Huge numbers of image pixels and very small orbiting platforms are driving the demand for major improvements in future space-based data storage. Satellite designers need solutions that provide vastly more capacity while being smaller, lighter and able to operate reliably for years in a high-radiation environment.

Interested in our technology? Contact Sales
Recommended

Mercury and VAST Data Federal bring commercial data center innovation to aerospace and defense, enabling the rapid transformation of data into decisions at the edge.

Mercury supports the most critical application development with signal chain solutions from a single vendor that can be integrated with interchangeable tuners, data acquisition cards and recorder...

The RDS system from Mercury Systems delivers VAST's Universal Storage in an all-flash, ruggedized edge system to enable fast and reliable access to big data, AI, and machine learning.

For the first time in the market, there is an affordable, scalable ruggedized all-flash network-attached data storage solution purpose-built for challenging mission-critical applications.
Mercury and VAST make cutting-edge data center technology available for defense and other harsh-environment applications, enabling low-latency processing, scalability and data security in the field.
Development Tactics and Techniques for Small Form Factor RF Signal Recorders
Explore our portfolio of rugged, high-density solid-state drives and radiation-tolerant data recorders with our quick reference guide detailing the size, organization, data rate and more.

I used to work for a company that required us to remove any proprietary data from our laptop hard drive prior to traveling to some countries overseas. I didn’t know if it was because they could...
NAND flash, packaged as a Solid State Drives (SSD), are now a common component in defense equipment. Add security and SSDs become the ideal big-data secure storage solution for defense application.

Imagine a US operative on a covert mission is comprised in enemy territory. His laptop, now in the hands of the enemy, contains highly sensitive data stored on the factory-installed SSD and...

In my first post of this series, I explained terms relating to encryption keys and the standards that exist governing encryption key algorithms. Now I will spend some time on ATA passwords and how...

In the first two posts of this series, I reviewed fundamental terms and concepts of encryption key classifications and discussed roles of passwords versus keys and hash algorithms. In this post,...

In my prior three posts, I provided an overview of encryption key fundamentals and the various encryption key mode strategies that can be implemented in a Mercury secure SSD. If you did not read...
Maximum protection, and full compliance with CSfC program guidelines, can only be achieved with proven diversity in the selection of security components.

Use the latest technology that allow real-time recording systems to keep up with the ever-increasing speed requirements of wide-bandwidth data capture in modern military systems.
Only by understanding the mechanics of the various key management mode methodologies can the military system architect choose the optimal strategy for each mission or program.

Have you ever forgotten your password for your work laptop and had to go to your IT guy for help to reset it? Imagine if it was that easy when the data on the hard drive was classified or top...

This message will self-destruct in five seconds… Who knew that concept was anything but Hollywood imagination? It is very real, particularly in today’s modern threat environment. Protection...

In my introduction to military grade SSDs I conjured an image from a familiar movie of a data recorder destroyed by internal combustion to remove evidence of high value data. While the end result...

Transforming into a multi-domain force requires modernizing an entire helicopter fleet. Determining the onboard technology needed for Future Vertical Lift is one piece of the development puzzle....