Secure Processing

Security of mission-critical platforms and missions has never been more important. Learn about Mercury's built-in fourth-gen security framework and how it secures the most advanced systems.

  • White Paper: Cloud-Scalable Cross-Domain Solutions for an Evolving Battlefield

    White Paper: Cloud-Scalable Cross-Domain Solutions for an Evolving Battlefield

    Cloud-scalable cross-domain solution methodologies, challenges and implementations for rapid, secure and correct information transfer between multiple security domains.

    Read Now
  • Blog: Innovating past the need for compromise for your embedded computing

    Blog: Innovating past the need for compromise for your embedded computing

    What do you think of when you hear the word ‘compromise’? Possibly an agreement made between children where one begrudgingly agrees to take out the trash for a week if the other mows the...

    Read Article
  • Blog:  I’ll take my data center to go, please: Celebrating 10 years of deployable data center performance

    Blog: I’ll take my data center to go, please: Celebrating 10 years of deployable data center performance

    Ten years ago, cloud computing hadn’t yet hit the mainstream. Amazon Web Services was only a few years old, Apple’s iCloud didn’t yet exist, and the “as-a-service” markets (IaaS, PaaS, SaaS) were...

    Read Article
  • A New Paradigm for Defense-Grade Advanced Microelectronics

    A New Paradigm for Defense-Grade Advanced Microelectronics

    As the DoD shifts to a new paradigm for future modernization, see how Mercury Systems is collaborating with our semiconductor partners to make the most advanced commercial microelectronics...

    Read Article
  • White Paper:  Secure Processing Solutions for the Defense and Intelligence Industry

    White Paper: Secure Processing Solutions for the Defense and Intelligence Industry

    There is a gap within the community for reliable providers of secure, scalable and affordable subsystems that can support critical programs. Learn how we fill this gap with our "built-in" security.

    Read Now
  • Strengthening Cybersecurity at the Edge: Intel and Mercury talk multilayered security15:33

    Strengthening Cybersecurity at the Edge: Intel and Mercury talk multilayered security

    Taking secure computing to the tactical edge requires a built-in multilayered security approach from system startup to system availability. Listen in as Mercury and Intel discuss their collaboration

    Watch Video
  • White Paper: Enabling big data processing and AI-powered everything, everywhere

    White Paper: Enabling big data processing and AI-powered everything, everywhere

    Learn how Mercury and Intel collaborate to scale and deploy composable data center capabilities across the fog and edge layers with high performance embedded edge computing (HPEEC)

    Read Now
  • Infographic:  Embedded Processing Subsystems

    Infographic: Embedded Processing Subsystems

    Mercury subsystems solve big data processing problems for platforms operating at the tactical edge. Our system design and integration experts deliver solutions that meet all your application needs

    Read Now
  • Video:  Rugged Edge Servers, The Box that Checks All the Boxes2:13

    Video: Rugged Edge Servers, The Box that Checks All the Boxes

    Mercury's rugged edge servers accelerate compute-heavy mission-critical applications like artificial intelligence (AI), signals intelligence (SIGINT), virtualization and big data analytics.

    Watch Video
  • White Paper:  Next-Gen Safe and Secure Processing Systems for Aerospace and Defense

    White Paper: Next-Gen Safe and Secure Processing Systems for Aerospace and Defense

    This whitepaper discusses how new holistic systems security engineering and flight-safety certification design approaches are enabling smarter platforms to be deployed anywhere.

    Read Now
  • How Mercury Systems and Intel Collaborate to Bring AI to Defense

    How Mercury Systems and Intel Collaborate to Bring AI to Defense

    Mercury and Intel collaborate, bringing their own unique sets of technological know-how, to develop and implement AI applications for quicker deployment and integration in the field to enhanc

    LISTEN NOW
  • FOLLOW US
  • Video:  Rugged Edge Servers - Built for Every Inhospitable Corner of the Globe2:21

    Video: Rugged Edge Servers - Built for Every Inhospitable Corner of the Globe

    Mercury's rugged edge servers accelerate Artificial Intelligence (AI), Cybersecurity, Signals Intelligence (SIGINT) and C4ISR tactical edge computing workloads.

    Watch Video
  • White Paper:  Advantages of Mercury's Modified Off-The-Shelf (MOTS) Product Approach

    White Paper: Advantages of Mercury's Modified Off-The-Shelf (MOTS) Product Approach

    Our approach to building products for enhanced durability under extreme environmental conditions, including repeated temperature cycling over wide temperature ranges.

    Read Now
  • Product Guide: Space-Qualified Microelectronics

    Product Guide: Space-Qualified Microelectronics

    Whether you application demands space-level reliability for RF components or storage devices, we have the design, manufacturing and test expertise to deliver the right solution.

    Read Now
  • Article:  The Big Data Battlefield

    Article: The Big Data Battlefield

    Learn what big data is and why the military relies on big data data pipelines to drive artificial intelligence and ensure mission success in the multi-domain battlefield.

    Read Now
  • Enabling a Trusted Domestic Microelectronics Ecosystem

    Enabling a Trusted Domestic Microelectronics Ecosystem

    Mercury Systems is a next-generation defense electronics company making commercial technologies profoundly more accessible to aerospace and defense. Watch the interactive virtual conversation with...

    Read Article
  • Encryption Keys: The Cliff Notes Version, Part 3 – Key Management Modes

    Encryption Keys: The Cliff Notes Version, Part 3 – Key Management Modes

    In the first two posts of this series, I reviewed fundamental terms and concepts of encryption key classifications and discussed roles of passwords versus keys and hash algorithms.  In this post,...

    Read Article
  • Military-Grade Secure Solid State Drives Part 2: Encryption Decoded

    Military-Grade Secure Solid State Drives Part 2: Encryption Decoded

    In my introduction to military grade SSDs I conjured an image from a familiar movie of a data recorder destroyed by internal combustion to remove evidence of high value data. While the end result...

    Read Article
  • Article:  Making 5G Secure and Reliable

    Article: Making 5G Secure and Reliable

    For the modern battlefield with hypersonic weapons, “real-time” answers enabled by 5G are critical. Learn the promises and pitfalls of 5G and how it can be made secure and reliable.

    Read Now
  • White Paper:  Safe guarding Mission Critical Data with Secure Solid State Drives

    White Paper: Safe guarding Mission Critical Data with Secure Solid State Drives

    NAND flash, packaged as a Solid State Drives (SSD), are now a common component in defense equipment. Add security and SSDs become the ideal big-data secure storage solution for defense application.

    Read Now
  • loading
    Loading More...