SECURE
Secure IP, hardware and software to protect mission-critical systems
EXPLORE SECURE SOLUTIONS
Side-Channel Attack Resistant Chip-Scale IP
Secure IP and PUF technologies to counteract threats to sensitive data and provide device identification.
LDS3507 3U Single Board Computer, BuiltSECURE
SOSA-aligned board with Intel Xeon D CPU, UltraScale+ FPGA and advanced SSE security.
LDS6708 6U Single Board Computer, BuiltSECURE
SOSA-aligned board with Intel Xeon E or Core i7 CPU and and advanced SSE security.
HDS6705 6U Multiprocessing Board, BuiltSECURE
Intel Xeon Scalable server-class CPU, 96 GB DDR4, 40 GbE, PCIe Gen3, MOTS+ protection, and advanced SSE security
RTBX06 Rugged Trusted BuiltSECURE Servers
Dual Intel Xeon Gold Scalable processors in 1U/2U 20" form factors, up to 8 expansion slots, 384 GB DDR4 and SSE
RTBX05 Rugged Trusted BuiltSECURE Servers
Dual Intel Xeon E5-2600 v4 processors in 1U / 2U 20" form factors with up to 5 expansion slots, 128 GB DDR4, SSE
Custom Secure OpenVPX Subsystems
Pre-integrated, SWaP-optimized, customizable OpenVPX multifunction subsystems with program support services, security.
Thank you! We have received your message and will be in touch with you shortly.
Stay Ahead of Threats
Mitigate reverse engineering and safeguard against threats with features from our proven technology suite including:
• Commercial National Security Algorithm (CNSA)/Suite B ciphers
- AES 128/256 all modes
- SHA2 and SHA3
- RSA
- ECDSA/ECDH
- TRNG
• NIST CAVP certifiable
• Inline memory
• Encryption/decryption
• Random generator
• Side channel countermeasures
• Physical protection mechanisms
• Key management
• Data-at-rest protection

Security Services and Analysis
Mercury’s experienced system security engineers and customer support teams deliver affordable, end-to-end product security services including vulnerability assessments, technical training, classified capabilities and product-specific protection schemes. We can provide cybersecurity partner pre-integration, program protection planning assistance and red team/blue team vulnerability analysis.
Case Study
Maintaining System Integrity in a Dynamic Environment
Challenge: Establish trust at the hardware level to circumvent adversaries striking at the lowest possible level in software.
Solution: Integrate advanced cryptography solutions that defend FPGA and ASIC architectures against side-channel attacks and exposure of sensitive cryptographic keys during system boot and runtime.
Result: Defense-ready cryptography protects foundational silicon building blocks that underlie key processing elements. Critical information in current and post-quantum future digital systems is constantly secure and protected from local and remote attacks as well as key breaking.