Close the Door to Cyber Threats

Your logging recorder sits on your network and connects to other communications systems. As a result, it is especially open to cyber attacks. If it is compromised, your recorder could be used as a weapon to spread malicious software to your other mission-critical systems.

This is why Exacom takes cybersecurity very seriously.

Safeguard Your Data

  • NIST 800-53 and NIST 800-171 Compliance: Ongoing efforts for all applicable NIST 800-series standards compliance
  • FIPS 140-2 & FIPS 140-3 Encryption: FIPS 140-2 certified solutions available; FIPS 140-3 compliance in progress
  • Secure Access to Recordings: Windows Active Directory SSO support for user and credential management, multi-factor authentication (MFA) login for users, and control over password complexity. Additionally, it ensures tight access controls for users, channels, software features, and more
  • Ongoing Software Patches & Updates: Continual Windows OS Security Patch resolution
  • Data Safeguards: Encryption at Rest data security for all deployment types
    • Full disk encryption
    • File-level encryption
    • Database encryption

Safeguard Your Network

  • Network Safeguards: 100% Commercial Off the Shelf hardware with all development, testing and assembly done in the United States. Any third-party software & hardware components are carefully screened
  • Trade Agreements Act (TAA) Compliance: Options for Trade Agreements Act (TAA) compliant COTS hardware that is manufactured in a trusted country
  • CMMC Level 1 & 2 Compliance: Exacom is in process to become both Cybersecurity Maturity Model Certification Level 1 and Level 2 compliant to safeguard remote access & your agency/company information
  • Ongoing Static/Dynamic Software Security Scanning: ongoing software security scanning during development to prevent known attack vectors

Exacom’s JITC Certification

Certified for Analog, VoIP/SIP, Avaya & Cisco SBC Interfaces

Exacom completed the rigorous Interoperability (IO) and Cybersecurity (CS) testing and certifications with both the Avaya Aura VoIP solution and the Cisco UCM.

With this broad approval, federal departments can communicate on-base or across the world on different communications platforms. The recorder falls within the Customer Premises Equipment (CPE) category in the APL.

JITC Testing Compliance Standards:
  • Application Security and Development STIG 4.11

  • IIS Server STIG 1.11

  • MS SQL Server Database STIG 1.6

  • MS SQL Server Instance STIG 1.10

  • Windows Server 2019 STIG 1.5

  • Voice Video Endpoint SRG 1.11

  • Voice/Video over Internet Protocol (VVoIP) STIG 3.14

  • Microsoft DotNet Framework 4.0 STIG 1.9

  • Network Infrastructure Policy STIG 9.10

Why Is JITC Certification Critical?

Cybersecurity: Leveraging a JITC-certified recording solution is vital to an agency’s cybersecurity posture. A JITC-certified product ensures that the logging recorder is secure and less likely to be compromised, which is essential as it sits on the network and connects to other communication systems. Any non-certified solution introduced into an agency’s network opens the door for cyber attacks, regardless of how “secure” a solution is purported to be.

Interoperability: JITC certification is important for maximizing interoperability across all systems in the communications network. This means that the logging recorder can work seamlessly with various other systems, enhancing efficiency and effectiveness.

Compliance with Standards: The JITC certification is a globally recognized standard for military-grade technology. It is granted only after rigorous testing for compliance with strenuous physical and cybersecurity requirements defined by the Defense Information Systems Agency (DISA) and National Institute of Standards and Technology (NIST) agencies of the United States government3.

Trust and Reliability: A JITC-certified logging recorder provides reassurance that the product is highly secure and interoperable. This trust is particularly important for government agencies and organizations dealing with sensitive information.

Cyber Secure Certification Department of Defense

Focused on Cybersecurity

Your logging recorder sits on your network and connects to other communications systems. As a result, it is particularly open to cyber attacks. Exacom takes every step possible to ensure the security of your recorder and networks.

American-Owned & Operated

Exacom multimedia logging recorders are 100% American-Made. All research, production, and manufacturing is done within the United States. Additionally, all of our Sales and Support Offices are located throughout North America.

  • City of Dallas Cybersecurity Attack: A Digest

    278 Views

  • Why Information Assurance (IA) Alone Isn’t Enough for Govt Agencies

    414 Views

  • Navigating the Frontlines: Key Trends that Shaped Public Safety in 2023

    629 Views