Secure

SECURE

Secure IP, hardware and software to protect mission-critical systems

 

Merc_ProcessingPlatform_Secure.png

EXPLORE SECURE SOLUTIONS

Side-Channel Attack Resistant Chip-Scale IP

Secure IP and PUF technologies to counteract threats to sensitive data and provide device identification.

DISCOVER MORE

LDS3507 3U Single Board Computer, BuiltSECURE

SOSA-aligned board with Intel Xeon D CPU, UltraScale+ FPGA and advanced SSE security.

DISCOVER MORE

LDS6708 6U Single Board Computer, BuiltSECURE

SOSA-aligned board with Intel Xeon E or Core i7 CPU and and advanced SSE security.

DISCOVER MORE

HDS6705 6U Multiprocessing Board, BuiltSECURE

Intel Xeon Scalable server-class CPU, 96 GB DDR4, 40 GbE, PCIe Gen3, MOTS+ protection, and advanced SSE security

DISCOVER MORE

RTBX06 Rugged Trusted BuiltSECURE Servers

Dual Intel Xeon Gold Scalable processors in 1U/2U 20" form factors, up to 8 expansion slots, 384 GB DDR4 and SSE

DISCOVER MORE

RTBX05 Rugged Trusted BuiltSECURE Servers

Dual Intel Xeon E5-2600 v4 processors in 1U / 2U 20" form factors with up to 5 expansion slots, 128 GB DDR4, SSE

DISCOVER MORE

Custom Secure OpenVPX Subsystems

Pre-integrated, SWaP-optimized, customizable OpenVPX multifunction subsystems with program support services, security.

DISCOVER MORE

What is BuiltSECURE™ Technologies

Proven and ready for deployment in the most hostile locations at the tactical edge, BuiltSECURE technology protects critical data and enhances cybersecurity with industry leading physical security, cryptography, and secure boot features. Trusted by leading FPGA manufactures in their products, BuiltSECURE system security engineering (SSE) IP is built-in, not bolted on, to deliver secure processing performance that protects sensitive algorithms and data—even if the platform is compromised.

Stay Ahead of Threats

Mitigate reverse engineering and safeguard against threats with features from our proven technology suite including:

 

REQUEST AN ON-SITE BRIEFING

• Commercial National Security Algorithm (CNSA)/Suite B ciphers
    - AES 128/256 all modes
    - SHA2 and SHA3
    - RSA
    - ECDSA/ECDH
    - TRNG
• NIST CAVP certifiable
• Inline memory
• Encryption/decryption
• Random generator
• Side channel countermeasures
• Physical protection mechanisms
• Key management
• Data-at-rest protection

MLT_ServerRoom_TwoPeople_Monitor.jpg

Security Services and Analysis

Mercury’s experienced system security engineers and customer support teams deliver affordable, end-to-end product security services including vulnerability assessments, technical training, classified capabilities and product-specific protection schemes. We can provide cybersecurity partner pre-integration, program protection planning assistance and red team/blue team vulnerability analysis.

Case Study

Maintaining System Integrity in a Dynamic Environment

Challenge: Establish trust at the hardware level to circumvent adversaries striking at the lowest possible level in software.

Solution: Integrate advanced cryptography solutions that defend FPGA and ASIC architectures against side-channel attacks and exposure of sensitive cryptographic keys during system boot and runtime.

Result: Defense-ready cryptography protects foundational silicon building blocks that underlie key processing elements. Critical information in current and post-quantum future digital systems is constantly secure and protected from local and remote attacks as well as key breaking.

DISCOVER MORE