RTBX05 Rugged Trusted BuiltSECURE Servers

No Slides Entered.

Maintain data integrity and safeguard IP at the edge

Our RTBX05 rugged BuiltSECURE™ server delivers uncompromised security and protects critical data and technology from loss or compromise. To meet a variety of system requirements, the rugged BuiltSECURE servers feature a trusted motherboard with with dual Intel® Xeon® E5-2600 v4 processors, built-in security features, up to 120 TB of storage, high speed I/O and multiple expansion slots.

builtsecure-logo.png

ASK A QUESTION

Stay Ahead of Threats

Rugged Trusted BuiltSECURE Servers mitigate reverse engineering and safeguard against threats with features from our proven technology suite which includes:

- Access control
- Non-volatile memory-write protection
- Sanitization
- Physical protection mechanisms
- Sensors
- Key management
- Data-at-rest protection
- Secure firmware management
- Cryptographic offload engine capabilities

 

SAFEGUARD YOUR APPLICATION

Features

Mitigate Risk

  • Root of Trust (RoT) enforced boot and configuration management for consistent and secure performance
  • Cyber-resilient BIOS minimizes attack surfaces
  • Composable architecture preserves security development to reduce overall cost
  • Designed, tested and manufactured in the USA through a trusted supply chain
  • Soldering components eliminate disconnect during shock
  • Certified to MIL-STD: 810H, 167-1, 1474D
Specifications

Technical Specifications

  • Dual Intel® Xeon® E5-2600 v4 processors
  • 2x QPI up to 8 GT/s
  • Up to 128 GB DDR4 up to 2400 MHz memory
  • Intel® Trusted Execution Technology (TXT) with integrated TPM 2.0

Management and Operating System

  • BIOS: Mercury-specialized and supported
  • Cyber-resilient baseboard management controller
  • Red Hat® Enterprise Linux® v7 support
  • Secure hypervisor and Linux options

BuiltSECURE Embedded Framework

  • Built-in composable security feature set options

Expansion & Modular Maintainability

1U

  • Up to 2x PCIe 3.0 x16 cards, half-height and length
  • 3x fixed fans

2U

  • Up to 5x PCIe 3.0 cards:
    • A1– x16/x8 full-height/ full-length
    • A2 – x8 electrical (x16 mechanical) full-height/ full-length
    • A3 – x0/x8 (x16 mechanical) half-height/ half-length
    • A4 – x16 full-height/ full-length
    • A5 – x8 electrical (x16 mechanical) full- height/ full-length
  • 5 fixed fans

DOWNLOAD DATASHEET

Input/Output Versatility

  • Multi-format optical drive
  • CD/DVD/Blu-ray R/W
  • 4x USB 3.0 ports
  • 2x USB 2.0 ports
  • 2x 10/100/1000 Ethernet ports
  • 1x 10/100 Ethernet port
  • GPIO test port

Power Supply Options

1U

  • Single 550W AC power supply 90-264 VAC (47/63 Hz, 8-4 Amps)

2U

  • Redundant 750W AC power supply 90-264 VAC (47/63 Hz, 8-4 Amps)

Additional Options 

  • Shock pins
  • Front door filter
  • Compatible slide rails and brackets/ shelf system
  • Cable accessories
  • Tamper-evidence features

Mechanical

  • Height: 1U or 1.75" (44.45 mm)
  • Height: 2U or 3.5" (88.9 mm)
  • Width: 17.2" (436.9 mm)
  • Depth: 20" (508 mm)
  • Weight: 1U 26.5 lb (12 kg)
  • Weight: 2U 34 lb (15.4 kg)
  • 19" rackmountable

Mercury Systems designs all products to meet or exceed listed data sheet specifications. Some specifications including I/O profiles, weight and thermal profiles are configuration dependent. Contact Mercury for information specific to your desired configuration requirements.

Lower Your Total Cost of Ownership

Systems exposed to classified information in the field must be physically guarded or properly sanitized. Our built-in board volatility features ensure no classified data is unintentionally stored on the hardware, avoiding the need for expensive handling.

Res_Trust_Diagram.png

Secure Your Server Cluster

When configured as a boot server, BuiltSECURE technology ensures only authorized personnel can modify the cluster. Built-in cryptography and physical security delivers assurance and maintains data integrity even when the stack is offline or remotely accessed, making it ideal for edge applications. 

DISCOVER MORE

White Paper: Key Technology Considerations for Next-Gen Army Vehicles

Learn about critical technology for next-gen army vehicle autonomous driving, navigation and...

That’s classified! The history and future of NSA Type 1 encryption

The NSA Type 1 encryption program has a rich and complex history, shaped by evolving threats,...

Intercepted communications: Encryption standards for the defense edge

Encryption is a critical component of data security, providing a reliable method for ensuring the...

Case Study: Navy CDS, Simultaneously and Securely Processing Classified Data at Sea

Discover how the U.S. Navy utilizes Mercury's scalable and configurable HD modular blade servers to...

Mercury Rugged Servers – The Box That Checks All the Boxes

Mercury's rugged #edge servers accelerate compute-heavy mission-critical applications like...

White Paper: Mercury Assured: Trust that delivers uncompromised solutions to our customers

Learn how Mercury delivers uncompromised secure, and trusted solutions using a foundation based on...

Strengthening cybersecurity at the edge: Intel and Mercury talk multilayered security

Taking secure computing to the tactical edge requires a built-in multilayered security approach from...

Finding New Supply Chain Muscles in a COVID-19 World

While I’ve tried to refrain from using the new cliché “these are unprecedented times,” I...