What is C5ISR?
C5ISR is an acronym for Command, Control, Computers, Communications, Cyber, Intelligence, Surveillance and Reconnaissance. REDCOM’s proven C2 solutions form the foundation for expanded C5ISR or C6ISR capabilities at the tactical edge.
What is the Zero-Trust Architecture?
After reviewing the DoD reference ZTA put forward by DISA we identified many notable trends and significant findings. In this article, we discuss our observations on the DISA Reference ZTA and posit different strategies for effectively mitigating the technical, organizational, and strategic risks associated with them.
Meeting U.S. Army future operating concepts with Sigma XRI
In the next fight, ease of use, interoperability, and integration with Joint and Coalition forces will be critical for mission success. In line with these operational concepts, REDCOM presents Sigma® XRI-400, a full-featured C2 platform that delivers voice, video, chat, and radio interoperability in a single box.
Mitigating Supply Chain Risks
For decades outsourcing manufacturing to foreign nations has become the new normal across all industries. But now the United States is coming face-to-face with the consequences of handing control of technology and the supply chain to foreign entities.
Secure Voice Conferencing at the Government Level
Secure voice conferencing solutions are becoming increasingly important as the way we work and collaborate evolves with more companies and government agencies adopting remote work policies.
What are Advanced Cryptographic Capabilities (ACC)?
Advanced Cryptographic Capabilities (ACC) is a National Security Agency (NSA) mandated standard for asymmetric cryptographic algorithms providing confidentiality services.
Honoring our Veterans – Recognizing Veterans Day at REDCOM
Veterans Day is not only an important day in our country, but it’s an important day at REDCOM. With 14% of our workforce comprised of veterans, we appreciate not only their service to our country but their understanding and commitment to the customers that we have within the United States military.
Tips for Cybersecurity Awareness Campaigns
Today more than ever, having a diligent cybersecurity posture is critical to keeping valued information secure. While many organizations run cybersecurity awareness seminars and presentations, new research shows these actions are not always effective. Read this post to explore the research and dive into suggested ways to help improve the odds of an awareness campaign being successful.
Command and Control (C2) at the Tactical Edge
In the context of military operations, command and control (C2) at the tactical edge governs the ability to communicate and respond to threats. In this post, REDCOM looks at a couple of challenges that face our military’s ability to maintain C2 in future engagements at the tactical edge.
Cybersecurity Tips and Tricks for Working from Home
The ease of being able to connect to work at any time day or night from home, and have everything you need in your living room office poses the question, is my network safe? As part of Cybersecurity Awareness Month, here are some top tips to make sure you and your network are staying protected.