Identity and Authentication: the most important pillars in a Zero Trust Architecture

The DoD document, Zero Trust Reference Architecture, is quite expansive and a bit intimidating. One of the most critical points discussed are the seven key pillars — or focus areas — to implementing a zero trust environment.
REDCOM Sigma: the C2 foundation for Army Capability sets and network modernization

Every two years the Army comes out with a new set of iterative series of integrated tactical communications packages for delivery to Soldiers. Each capability set builds on that of the previous iteration to complete the end goal of forming a multi-domain capable network by 2028.
REDCOM ZKX FAQ

In November 2021 REDCOM and AFCEA hosted a webinar where the current state of the Zero Trust Architecture at the tactical edge was discussed along with our newest solution, ZKX. We had lots of audience questions, but we weren’t able to get to them all in the allotted time. So, we decided to form this FAQ.
Zero Trust vs. Zero Knowledge

The two concepts might be similar in the name; however, they are in fact two completely different ideas. Zero-Knowledge can be used to help complete the notion of Zero Trust, but it cannot work in the opposite.
REDCOM Webinar: Zero Trust Architectures for the Tactical Edge

Watch our webinar: Zero Trust Architectures for the Tactical Edge
The importance of low SWaP C2 for the U.S. Air Force

The United States Air Force is going all-in on Agile Combat Employment (ACE), a concept of operations that relies less on large overseas airfield “hubs” and more on smaller “spokes” —tiny, nimble airstrips that enable the Air Force to launch aircraft from anywhere and maneuver faster than ever before.
Killing the CAC

Since 1999 the Common Access Card (CAC) has been the norm for service members. The CAC has been the standard for so long that the industry has now created technology that far surpasses the CAC. The industry is moving from a net-centric to a data-centric approach. This shift is part of the call to “Kill the CAC.”
Current State of Chat at the Tactical Edge

Communications at the tactical edge are constantly evolving. During OIF, OEF, OIR, and OND, chat grew exponentially as a primary form of communication, proving its place as an essential component of the Command and Control toolkit.
JADC2 at the Tactical Edge

Command and Control systems are fundamental to all military operations, delivering the critical information necessary to plan, coordinate, and control forces and operations across the full range of Department of Defense (DoD) missions.
Cybersecurity and Radio Interoperability at the Tactical Edge

In today’s technological climate, cybersecurity is becoming more important to mission success by the day. As our near-peer adversaries continue to invest in cyber capabilities for protection as well as aggression, it is critical that we secure our technological assets across all echelons. Such security is equally important to both the strategic decision-maker and tactical warfighter. REDCOM Sigma XRI is designed with these considerations in mind and is rigidly purpose-built for even the most intense cyber operations.