Secure Processing

Security of mission-critical platforms and missions has never been more important. Learn about Mercury's built-in fourth-gen security framework and how it secures the most advanced systems.

  • How Mercury Systems and Intel Collaborate to Bring AI to Defense

    How Mercury Systems and Intel Collaborate to Bring AI to Defense

    Mercury and Intel collaborate, bringing their own unique sets of technological know-how, to develop and implement AI applications for quicker deployment and integration in the field to enhanc

    Read Article
  • Secure Processing Solutions for the Defense and Intelligence Industry

    Secure Processing Solutions for the Defense and Intelligence Industry

    There is a gap within the community for reliable providers of secure, scalable and affordable subsystems that can support critical programs. Learn how we fill this gap with our "built-in" security.

    Read Now
  • The Big Data Battlefield

    The Big Data Battlefield

    Learn what big data is and why the military relies on big data data pipelines to drive artificial intelligence and ensure mission success in the multi-domain battlefield.

    Read Now
  • CANGuard™ Defending automotive vehicle data networks against malicious vehicle intrusion

    CANGuard™ Defending automotive vehicle data networks against malicious vehicle intrusion

    Our CANGuard solution is a transparent CAN filtering technology that can efficiently differentiate messages a given device is authorized to transmit and receive from messages it is not.

    Read Now
  • Next-Generation Custom Microelectronics

    Read the Post!
  • Enabling a Trusted Domestic Microelectronics Ecosystem

    Enabling a Trusted Domestic Microelectronics Ecosystem

    Mercury Systems is a next-generation defense electronics company making commercial technologies profoundly more accessible to aerospace and defense. Watch the interactive virtual conversation with...

    Read Article
  • Sailing Through the Fog into the Edge

    Sailing Through the Fog into the Edge

    Learn about the trends, requirements, and limitations of Defense Fog and Edge Computing. Our blog post compares fog and edge processing layer resources in commercial and defense markets

    Read Article
  • Encryption Keys: The Cliff Notes Version, Part 3 – Key Management Modes

    Encryption Keys: The Cliff Notes Version, Part 3 – Key Management Modes

    In the first two posts of this series, I reviewed fundamental terms and concepts of encryption key classifications and discussed roles of passwords versus keys and hash algorithms.  In this post,...

    Read Article
  • Military-Grade Secure Solid State Drives Part 2: Encryption Decoded

    Military-Grade Secure Solid State Drives Part 2: Encryption Decoded

    In my introduction to military grade SSDs I conjured an image from a familiar movie of a data recorder destroyed by internal combustion to remove evidence of high value data. While the end result...

    Read Article
  • Making 5G Secure and Reliable

    Making 5G Secure and Reliable

    For the modern battlefield with hypersonic weapons, “real-time” answers enabled by 5G are critical. Learn the promises and pitfalls of 5G and how it can be made secure and reliable.

    Read Now
  • Safe guarding Mission Critical Data with Secure Solid State Drives

    Safe guarding Mission Critical Data with Secure Solid State Drives

    NAND flash, packaged as a Solid State Drives (SSD), are now a common component in defense equipment. Add security and SSDs become the ideal big-data secure storage solution for defense application.

    Read Now
  • Redefining Sensor Edge Processing with 2.5D System-in-Package Technology

    Redefining Sensor Edge Processing with 2.5D System-in-Package Technology

    By working at the chip level and leveraging new 2.5D system-in-package capabilities, designers can combine complex semiconductor dies into a single component while maintaining trust and security.

    Read Now
  • Follow us on Twitter!

    Go Now!
  • Demystifying Hardware Full Disk Encryption Technology for Military Data Storage

    Demystifying Hardware Full Disk Encryption Technology for Military Data Storage

    Maximum protection, and full compliance with CSfC program guidelines, can only be achieved with proven diversity in the selection of security components.

    Read Now
  • Unlocking the True Value of Encryption and Key Management Modes

    Unlocking the True Value of Encryption and Key Management Modes

    Only by understanding the mechanics of the various key management mode methodologies can the military system architect choose the optimal strategy for each mission or program.

    Read Now
  • Next-Generation Defense Electronics Manufacturing - AMC

    Next-Generation Defense Electronics Manufacturing - AMC

    Mercury Systems has pioneered a next generation defense electronics business model and supporting manufacturing infrastructure that addresses globalized supply chains.

    Read Now
  • Enabling big processing & AI-powered everything, everywhere

    Enabling big processing & AI-powered everything, everywhere

    Scaling and deploying composable data center capabilities across the fog and edge layers with high performance embedded edge computing (HPEEC).

    Read Now
  • Secure Military Grade Solid State Drives Overview

    Secure Military Grade Solid State Drives Overview

    This document introduces the considerations for selecting Solid-State Drives (SSDs) for mission-critical, high-reliability and high-security applications.

    Read Now
  • The 5S's of Secure Storage for Military Embedded Computing Systems

    The 5S's of Secure Storage for Military Embedded Computing Systems

    Innovation that's embedded - this brief explores's Mercury's "five S's" of secure data storage for military embedded systems: SWaP, Speed, Security, Sanitize and Self-Destruct.

    Read Now
  • loading
    Loading More...