White Paper

Secure Processing Solutions for the Defense and Intelligence Industry

Issue link: https://read.uberflip.com/i/1173382

Contents of this Issue

Navigation

Page 3 of 6

The graphic below summarizes Mercury's key areas of experience and capabilities that allow us to serve as a provider of long-term, adapt- able, solutions in the secure processing domain: In December 2012, Mercury launched Air Flow-By, an industry leading thermal management technology. Shortly afterwards, Liquid Flow-By was announced to address processing challenges in high altitude applications. As most systems are heat dissipation-limited today, both technologies allow for maximum processing power through heat dis- sipation. Simultaneously, Mercury paved the way with industry leading interconnect technology that leveraged an exclusive partnership with TE Connectivity. Additionally, Mercury pioneered rugged InfiniBand™/ Ethernet embedded switching fabrics with a roadmap to keep our customers in the lead. Mercury has 10 years of experience in ATCA (Advanced Telecommuni- cations Computing Architecture) to leverage "carrier grade" computing to meet the needs of defense and aerospace applications. Finally, we continue driving Open System Architectures with OpenRFM™, bringing standardized, open architectures to the world of RF and Microwave Solutions. Security and Mission Computing Mercury Systems has an integrated business model that is purpose- built to provide secure processing solutions. We are aligned to the DoD Program Protection Planning directives that call for prioritization of resources, comprehensive program protection as well as detection and response to vulnerabilities. We provide secure building blocks that are standardized and can be used, in a repeatable way, by our customers who then include them in their own secure architectures. This approach allows the customer to be in control as they build their secure processing platforms – using and re-using our technologies as needed. Mercury can help "future proof" our customers' critical secure architectures as new generations of technologies evolve. Our secure processing solutions are the result of an approach that factors in our customers' need for pre-integrated secure solutions. Our innovative solutions can help drive down cost and help harden our customers' secure architecture as we work alongside them to co-develop secure solutions. We don't take ownership of our customers' secure architecture however, we do provide a set of secure solutions that can be customized to build the best secure architecture to support program and ultimate mission success. Security is built into our processes and into our processing solutions We provide the building blocks that allow our customers to build cus- tomized and scalable secure processing solutions. This "building block" approach can drive standardization and affordability without sacrificing the need for the prime and end-user to create differentiation among secure solutions. Mercury helps fill a widening gap in the defense industrial base between the large primes and small businesses. We design and build secure processing solutions that provide the customizable building blocks for system integrity. These building blocks are not an add-on or derivative product line; instead they are inherent in the DNA of every processing product we build. The added benefit of this approach is that primes, who are developing novel and complex security systems, can ensure their security architectures will be preserved as processing generations naturally evolve. These modular secure building blocks can be customized and scaled across form factors so that customers may extend and reuse their approved, proven security systems across multiple product types. Mercury is not new to developing and manufacturing secure processing solutions. We are now on our third generation of customizable secure processing elements and have a well-established roadmap for further "I'm at a big prime, we need a merchant supplier that isn't new to secure processing. We don't want to do business with someone who is late to the party." "At the DoD we've noticed a scarcity of suppliers who really understand the demands and requirements of building secure solutions. We're counting on the defense industrial base, with our support, to fix this." 3 System Software • System Management/ Logging • Middleware • Application porting System I/O • Protocol Integration / Translation • Third party integration Backplane/Chassis • Custom and high-speed backplane • Chassis development • Power supply units Packaging • Thermal • Ruggedization • Coating/Wraps FPGA Firmware • Firmware development kits • Custom IP • IP Integration Software • OS & Drivers • BIOS/ Bootcode • System management and diagnostics Hardware • Component selection • Sensors • Specialty components

Articles in this issue

view archives of White Paper - Secure Processing Solutions for the Defense and Intelligence Industry