<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=235929&amp;fmt=gif">

Blogs by Trenton Systems / Cybersecurity

by Christopher Trick, on Mar 24, 2023 10:51:57 AM

Due to the complex, data intensive nature of HPC workloads, computing infrastructures must be equipped to accelerate and enhance these tasks while being tailored to an end user's application needs …

Read Story
Topics:CybersecurityCross domain solutionsField Programmable Gate Array (FPGA)

by Christopher Trick, on Dec 15, 2022 10:58:19 AM

DULUTH, GA -- Trenton Systems has partnered with Raytheon Intelligence & Space, a Raytheon Technologies business, to advance cyber resiliency across the federal, Department of Defense (DoD), and enterprise sectors …

Read Story
Topics:Cybersecurityzero trust architectureRaytheon

by Christopher Trick, on Oct 16, 2022 3:00:00 PM

DULUTH, GA—Trenton Systems has secured a multi-million dollar program win from an international prime contractor for an autonomous maritime threat detection program. The integration of autonomous, secure, high-performance computers with …

Read Story
Topics:CybersecurityHigh-performance computersSWaP-Cautonomous

by Christopher Trick, on Oct 12, 2022 3:12:44 PM

With advanced cyberattacks on the rise, technology that handles and encrypts critical data must be secure and reliable at all times, at all levels. In this blog, you'll learn more …

Read Story
Topics:CybersecurityFederal Information Processing Standards (FIPS)self-encrypting drives (SEDs)FIPS 140-3

by Christopher Trick, on Sep 21, 2022 9:08:47 AM

Source: BAE Systems. Data often moves between areas with varying classification and security levels, prompting the need for a solution that can guard critical data, irrespective of where it is …

Read Story
Topics:CybersecurityHigh-performance computersdata protectionCross domain solutions

by Christopher Trick, on Sep 7, 2022 12:18:44 PM

As cyberattacks increase in sophistication, security measures must evolve to boost protection against these ever-evolving threats to create a secure foundation, guard workloads, and enhance software resilience. In this blog, …

Read Story
Topics:IntelCybersecurityPlatform Firmware Resilience (PFR)Software Guard Extensions (SGX)High-performance computersTotal Memory Encryption (TME)

by Christopher Trick, on Mar 23, 2022 9:00:00 AM

As our world becomes increasingly digitized, protecting critical mission systems across the hardware, firmware, and software layer stack is vital. In this blog, you'll learn about the technologies necessary to …

Read Story
Topics:CybersecuritytechnologyHPC

by Christopher Trick, on Mar 22, 2022 9:13:31 AM

Failure to protect your operating system, perhaps the most important software on a computer, can lead to various kinds of cyberattacks, impeding performance and compromising critical data. In this blog, …

Read Story
Topics:Cybersecurityoperating systemdata protection

by Christopher Trick, on Mar 22, 2022 9:12:50 AM

Disks and drives store massive amounts of critical data, making their security against cybercriminals a top priority. In this blog, you'll learn what full-disk encryption (FDE) is and why it …

Read Story
Topics:Cybersecuritydata protectionfull disk encryption

by Christopher Trick, on Mar 21, 2022 11:03:45 AM

Source: zenlayer.com A BMC (Baseboard Management Controller), which is an embedded computer that can access and control all of a server's resources, uses remote management capabilities to increase efficiency but …

Read Story
Topics:CybersecurityIPMIhardware monitoring

Trenton Systems Blog

Our blogs cover the latest ruggedized computing news and company updates.

More...

Subscribe to Updates