Cyberspace
Security of critical platforms, systems and servers is no longer an option, it’s a must-have. Mercury’s advanced embedded security is built in, not bolted on, to deliver uncompromised solutions in the face of growing cyber threats.
-
The Big Data Battlefield
Learn what big data is and why the military relies on big data data pipelines to drive artificial intelligence and ensure mission success in the multi-domain battlefield.
-
Making 5G Secure and Reliable
For the modern battlefield with hypersonic weapons, “real-time” answers enabled by 5G are critical. Learn the promises and pitfalls of 5G and how it can be made secure and reliable.
-
Next-Gen Safe and Secure Processing Systems for Aerospace and Defense
This whitepaper discusses how new holistic systems security engineering and flight-safety certification design approaches are enabling smarter platforms to be deployed anywhere.
-
Safe guarding Mission Critical Data with Secure Solid State Drives
NAND flash, packaged as a Solid State Drives (SSD), are now a common component in defense equipment. Add security and SSDs become the ideal big-data secure storage solution for defense application.
-
Managing Life Cycle and Network Interoperability Challenges on Navy Platforms
Learn how commercial open computing strategies used by social media giants and advanced manufacturing practices employed by the automotive and logistics industries can be leveraged by the Navy.
-
Enabling a Trusted Domestic Microelectronics Ecosystem
Mercury Systems is a next-generation defense electronics company making commercial technologies profoundly more accessible to aerospace and defense. Watch the interactive virtual conversation with...
-
Secure Processing Solutions for the Defense and Intelligence Industry
There is a gap within the community for reliable providers of secure, scalable and affordable subsystems that can support critical programs. Learn how we fill this gap with our "built-in" security.
-
Demystifying Hardware Full Disk Encryption Technology for Military Data Storage
Maximum protection, and full compliance with CSfC program guidelines, can only be achieved with proven diversity in the selection of security components.
-
Unlocking the True Value of Encryption and Key Management Modes
Only by understanding the mechanics of the various key management mode methodologies can the military system architect choose the optimal strategy for each mission or program.
-
A Trusted and Secure Ecosystem for Microelectronics
As the Pentagon continues to make microelectronics modernization a number-one priority in light of COVID-19, Mercury Systems CEO Mark Aslett shares his thoughts about the importance of addressing...
-
Securing Our Domestic Supply Chain
Now more than ever, we must address the entire ecosystem to build and sustain a robust and resilient domestic defense supply chain for decades to come—including investing in companies providing...
-
Loading More...