Download PDF version Contact company

Mercury Security, the manufacturer of OEM technology, and HID, a pioneer in trusted identity and access control solutions, announce the next-generation Mercury MP Controllers, designed to deliver enhanced flexibility and security for businesses of all sizes.

As technology advances, access control systems require robust encryption and advanced threat detection.

Mercury MP Controllers

The new Mercury MP Controllers empower access control software providers and integrators to seamlessly combine a wide range of access control technologies, elevator control, building automation, IoT applications, and third-party solutions into a unified, centralised, and fully robust infrastructure.

This open approach provides the freedom to choose the right solution for specific customer requirements.

Advanced safety features

The new intelligent controllers were designed with advanced security features to safeguard sensitive data

Taking this commitment a step further, the new intelligent controllers were designed with advanced security features to safeguard sensitive data and to help protect against evolving cyber threats.

A robust cryptographic engine supported by a secure boot CPU, crypto chip, and data encryption aims to provide proactive protection against unauthorised access and attacks.

Robust, future-ready access control

In today's dynamic business environment, organisations demand access control solutions that are not only secure and reliable but also flexible enough to adapt to evolving needs,” says Steve Lucas VP of OEM Sales at Mercury Security.

The new MPControllers deliver on these critical requirements, empowering businesses to create robust, future-ready access control systems with increased ROI, scalability, and cybersecurity at their core.”

Benefits of controllers

The Mercury MP Controllers provide partners and end users with:

  • Flexibility: The freedom to design and upgrade systems without limiting software and hardware choices, and seamlessly integrate the latest technologies with no costly rip-and-replace projects. This flexibility extends to OEMs, allowing them to seamlessly integrate the controllers with both on-premises and cloud-based access control environments.
  • Scalability: The ability to meet system architecture from a single door to an entire enterprise.
  • Heightened Security: The support for physical and cybersecurity features to help keep networks and data safe.
  • Reliability: The peace of mind of having invested in reliable and trusted hardware in the business.

Dual-footprint circuit design

The Mercury MP Controllers deliver powerful new features such as a dual-footprint circuit design with alternate components for business continuity, a future-ready development environment for expanded integrations, and the adoption of enhanced cybersecurity best practices, like ARM TrustZone, to protect systems.

The MP controllers will be available later in 2024 through Mercury OEM partners.

Download PDF version Download PDF version

In case you missed it

What are the new security applications in colleges and universities?
What are the new security applications in colleges and universities?

College campuses are meant to be places of learning, growth, and community. Fostering such an environment requires the deployment of policies and technologies that ensure safety an...

Real-time security analytics by Winston-Salem Police Department with Verkada
Real-time security analytics by Winston-Salem Police Department with Verkada

The Winston-Salem Police Department (WSPD), internationally accredited by the Commission on Accreditation for Law Enforcement Agencies (CALEA), is dedicated to proactive, data-driv...

Oil sector cybersecurity - overcoming challenges with Honeywell's csHAZOP
Oil sector cybersecurity - overcoming challenges with Honeywell's csHAZOP

A major European oil and gas company that acquires, explores, produces and supplies chemical and petroleum products had a cybersecurity challenge. Company leadership wanted a b...

Quick poll
Which feature is most important in a video surveillance system?