SecRun Integrated Security Platform

Protecting sensitive data and system integrity is imperative to mission success.

The SecRun security platform utilizes a combination of proven, secure IP technologies to counteract threats.

An advanced cryptography solution for ASIC and FPGA designs, SecRun minimizes the likelihood of accidental misuse or coding errors that can expose sensitive cryptographic keys during system boot and runtime.

SecRun combines SecBoot, InCipher and KeyGuard technologies to defend against side-channel attacks (SCA), prevent key leakage, store and guide keys at boot and runtime and perform automatic key refreshes to ensure all critical system information is protected and secure.

DOWNLOAD DATASHEET

Graphic showing superior performance of Mercury Systems rugged servers compared to the previous generation.

Protection Customizable to Fit Any Application

Integrate the SecRun security platform with SecBoot, InCipher and KeyGuard as a standalone capability into any existing FPGA and ASIC-based system or as part of a bundle on supporting embedded processing hardware.

  • SecBoot securely initializes memory devices from an external NVM in ASIC systems and deploys SCA countermeasures during device start-up in FPGA-based systems, ensuring no leakage of sensitive information even when exposed to the most aggressive cyber threats.
  • InCipher provides transparent encryption of DDR memory while implementing caching and best practices for key management. Using automatic and transparent re-keying during operation and highly effective SCA-resistance options, the risk of adversaries acquiring sensitive information is eliminated.
  • KeyGuard, already prepared for use with SCA-resistant ciphers, securely manages storage to protect keys at rest and performs key-agreement protocols to establish new keys directly within the key manager.

REQUEST SECRUN TECH BRIEF

What is BuiltSECURE™ Technologies

Protection for critical data and enhanced cybersecurity ready for deployment in the most hostile, tactical edge locations. Confidently deploy mission-critical technology with proven, industry leading physical security, cryptography and secure boot system security engineering (SSE) IP. Built in, not bolted on, to protect sensitive algorithms and data—even if the platform is compromised.

ASK A QUESTION

Explore Mercury Hardware Supporting SecRun

Embedded Processing Subsystems

Embedded Processing Subsystems

Pre-integrated, SWaP-optimized, customizable OpenVPX multifunction subsystems with program support services, security

SEE MORE

Rugged Trusted BuiltSECURE Servers

Rugged Trusted BuiltSECURE Servers

Reliable and trusted performance for the most security-imperative mission-critical applications

SEE MORE

Multiprocessing

Multiprocessing

6U OpenVPX multifunction boards powered by server-class Intel Xeon Scalable processing technology

SEE MORE

Single Board Computers

Single Board Computers

Feature the latest Silicon Valley processing technology and next-generation flight-certifiable multicore processors

SEE MORE

FPGA Processor

FPGA Processor

Speed your unique application with rugged and COTS FPGA boards

SEE MORE

Easily Spot Anomalies

Personalize your security solution by creating a fingerprint for your FPGA device. Using the inherent differences found in each FPGA silicon, Phantom Black FPGA IP asymmetric physically unclonable function (PUF) creates a unique idenitifier that protects secure deployed keystores or provides trusted identification for each initialization cycle of your unique application. This proven, reliable system integrity and security is available integrated into Mercury processing solutions or as a standalone capability into any system that leverages FPGA technologies. Want to learn more?

REQUEST AN ON-SITE BRIEFING

BLOG

This is not a drill: Preparing for a severe cyber storm

READ THE BLOG

White Paper

Processing Evolution for the Future Electronic Battlespace

READ THE WHITE PAPER

PURPOSE-BUILT SECURITY

Your Technology, Protected

When you work with Mercury’s engineers, your sensitive information and technology are protected through best-in-class security technology and field-proven methodologies and practices.

LEARN MORE