Data at Rest Encryption

Protect Classified and Sensitive Information with Military-Grade Encryption

Data deployed at the edge and in critical systems must be protected from local or remote attacks. Field-proven and certified encryption modules demonstrate how the Mercury Processing Platform supports mission-ready, trusted solutions utilizing our core security technologies, which safeguard information and meet government mandate requirements.

VIEW PRODUCTS

JDAR NSA Certified Type 1 Data-at-rest Encryptor for Unattended Operations

Protect Data and Deploy Anywhere
Secure
Secure

NSA Type-1, FIPS 140-2, CsFC

Compact
Compact

Low size, weight and power (SWaP)

Rugged
Rugged

MIL-STD 810/461, DO-160

Easy to Integrate
Easy to Integrate

Embedded and tailored systems

Prevent Unauthorized Access with Proven Technology

Mercury's encryption and cryptography solutions have been used by government, military, and financial institutions for decades to protect sensitive information from unauthorized access or interception. If a system is compromised, key purge, fast erase, sanitization, zeroization, self-destruct military protocols, and other configurable features ensure data is forensically unrecoverable.

ASK A QUESTION

BUILTSECURE SOLUTIONS

Protect Your Critical Data and IP

Solutions with BuiltSECURE™ technology maintain your data integrity with built-in cryptography, secure boot and physical protection technologies that have been developed over 25 years and proven across four generations of Intel® microarchitectures. 

DISCOVER MORE