×

Please register to view this content

First Name
Last Name
Company
Job Title
Country
State
Opt me in to receive communications from Mercury Systems
Thank you
Error - something went wrong!
   

White Paper: Cloud-Scalable Cross-Domain Solutions for an Evolving Battlefield

August 9, 2021 Shaza Khan

19min read (2484 words)
The need to transfer information between defense systems is overlaid with the need to restrict information transfer based on security classifications. Information approved for a given security domain should only be transferred to systems authorized for that domain. Cross-domain solutions (CDS) are mechanisms for implementing appropriate transfers based on a defined security policy but reliance on software makes these CDS vulnerable to cyberattacks, while the centralized model limits their usefulness with high-bandwidth, many-sensor data streams. The next generation of CDS will look very different, delivering more security, higher performance, and greater flexibility. 

Read this white paper to learn:

  • System security domains and the way information is shared in defense systems
  • Limitations of current cross domain solution designs
  • The traditional centralized CDS implementation, downsides, and security vulnerabilities
  • Why centralized CDS will not work with AI, 6G and IoT
  • Mercury's track-record in creating CDS solutions that are still being used today
  • Design requirements for the next generation CDS
  • Bookend CDS model using FPGAs that will mitigate cyberattacks
  • DARPA Guaranteed Architecture Physical Security (GAPS) program achievements in CDS
Previous Asset
Solutions Brief: Intel and Mercury Deliver Rugged Edge Processing and Advanced Security for Defense
Solutions Brief: Intel and Mercury Deliver Rugged Edge Processing and Advanced Security for Defense

Mercury Systems is partnering with Intel to develop high-performance, ruggedized, and secure edge computing...

Next Video
Strengthening Cybersecurity at the Edge: Intel and Mercury talk multilayered security
Strengthening Cybersecurity at the Edge: Intel and Mercury talk multilayered security

Taking secure computing to the tactical edge requires a built-in multilayered security approach from system...