Secure Processing

Explore Mercury's secure processing resources to stay up to date and learn how we help keep mission-critical platforms secure with a built-in security framework.

  • That’s classified! The history and future of NSA Type 1 encryption

    That’s classified! The history and future of NSA Type 1 encryption

    The NSA Type 1 encryption program has a rich and complex history, shaped by evolving threats, technological advancements, and the need to protect classified information.

    Read Article
  • Intercepted communications: Encryption standards for the defense edge

    Intercepted communications: Encryption standards for the defense edge

    Encryption is a critical component of data security, providing a reliable method for ensuring the security and confidentiality of sensitive data for government, defense, and aerospace...

    Read Article
  • Case Study: Navy CDS, Simultaneously and Securely Processing Classified Data at Sea

    Case Study: Navy CDS, Simultaneously and Securely Processing Classified Data at Sea

    Discover how the U.S. Navy utilizes Mercury's scalable and configurable HD modular blade servers to simultaneously partition, process, and store adjacent levels of classified information.

    Read Now
  • ×

    Sign up for our newsletter to get new content each month!

    First Name
    Last Name
    Company
    !
    Thank you for signing up!
    Error - something went wrong!
  • Mercury Rugged Servers – The Box That Checks All the Boxes2:13

    Mercury Rugged Servers – The Box That Checks All the Boxes

    Mercury's rugged #edge servers accelerate compute-heavy mission-critical applications like artificial intelligence (#AI), signals intelligence (SIGINT), virtualization and #bigdata analytics. Purpose-

    Watch Video
  • White Paper:  Mercury Assured: Trust that delivers uncompromised solutions to our customers

    White Paper: Mercury Assured: Trust that delivers uncompromised solutions to our customers

    Learn how Mercury delivers uncompromised secure, and trusted solutions using a foundation based on Mitre's Deliver Uncompromised: Securing Critical Software Supply Chains

    Read Now
  • Strengthening cybersecurity at the edge: Intel and Mercury talk multilayered security

    Strengthening cybersecurity at the edge: Intel and Mercury talk multilayered security

    Taking secure computing to the tactical edge requires a built-in multilayered security approach from system startup to system availability. Listen in as experts from Mercury Systems and Intel...

    Read Article
  • Finding New Supply Chain Muscles in a COVID-19 World

    Finding New Supply Chain Muscles in a COVID-19 World

    While I’ve tried to refrain from using the new cliché “these are unprecedented times,” I cannot think of a better way to describe what we are facing with COVID-19.  Like the other functions within...

    Read Article
  • Embedded Board Technology

    SEE CONTENT
  • Safe AND secure avionics? You can do that? Yup!

    Safe AND secure avionics? You can do that? Yup!

    Although we all love connectivity and the benefits it brings us, there is a downside. By now, we’ve all heard about cars that have been hacked. Wired magazine even has an entire section of their...

    Read Article
  • Rugged Server Technology

    SEE CONTENT
  • Can GPS be Trusted? Part 3

    Can GPS be Trusted? Part 3

    In part 3 of our blog series learn about VICTORY and how complementing PNT systems can be combined together in a military vehicle and integrated with other military ground vehicle systems

    Read Article
  • Military-Grade Secure Solid State Drives Part 5: The Backdoor VIPs Don’t Know About

    Military-Grade Secure Solid State Drives Part 5: The Backdoor VIPs Don’t Know About

    I used to work for a company that required us to remove any proprietary data from our laptop hard drive prior to traveling to some countries overseas. I didn’t know if it was because they could...

    Read Article
  • This is not a drill: Preparing for a severe cyber storm

    This is not a drill: Preparing for a severe cyber storm

    Designing post-quantum cryptography (PQC) is much more than just implementing an algorithm. You need industry-leading solutions that address all aspects of advanced cryptographic development. Read...

    Read Article
  • White Paper: Processing Evolution for the Future Electronic Battlespace

    White Paper: Processing Evolution for the Future Electronic Battlespace

    Electronic battlefield complexity is a growing challenge. New, more sophisticated RF processing capabilities must be rapidly developed and deployed to operate successfully in contested environments.

    Read Now
  • Can you trust your computer? Three ways your system may already be unsafe

    Can you trust your computer? Three ways your system may already be unsafe

    Did you know your computer could be untrustworthy, even before you take it out of the box? Read more about how trust is compromised through the supply chain and ways you can prevent it.

    Read Article
  • ×

    Sign up for our newsletter to get new content each month!

    First Name
    Last Name
    Company
    !
    Thank you for signing up!
    Error - something went wrong!
  • White Paper:  Secure Processing Solutions for the Defense and Intelligence Industry

    White Paper: Secure Processing Solutions for the Defense and Intelligence Industry

    There is a gap within the community for reliable providers of secure, scalable and affordable subsystems that can support critical programs. Learn how we fill this gap with our "built-in" security.

    Read Now
  • White Paper: Building Safe and Secure Systems for Tomorrow's Autonomous Platforms

    White Paper: Building Safe and Secure Systems for Tomorrow's Autonomous Platforms

    DAL (design assurance) flight-safety certification and systems security engineering (SSE) is required to protect systems and mitigate risk for future smart and autonomous platforms

    Read Now
  • White Paper: Enabling big data processing and AI-powered everything, everywhere

    White Paper: Enabling big data processing and AI-powered everything, everywhere

    Learn how Mercury and Intel collaborate to scale and deploy composable data center capabilities across the fog and edge layers with high performance embedded computing (HPEC)

    Read Now
  • Solutions Brief: Intel and Mercury Deliver Rugged Edge Processing and Advanced Security for Defense

    Solutions Brief: Intel and Mercury Deliver Rugged Edge Processing and Advanced Security for Defense

    Mercury Systems is partnering with Intel to develop high-performance, ruggedized, and secure edge computing solutions that enable mission-critical applications in the harshest environments.

    Read Now
  • White Paper: Cloud-Scalable Cross-Domain Solutions for an Evolving Battlefield

    White Paper: Cloud-Scalable Cross-Domain Solutions for an Evolving Battlefield

    Learn about security domains, how traditional cross-domain solution (CDS) pose cybersecurity risks and how a new CDS model using FPGAs can mitigate this risk and support modern IoT, AI and 5G.

    Read Now
  • Strengthening Cybersecurity at the Edge: Intel and Mercury talk multilayered security15:33

    Strengthening Cybersecurity at the Edge: Intel and Mercury talk multilayered security

    Taking secure computing to the tactical edge requires a built-in multilayered security approach from system startup to system availability. Listen in as Mercury and Intel discuss their collaboration

    Watch Video
  • White Paper:  Next-Gen Safe and Secure Processing Systems for Aerospace and Defense

    White Paper: Next-Gen Safe and Secure Processing Systems for Aerospace and Defense

    This whitepaper discusses how new holistic systems security engineering and flight-safety certification design approaches are enabling smarter platforms to be deployed anywhere.

    Read Now
  • loading
    Loading More...