Zero Trust Architecture

Protect the tactical network with pinpoint accuracy

Zero Trust architecture (ZTA) is a security strategy designed to eliminate “trust” by continuously authorizing network interactions. Traditional networks sacrifice security for user-focused attributes such as speed and ease of use. Security is typically relegated to the network’s perimeter, only requiring authentication once per session for a user to enjoy the privileges associated with said account. As cyber threats continue to evolve, we have seen that the current network philosophy will not be sufficient to defend against adversaries.

military jeep connected to a checkmark

ZTA built for the tactical edge

REDCOM is a leading voice in the conversation on actualizing ZTA at the tactical edge, and has partnered with ZKX Solutions, a company that started as a business unit of REDCOM Laboratories, Inc. ZKX Solutions has developed a new disruptive authentication technology, ZKX Helix.

Helix offers seamless and frictionless multi-factor authentication designed to embody the foundational principles of Zero Trust. By destroying private authentication keys and scattering their pieces between the user and their device, the user and the device are bound together as one entity. This eliminates the threat of phishing attacks and accessing data from stolen devices.  

Brilliance in the basics

The complexities of warfare increase within the cyber domain when technologies are used to gain an advantage, which can quickly become an asymmetrical threat. Helix is designed to shield this type of threat. This software is platform-agnostic, working within and outside a Zero Trust architecture, and making it easily to implement in new and existing networks. ZKX is driven by the ability to implement low SWaP software solutions reducing the equipment footprint at the tactical edge. 

Military tent with satellite transmitter connected to check mark
Microchip connected to a shield

Unparalleled Data protection

Protecting personal information and data is critical in the cyber domain, where network breaches are common. Zero Trust works under the assumption that your network has already been hacked. This means Helix authenticates not only the user but the device attempting to access data as well. No personal data is stored within this solution, so that if a device become compromised, no personal information is at risk. 

  • Enables enforcement of access policies at macro and micro scales 
  • Patented MFA simultaneously validates users and their devices for improved security and network access visibility 
  • User/Device pairs are continually authenticated in a process transparent to the end user 
  • Security is upheld even when user credentials are phished, leaked, or otherwise compromised 

Interoperability

REDCOM and ZKX Solutions align with the ongoing modernization efforts of global military and defense forces that demand interoperability with both legacy and emerging technologies. REDCOM has more than 40 years of experience building equipment that can reliably connect multiple disparate devices across all echelons. Our Zero-Knowledge authentication solution is interoperable with different network mediums such as satellite, RF radio frequency, and IP networks. 

people connected to a network and a checkmark