White Paper

Secure Processing Solutions for the Defense and Intelligence Industry

Issue link: https://read.uberflip.com/i/1173382

Contents of this Issue

Navigation

Page 4 of 6

w w w. m r c y. c o m WHITE PAPER 4 The potential supply chain risk of globalization to the defense industrial base is well summarized in the National Defense Authorization Act of 2011; "The risk that an adversary may sabotage, maliciously introduce unwanted function, or otherwise subvert the design integrity, manufacturing, production, distribution, installation, operation or maintenance of a covered system so as to surveil, deny, disrupt or otherwise degrade the function, use or operation of such system." Customers can trust Mercury. We do not offshore the manufacturing of our embedded processing solutions. All are engineered, designed, developed and manufactured in the USA. Manufacturing takes place in our Advanced Microelectronics Centers or Advanced Development Centers. We are aligned to the DoD strategy for Trusted Systems and Networks and Supply Chain Risk Management (SCRM) that addresses supply chain criticality, systems engineering best practices, supply chain threat assessments and managing risk during acquisition lifecycles. We are a partner to the DoD and can assist with the manufacturing, engineering, test and evaluation of processing technologies. Mercury is domestically owned and operated and is the only fully domestic provider of high performance computing solutions to the defense industrial base. We are providing solutions for our customers' mission success, not that of our adversaries. On top of that, Mercury is the only provider of next-generation secure AdvancedTCA™ processing solutions that manufactures in the USA. We have invested in world class manufacturing, including our two redundant Advanced Micro- electronics Centers, both in the USA. We only buy microprocessors from Original Component Manufacturers or their franchise distributors as part of a stringent counterfeit parts protection program. Finally, we haven't had to "re-shore"- we have stayed domestic to meet the needs of the defense platforms and missions we support. innovations. Customized security elements can be mixed and matched without the prime or end customer having to reinvent the wheel with each program and mission. A final benefit to Mercury's position in the defense industrial base is that we serve as an ideal business partner to small businesses and are actively pre-integrating their innovative security capabilities into the secure processing product line. On top of this we offer some specific best practices that allow us to build afford- able secure processing solutions: • We practice Systems Security Engineering to help identify and eliminate security vulnerabilities in our solutions • Software Assurance practices are built-in to our processes and the development of our high-performance computing solutions • We practice secure design and coding standards including prac- tices around authentication, being security-aware and error and exception handling • We are aligned with the DoD Program Protection Plan that calls for an overarching framework for trusted systems • Our solutions are designed and integrated in secure facilities with top government Department of Security Service (DSS) ratings- in the top 8% of all suppliers Finally, we believe secure processing and modular open systems architectures do not need to be mutually exclusive. For the past five years we have been developing and building secure solutions leverag- ing our OpenVPX technology and most recently our push for a new RF and Microwave MOSA, called OpenRFM. Scalable, standardized open systems architecture-based secure processing solutions are not only possible, they are being built today. Trusted Supply Chain - Engineered, Designed, Manufactured and Tested in the USA Mercury Systems understands the challenge faced by the DoD with globalization of the microelectronics supply chain. Today, commercial IT technologies have penetrated almost all aspects of DoD missions and programs. These technologies can be of widely varying quality, reliability and trustworthiness. The traditional threats still exist around loss of important data and technology. Emerging threats exist and are growing related to compromise of the manufacturing and supply chain of the defense industrial base. Open TM RFM

Articles in this issue

view archives of White Paper - Secure Processing Solutions for the Defense and Intelligence Industry