What is C5ISR?

Soldier sitting on rocky surface using laptop and radio

C5ISR is an acronym for Command, Control, Computers, Communications, Cyber, Intelligence, Surveillance and Reconnaissance. REDCOM’s proven C2 solutions form the foundation for expanded C5ISR or C6ISR capabilities at the tactical edge.

What is the Zero-Trust Architecture?

Padlocks securing a network grid

After reviewing the DoD reference ZTA put forward by DISA we identified many notable trends and significant findings. In this article, we discuss our observations on the DISA Reference ZTA and posit different strategies for effectively mitigating the technical, organizational, and strategic risks associated with them. 

Meeting U.S. Army future operating concepts with Sigma XRI

In the next fight, ease of use, interoperability, and integration with Joint and Coalition forces will be critical for mission success. In line with these operational concepts, REDCOM presents Sigma® XRI-400, a full-featured C2 platform that delivers voice, video, chat, and radio interoperability in a single box.

Mitigating Supply Chain Risks

For decades outsourcing manufacturing to foreign nations has become the new normal across all industries. But now the United States is coming face-to-face with the consequences of handing control of technology and the supply chain to foreign entities.

Honoring our Veterans – Recognizing Veterans Day at REDCOM

Veterans Day is not only an important day in our country, but it’s an important day at REDCOM. With 14% of our workforce comprised of veterans, we appreciate not only their service to our country but their understanding and commitment to the customers that we have within the United States military.

Tips for Cybersecurity Awareness Campaigns

Cybersecurity Campaign Tips

Today more than ever, having a diligent cybersecurity posture is critical to keeping valued information secure. While many organizations run cybersecurity awareness seminars and presentations, new research shows these actions are not always effective. Read this post to explore the research and dive into suggested ways to help improve the odds of an awareness campaign being successful.

Command and Control (C2) at the Tactical Edge

Command And Control At The Tactical Edge

In the context of military operations, command and control (C2) at the tactical edge governs the ability to communicate and respond to threats. In this post, REDCOM looks at a couple of challenges that face our military’s ability to maintain C2 in future engagements at the tactical edge.

Cybersecurity Tips and Tricks for Working from Home

The ease of being able to connect to work at any time day or night from home, and have everything you need in your living room office poses the question, is my network safe? As part of Cybersecurity Awareness Month, here are some top tips to make sure you and your network are staying protected.