Establishing Battlefield Superiority with Core Command and Control functions

Command and Control (C2) refers to the strategic, operational, and tactical communications systems used to manage the mission and synchronize situational awareness. Our C2 solutions include the core functionality — voice, video, and chat — required in all environments, from the network operations center out to the tactical edge.
What is CMOSS?

The U.S. Army defined a suite of open architecture standards to reduce C5ISR (command, control, computers, communications, cyber-defense, intelligence, surveillance, and reconnaissance) demands. These standards will address SWaP (System Size, Weight, and Power) requirements and provide commonality across multiple platforms by sharing hardware and software components. This architecture defines CMOSS, (C5ISR Modular Open Suite of Standards), driving a change in how hardware and software interact.
What is C5ISR?

C5ISR is an acronym for Command, Control, Computers, Communications, Cyber, Intelligence, Surveillance and Reconnaissance. REDCOM’s proven C2 solutions form the foundation for expanded C5ISR or C6ISR capabilities at the tactical edge.
What is the Zero-Trust Architecture?

After reviewing the DoD reference ZTA put forward by DISA we identified many notable trends and significant findings. In this article, we discuss our observations on the DISA Reference ZTA and posit different strategies for effectively mitigating the technical, organizational, and strategic risks associated with them.
Meeting U.S. Army future operating concepts with Sigma XRI

In the next fight, ease of use, interoperability, and integration with Joint and Coalition forces will be critical for mission success. In line with these operational concepts, REDCOM presents Sigma® XRI-400, a full-featured C2 platform that delivers voice, video, chat, and radio interoperability in a single box.
Mitigating Supply Chain Risks

For decades outsourcing manufacturing to foreign nations has become the new normal across all industries. But now the United States is coming face-to-face with the consequences of handing control of technology and the supply chain to foreign entities.
Secure Voice Conferencing at the Government Level

Secure voice conferencing solutions are becoming increasingly important as the way we work and collaborate evolves with more companies and government agencies adopting remote work policies.
What are Advanced Cryptographic Capabilities (ACC)?

Advanced Cryptographic Capabilities (ACC) is a National Security Agency (NSA) mandated standard for asymmetric cryptographic algorithms providing confidentiality services.
Honoring our Veterans – Recognizing Veterans Day at REDCOM

Veterans Day is not only an important day in our country, but it’s an important day at REDCOM. With 14% of our workforce comprised of veterans, we appreciate not only their service to our country but their understanding and commitment to the customers that we have within the United States military.
Tips for Cybersecurity Awareness Campaigns

Today more than ever, having a diligent cybersecurity posture is critical to keeping valued information secure. While many organizations run cybersecurity awareness seminars and presentations, new research shows these actions are not always effective. Read this post to explore the research and dive into suggested ways to help improve the odds of an awareness campaign being successful.