Protect your intellectual property by partnering with the right U.S.-based manufacturer

Secure Manufacturing

Selecting the right contract manufacturing partner can make or break your business, especially if there’s the potential for your intellectual property to fall into the wrong hands. REDCOM EMS can mitigate these problems with our secure, NIST-compliant manufacturing facility located in western New York state. Not only do we manufacture domestically, but we also keep all of our sales, service, engineering, and project managers on-site as well. Protect your intellectual property and trade secrets by partnering with a trusted CM such as REDCOM EMS.

Who Salted my Hash?

It seems that every week lately there is a story on the evening news about a database that has been breached and a warning issued that hackers may have your login credentials. Network information security doesn’t appear to be too healthy. One ingredient that can be used to improve the health of the system is salt. Believe it or not, salt can actually help to improve the health of information security.

Alaskan Code Talkers – Bringing Secure Communications to WWII

Code Talkers played a critical role in our ability to command and control forces in the Pacific during World War II, maintaining secure communications and outsmarting our enemies. REDCOM prides itself of providing the most secure communications in the world and protecting the most important conversations. We respect and honor these men for doing the same.

SWaP – It’s bigger than ‘the box’

When most people think about low SWaP, they tend to focus solely on the size of the box itself, without thinking about everything that comes with it. In this post, we will take a more holistic approach to Low SWaP and address things such as batteries, generators, peripherals, transportation, and support personnel.
Looks can be deceiving, and the size of any given device is only a small part of the big picture.

Voice Security ++

Many systems claim to be secure, provide secure functionality, and may even be validated by an accredited security industry. However, what does it mean to be a good — or even usable — voice-based security system? What makes a secure voice platform exceptional?
We’ve identified four characteristics that we believe are common among secure communication systems that surpass the competition: governance, resiliency, user experience, and interoperability.

The importance of resiliency and redundancy on the battlefield

Command and Control

The U.S. keeps losing in simulated wars with Russia and China. In these simulations, our enemies don’t just sink ships and burn bases. They knock out America’s nerve center by hacking, jamming, or ultimately destroying our communications satellites, wireless networks, data networks, and command-and-control systems. Survival in the cyber domain against a peer competitor will require the ability to leverage multiple communication paths while retaining resiliency and redundancy that support command and control in distributed and disruptive operating environments. At REDCOM, we engineer our solutions to do just that.

What is Low-SWaP?

Low SWaP Solutions from REDCOM

In the past, deploying a full suite of comms gear to the tactical edge required equipment that was prohibitively large in size, weight, and power (SWaP). However, new solutions on the market today from companies such as REDCOM are overcoming those challenges with small form factor equipment and light, flexible software.

Sectera Wireline Terminal (SWT) Alternative

SWT alternative

REDCOM acknowledges recent industry statements regarding end of support for the Sectera Wireline Terminal (SWT). We’d like to take this time to reaffirm our support for secure voice communications. REDCOM continues to support a proven solution using the L3 Secure Terminal Equipment – Remote (STE-R) that is ACC capable.

When is the network not really the network?

DISA is moving forward with the idea of using remote browser technologies to provide isolation between DoD networks and the Internet. While this cyber strategy won’t eliminate the risk altogether, the new architecture will increase security posture.

Evaluating Encryption Schemes for Use in Secure Multi-Party VoIP Conferencing

REDCOM Research Assistant Collin Sweeney has authored a provoking white paper on different encryption schemes for secure, multi-party VoIP conferencing products. He addresses the current failure of the market to secure, real-time, n-party VoIP teleconferencing for private and commercial use. Interested in learning more? Download the white paper!