Securing Military Data at the Edge

November 30, -0001

Whether the edge is the where the sensor gathers the data or where the enemy is engaged in any domain, military systems at the edge require data integrity. It is imperative that every software or hardware component in these edge systems encrypt, process, and disseminate information securely. This webcast covers best practices for enabling data encryption and security in military edge systems using commercial technology to keep costs low. Featuring: Jon Mellot - Fellow Chief Engineer, Mercury Systems John McHale - EVP Group Editorial Director, Military Embedded Systems WHO WE ARE •About Us: https://www.mrcy.com/company •Our Capabilities: https://www.mrcy.com/capabilities •Our Products: https://www.mrcy.com/products ADDITIONAL RESOURCES •White papers, webinars, articles and more: https://www.mrcy.com/resourcehub FOLLOW US ON SOCIAL MEDIA •LinkedIn: https://www.linkedin.com/company/mercury-systems •Twitter: https://twitter.com/mrcy/

No Previous Videos

Next Video
What's new in DSP for software defined radio, EW and AI at the Edge May 28, 2025
What's new in DSP for software defined radio, EW and AI at the Edge May 28, 2025

The modern defense landscape is dotted with cutting-edge capabilities. AI is seeing diverse and ever-expand...