoperability, ease of use, and flexibility. We built Sigma from the ground up based on these core tenets and to meet requirements for tactical users.

Are your multi-party secure comms ACC compliant?

You can communicate securely and be ACC compliant by using General Dynamics Sectéra® vIPer™ phones, however, this is only point-to-point.
If you need to conference together multiple parties anywhere in the world using ACC-compliant Type 1 encryption, then you need the REDCOM Secure Voice Gateway (SVG). The REDCOM SVG enables any number of conferees to easily communicate securely whether they are on the red side or black side of the network.

Staying Connected in Crisis: Enabling C2 Comms in a Tactical Domain

The current situation over national sovereignty in eastern Europe has the world on edge. It began with cyberattacks and is quickly evolving into kinetic warfare. The requirement for effective, stand-alone C2 comms has become more important than ever before. REDCOM can play an important role in delivering proven C2 solutions to enable communications that help defend freedom anywhere in the world.

What is a Cybersecurity Expert?

The term cybersecurity expert is overplayed. There is no official or legal definition, and between companies, the meaning of “cybersecurity expert” can vary greatly. As we talk to others, what attributes do we use to signal that we are cybersecurity experts?