Security Services and Analysis
End-to-end protection with systems security engineering (SSE) services and analysis
End-to-end protection with systems security engineering (SSE) services and analysis
Systems security must be a continual focus and Mercury’s experienced security engineers make it their number one priority to provide affordable, end-to-end product security services. Working with 25+ prime customers and 300+ programs for 40 years to ensure data confidentiality and total system security, our SSE services include red team/blue team vulnerability analyses, technical training and product-specific protection schemes.
Our security experts work closely with you throughout the entire design-to-deployment time frame to understand your specific security needs and objectives, provide expertise and design custom solutions that meet exact application and platform requirements to enable mission success.
Security challenges take a tremendous amount of engineering efforts to resolve. We deliver solutions with built-in security for seamless software integration for an edge-ready secure computing solution.
Save time and reduce risk and costs by working with our experts to address your security challenges. Service offerings include product lifecycle support, red team/blue team vulnerability analyses, extended warranties, product training, upgrades, change control and EOL management services. Additionally, we are moving to further support vulnerability monitoring and pre-STIG (security technical implementation guide) software.
We work closely with partners, like Starlab and Windriver, to tie our hardware-based security to their technologies to offer security from power on through runtime. All advanced technologies are developed under a commercial model allowing customers to rapidly deploy these technologies at the edge at affordable costs. Utilizing commercial practices enable faster deliveries and reduces support/development costs and permits collaboration in non-classified environments.
Our secure rugged servers and processing subsystems safeguard against current and emerging threats for multi-domain operations: cryptography, secure boot and advanced physical protection.
Mission-critical applications require various levels of security integrations to maintain data integrity. Mercury can act as an agent to present your security solution to the United States Government (USG) or provide technical security artifacts, which express the security capabilities of our products, for self-developed presentations.
Dual Intel Xeon Gold Scalable processors in 1U/2U 20" form factors, up to 8 expansion slots, 384 GB DDR4 and SSE
Intel Xeon Scalable server-class CPU, 96 GB DDR4, 40 GbE, PCIe Gen3, MOTS+ protection, and advanced SSE security
Pre-integrated, SWaP-optimized, customizable OpenVPX multifunction subsystems with program support services, security
High performance security, cryptography, and signal processing IP cores
Learn about critical technology for next-gen army vehicle autonomous driving, navigation and...
The NSA Type 1 encryption program has a rich and complex history, shaped by evolving threats,...
Encryption is a critical component of data security, providing a reliable method for ensuring the...
Discover how the U.S. Navy utilizes Mercury's scalable and configurable HD modular blade servers to...
Contact us to discover what's possible at the edge