Close the Door to Cyber Threats
Your logging recorder sits on your network and connects to other communications systems. As a result, it is especially open to cyber attacks. If it is compromised, your recorder could be used as a weapon to spread malicious software to your other mission-critical systems.
This is why Exacom takes cybersecurity very seriously.
Exacom’s JITC Certification
Certified for Analog, VoIP/SIP, Avaya & Cisco SBC Interfaces
Exacom completed the rigorous Interoperability (IO) and Cybersecurity (CS) testing and certifications with both the Avaya Aura VoIP solution and the Cisco UCM.
With this broad approval, federal departments can communicate on-base or across the world on different communications platforms. The recorder falls within the Customer Premises Equipment (CPE) category in the APL.
JITC Testing Compliance Standards:
Why Is JITC Certification Critical?
Cybersecurity: Leveraging a JITC-certified recording solution is vital to an agency’s cybersecurity posture. A JITC-certified product ensures that the logging recorder is secure and less likely to be compromised, which is essential as it sits on the network and connects to other communication systems. Any non-certified solution introduced into an agency’s network opens the door for cyber attacks, regardless of how “secure” a solution is purported to be.
Interoperability: JITC certification is important for maximizing interoperability across all systems in the communications network. This means that the logging recorder can work seamlessly with various other systems, enhancing efficiency and effectiveness.
Compliance with Standards: The JITC certification is a globally recognized standard for military-grade technology. It is granted only after rigorous testing for compliance with strenuous physical and cybersecurity requirements defined by the Defense Information Systems Agency (DISA) and National Institute of Standards and Technology (NIST) agencies of the United States government3.
Trust and Reliability: A JITC-certified logging recorder provides reassurance that the product is highly secure and interoperable. This trust is particularly important for government agencies and organizations dealing with sensitive information.