Solid State Drives

Learn how military-grade and space-qualified solid state drives protect mission-critical data in the harshest environments on Earth and beyond.

  • Military-Grade Secure Solid State Drives Part 5: The Backdoor VIPs Don’t Know About

    Military-Grade Secure Solid State Drives Part 5: The Backdoor VIPs Don’t Know About

    I used to work for a company that required us to remove any proprietary data from our laptop hard drive prior to traveling to some countries overseas. I didn’t know if it was because they could...

    Read Article
  • Military Grade Solid State Drives (SSD)6:05

    Military Grade Solid State Drives (SSD)

    Learn about the differences between a commercial grade SSD and military-grade (Mercury) solid state drive. SLC, MLC and TLC NAND Flash variant are all rugged, secure (encrypted AES 256), and designed

    Watch Video
  • Secure Military Grade Solid State Drives Overview

    Secure Military Grade Solid State Drives Overview

    This document introduces the considerations for selecting Solid-State Drives (SSDs) for mission-critical, high-reliability and high-security applications.

    Read Now
  • Safe guarding Mission Critical Data with Secure Solid State Drives

    Safe guarding Mission Critical Data with Secure Solid State Drives

    NAND flash, packaged as a Solid State Drives (SSD), are now a common component in defense equipment. Add security and SSDs become the ideal big-data secure storage solution for defense application.

    Read Now
  • Next-Generation Custom Microelectronics

    Read the Post!
  • Encryption Keys: The Cliffs Notes Version, Part 1

    Encryption Keys: The Cliffs Notes Version, Part 1

    Imagine a US operative on a covert mission is comprised in enemy territory. His laptop, now in the hands of the enemy, contains highly sensitive data stored on the factory-installed SSD and...

    Read Article
  • Artificial Intelligence for Military Applications

    Learn More
  • Encryption Keys: The Cliffs Notes Version, Part 2

    Encryption Keys: The Cliffs Notes Version, Part 2

    In my first post of this series, I explained terms relating to encryption keys and the standards that exist governing encryption key algorithms. Now I will spend some time on ATA passwords and how...

    Read Article
  • Encryption Keys: The Cliff Notes Version, Part 3 – Key Management Modes

    Encryption Keys: The Cliff Notes Version, Part 3 – Key Management Modes

    In the first two posts of this series, I reviewed fundamental terms and concepts of encryption key classifications and discussed roles of passwords versus keys and hash algorithms.  In this post,...

    Read Article
  • Encryption Keys: The Cliff Notes Version, Part 4

    Encryption Keys: The Cliff Notes Version, Part 4

    In my prior three posts, I provided an overview of encryption key fundamentals and the various encryption key mode strategies that can be implemented in a Mercury secure SSD. If you did not read...

    Read Article
  • Demystifying Hardware Full Disk Encryption Technology for Military Data Storage

    Demystifying Hardware Full Disk Encryption Technology for Military Data Storage

    Maximum protection, and full compliance with CSfC program guidelines, can only be achieved with proven diversity in the selection of security components.

    Read Now
  • Space-Qualified Microelectronics

    Space-Qualified Microelectronics

    Whether you application demands space-level reliability for RF components or storage devices, we have the design, manufacturing and test expertise to deliver the right solution.

    Read Now
  • Unlocking the True Value of Encryption and Key Management Modes

    Unlocking the True Value of Encryption and Key Management Modes

    Only by understanding the mechanics of the various key management mode methodologies can the military system architect choose the optimal strategy for each mission or program.

    Read Now
  • Follow us on Twitter!

    Go Now!
  • Innovation That Protects Mercury SSDs7:41

    Innovation That Protects Mercury SSDs

    Mercury Systems is the preeminent commercial supplier of Secure Solid-State Drives (SSD) with the most robust embedded security and performance-enhancing algorithms.

    Watch Video
  • Solid State Drives

    Solid State Drives

    Protecting sensitive data and IP is essential for many applications. For defense, communications, medical, industrial automation and transportation systems, securing data is mandatory.

    Read Now
  • The 5S's of Secure Storage for Military Embedded Computing Systems

    The 5S's of Secure Storage for Military Embedded Computing Systems

    Innovation that's embedded - this brief explores's Mercury's "five S's" of secure data storage for military embedded systems: SWaP, Speed, Security, Sanitize and Self-Destruct.

    Read Now
  • Military-Grade Secure Solid State Drives Part 3: Diamonds are Forever; Encryption Lasts Longer

    Military-Grade Secure Solid State Drives Part 3: Diamonds are Forever; Encryption Lasts Longer

    Have you ever forgotten your password for your work laptop and had to go to your IT guy for help to reset it? Imagine if it was that easy when the data on the hard drive was classified or top...

    Read Article
  • Space-Qualified Products6:31

    Space-Qualified Products

    Over 4 decades of Mercury Systems' heritage in design and manufacturing of space-qualified components and assemblies for dense primes, government agencies and commercial customers.

    Watch Video
  • Military-Grade Secure Solid State Drives Part 1: Hollywood Imagination or Reality?

    Military-Grade Secure Solid State Drives Part 1: Hollywood Imagination or Reality?

    This message will self-destruct in five seconds… Who knew that concept was anything but Hollywood imagination?  It is very real, particularly in today’s modern threat environment.  Protection...

    Read Article
  • Military-Grade Secure Solid State Drives Part 2: Encryption Decoded

    Military-Grade Secure Solid State Drives Part 2: Encryption Decoded

    In my introduction to military grade SSDs I conjured an image from a familiar movie of a data recorder destroyed by internal combustion to remove evidence of high value data. While the end result...

    Read Article
  • loading
    Loading More...