Securing Military Data at the Edge May 13, 2025

June 25, 2025

Whether the edge is the where the sensor gathers the data or where the enemy is engaged in any domain, military systems at the edge require data integrity. It is imperative that every software or hardware component in these edge systems encrypt, process, and disseminate information securely. This webcast covers best practices for enabling data encryption and security in military edge systems using commercial technology to keep costs low. Featuring: Jon Mellot - Fellow Chief Engineer, Mercury Systems John McHale - EVP Group Editorial Director, Military Embedded Systems WHO WE ARE •About Us: https://www.mrcy.com/company •Our Capabilities: https://www.mrcy.com/capabilities •Our Products: https://www.mrcy.com/products ADDITIONAL RESOURCES •White papers, webinars, articles and more: https://www.mrcy.com/resourcehub FOLLOW US ON SOCIAL MEDIA •LinkedIn: https://www.linkedin.com/company/mercury-systems •Twitter: https://twitter.com/mrcy/

No Previous Videos

Next Video
Designing Expendable SIGNT and EW RF Front End Technology May 22, 2025
Designing Expendable SIGNT and EW RF Front End Technology May 22, 2025

Explore the future of RF front-end design for SIGINT and EW applications. This webinar dives into emerging ...