The Engineers in Mercury’s SMP department have been adding to Mercury’s many capabilities and offerings on both Mercury’s 6U and 3U product lines. I will be featuring some of these over the next few weeks and months to show the commitment and ingenuity that our engineers have for our customers’ needs. One of these capabilities is the availability of Hypervisor. Development, Quality and Test Engineers have been looking for this type of capability on these platforms for a long time. With this product, you are able to control the level of security, isolation, authentication and protection to critical software, hardware and components within your system. You determine what level, depending on your or your customer’s needs. Read More
This message will self-destruct in five seconds…
Who knew that concept was anything but Hollywood imagination? It is very real, particularly in today’s modern threat environment. Protection including destruction of mission critical data has never been more relevant to the success of our military and government forces.
As our adversaries become more skilled in hacking and reverse-engineering, the impact of stolen or captured mission, classified, secret or top secret data can be catastrophic. Military systems and networks must continually incorporate innovative security protocols to combat the bombardment of attacks. Whether in forward-deployed unmanned systems or laptops used in office environments, data security must be in the forefront of design all the way down to the microelectronics. Military grade microelectronics, including solid state drives, must embed security at the lowest level with sophisticated algorithms and design techniques. Security cannot be bolted on. When these capabilities are coupled with trusted design and manufacturing disciplines, military grade SSDs provide an unparalleled approach to data security.
In this blog I’ll address how Mercury is uniquely positioned as the trailblazer of secure military grade SSDs through our leading edge technologies and business practices. In my upcoming posts Encryption Decoded and Diamonds are Forever. Encryption Keys Last Longer, I’ll explore the security advancements in military-grade secure SSDs.
Deuteronomy Rabbah said, “In vain have you acquired knowledge if you fail to impart it to others.” So with this blog, consider us doing our part!
Through the MRCY blog, we are pleased to bring you content and perspective from some of our own. You’ll hear from a multitude of subject matter experts – everyone from our CEO, to engineers, to marketers, like me – on a variety of topics including RF/M, secure storage, mission computing, avionics, software and AI, secure processing, company culture, engagement and so much more.
We’ll enable commenting soon and when we do, we encourage you to join the conversation, ask questions and request specific topics. We’re looking forward to hearing from you! Bear in mind, we’ll reserve the right to remove comments containing profanity, spam, and/or obscene, indecent, sexually explicit and discriminatory materials. We’ll also reserve the right to remove false, misleading, infringing, or unlawful material or information and anything protected by intellectual property rights (unless you control the rights or have received necessary consent).
Now that that’s out of the way, we’re ready to go. Enjoy!