Secure Processing

Explore Mercury's secure processing resources to stay up to date and learn how we help keep mission-critical platforms secure with a built-in security framework.

  • Case Study: Navy CDS, Simultaneously and Securely Processing Classified Data at Sea

    Case Study: Navy CDS, Simultaneously and Securely Processing Classified Data at Sea

    Discover how the U.S. Navy utilizes Mercury's scalable and configurable HD modular blade servers to simultaneously partition, process, and store adjacent levels of classified information.

    Read Now
  • This is not a drill: Preparing for a severe cyber storm

    This is not a drill: Preparing for a severe cyber storm

    Designing post-quantum cryptography (PQC) is much more than just implementing an algorithm. You need industry-leading solutions that address all aspects of advanced cryptographic development. Read...

    Read Article
  • White Paper: Processing Evolution for the Future Electronic Battlespace

    White Paper: Processing Evolution for the Future Electronic Battlespace

    Electronic battlefield complexity is a growing challenge. New, more sophisticated RF processing capabilities must be rapidly developed and deployed to operate successfully in contested environments.

    Read Now
  • ×

    Sign up for our newsletter to get new content each month!

    First Name
    Last Name
    Company
    !
    Thank you for signing up!
    Error - something went wrong!
  • Can you trust your computer? Three ways your system may already be unsafe

    Can you trust your computer? Three ways your system may already be unsafe

    Did you know your computer could be untrustworthy, even before you take it out of the box? Read more about how trust is compromised through the supply chain and ways you can prevent it.

    Read Article
  • White Paper:  Secure Processing Solutions for the Defense and Intelligence Industry

    White Paper: Secure Processing Solutions for the Defense and Intelligence Industry

    There is a gap within the community for reliable providers of secure, scalable and affordable subsystems that can support critical programs. Learn how we fill this gap with our "built-in" security.

    Read Now
  • White Paper: Building Safe and Secure Systems for Tomorrow's Autonomous Platforms

    White Paper: Building Safe and Secure Systems for Tomorrow's Autonomous Platforms

    DAL (design assurance) flight-safety certification and systems security engineering (SSE) is required to protect systems and mitigate risk for future smart and autonomous platforms

    Read Now
  • White Paper: Enabling big data processing and AI-powered everything, everywhere

    White Paper: Enabling big data processing and AI-powered everything, everywhere

    Learn how Mercury and Intel collaborate to scale and deploy composable data center capabilities across the fog and edge layers with high performance embedded computing (HPEC)

    Read Now
  • Embedded Board Technology

    SEE CONTENT
  • Solutions Brief: Intel and Mercury Deliver Rugged Edge Processing and Advanced Security for Defense

    Solutions Brief: Intel and Mercury Deliver Rugged Edge Processing and Advanced Security for Defense

    Mercury Systems is partnering with Intel to develop high-performance, ruggedized, and secure edge computing solutions that enable mission-critical applications in the harshest environments.

    Read Now
  • Rugged Server Technology

    SEE CONTENT
  • White Paper: Cloud-Scalable Cross-Domain Solutions for an Evolving Battlefield

    White Paper: Cloud-Scalable Cross-Domain Solutions for an Evolving Battlefield

    Cloud-scalable cross-domain solution methodologies, challenges and implementations for rapid, secure and correct information transfer between multiple security domains.

    Read Now
  • Blog:  I’ll take my data center to go, please: Celebrating 10 years of deployable data center performance

    Blog: I’ll take my data center to go, please: Celebrating 10 years of deployable data center performance

    Ten years ago, cloud computing hadn’t yet hit the mainstream. Amazon Web Services was only a few years old, Apple’s iCloud didn’t yet exist, and the “as-a-service” markets (IaaS, PaaS, SaaS) were...

    Read Article
  • Strengthening Cybersecurity at the Edge: Intel and Mercury talk multilayered security15:33

    Strengthening Cybersecurity at the Edge: Intel and Mercury talk multilayered security

    Taking secure computing to the tactical edge requires a built-in multilayered security approach from system startup to system availability. Listen in as Mercury and Intel discuss their collaboration

    Watch Video
  • White Paper:  Next-Gen Safe and Secure Processing Systems for Aerospace and Defense

    White Paper: Next-Gen Safe and Secure Processing Systems for Aerospace and Defense

    This whitepaper discusses how new holistic systems security engineering and flight-safety certification design approaches are enabling smarter platforms to be deployed anywhere.

    Read Now
  • Article:  The Big Data Battlefield

    Article: The Big Data Battlefield

    Learn what big data is and why the military relies on big data data pipelines to drive artificial intelligence and ensure mission success in the multi-domain battlefield.

    Read Now
  • ×

    Sign up for our newsletter to get new content each month!

    First Name
    Last Name
    Company
    !
    Thank you for signing up!
    Error - something went wrong!
  • Enabling a Trusted Domestic Microelectronics Ecosystem

    Enabling a Trusted Domestic Microelectronics Ecosystem

    Mercury Systems is a next-generation defense electronics company making commercial technologies profoundly more accessible to aerospace and defense. Watch the interactive virtual conversation with...

    Read Article
  • A New Paradigm for Defense-Grade Advanced Microelectronics

    A New Paradigm for Defense-Grade Advanced Microelectronics

    As the DoD shifts to a new paradigm for future modernization, see how Mercury Systems is collaborating with our semiconductor partners to make the most advanced commercial microelectronics...

    Read Article
  • Encryption Keys: The Cliff Notes Version, Part 3 – Key Management Modes

    Encryption Keys: The Cliff Notes Version, Part 3 – Key Management Modes

    In the first two posts of this series, I reviewed fundamental terms and concepts of encryption key classifications and discussed roles of passwords versus keys and hash algorithms.  In this post,...

    Read Article
  • Military-Grade Secure Solid State Drives Part 2: Encryption Decoded

    Military-Grade Secure Solid State Drives Part 2: Encryption Decoded

    In my introduction to military grade SSDs I conjured an image from a familiar movie of a data recorder destroyed by internal combustion to remove evidence of high value data. While the end result...

    Read Article
  • Article:  Making 5G Secure and Reliable

    Article: Making 5G Secure and Reliable

    For the modern battlefield with hypersonic weapons, “real-time” answers enabled by 5G are critical. Learn the promises and pitfalls of 5G and how it can be made secure and reliable.

    Read Now
  • White Paper:  Safe guarding Mission Critical Data with Secure Solid State Drives

    White Paper: Safe guarding Mission Critical Data with Secure Solid State Drives

    NAND flash, packaged as a Solid State Drives (SSD), are now a common component in defense equipment. Add security and SSDs become the ideal big-data secure storage solution for defense application.

    Read Now
  • White Paper:  Redefining Sensor Edge Processing with 2.5D System-in-Package Technology

    White Paper: Redefining Sensor Edge Processing with 2.5D System-in-Package Technology

    By working at the chip level and leveraging new 2.5D system-in-package capabilities, designers can combine complex semiconductor dies into a single component while maintaining trust and security.

    Read Now
  • loading
    Loading More...