The battlefield on the ground, in the air, on and under water relies heavily on cyberspace and is increasingly becoming a digital ecosystem. Tamper-resistance is required at the device, inter-device, and networked systems level for mission critical operations. The major risks stem from the complexity of managing the supply chain (defense contractors), the sophisticated tools and methods in the arsenal of nation-state adversaries, and the air-gapped nature of combat systems. The willingness and ability to invest and innovate with new technologies face budgetary constraints and the effort to integrate for timely field deployment. 


The strategy will require at least:

  • using industry standards-based specifications (e.g. NIST, FIPS) vetted for robustness against nation-state attacks
  • integrating protective countermeasures on devices through the supply chain of equipment manufacturers
  • managing digital secrets at scale and as a local or remote maintenance activity – as a function of mission control
  • using X.509 digital certificates for key lifecycle management from a trusted facility
  • ubiquity across heterogeneous devices and systems for interoperability
  • tamper-resistant content delivery through the supply chain for traceability
  • minimizing personnel re-training to operate the hardened devices and systems on the battlefield

For military missions, risk can be measured in terms of safety and reliability of the systems. While data privacy is important, ensuring physical human safety and success of the mission success is absolutely critical.


of aerospace companies expect digital technologies to help reduce manufacturing delays.

— Accenture Consulting

Avionics manufacturers need to more easily meet DO-178 cybersecurity compliance requirements and ensure high reliability and safety. Many avionics controllers, FADECs, flight navigation and storage systems in aircraft are vulnerable to cyber attacks.

A Cybersecurity System Tailored for the Defense Industry


Used by more than 200 OEMs to protect more than 100 million devices

Mocana’s end-to-end security system is an FIPS 140-2 validated embedded cybersecurity software solution that ensures device trustworthiness and secure communications by giving industrial automation manufacturers, OEMs and critical infrastructure operators an easy way to harden electronic control units and controllers with multi-factor authentication and trust chaining, as well  secure boot to validate the firmware, OS and applications.

Download Industry Brief

Learn More About Mocana Solutions


Mocana TrustCenter™

Services platform for automated security lifecycle management

Mocana TrustEdge™

Comprehensive IoT endpoint security that simplifies integration

Mocana TrustCore™

Proven, differentiated and compliant system of cybersecurity
  • Mocana's new IoT software brings trusted, military-grade security, and cloud-based communications to safety-critical applications like connected commercial and military aircraft. We are excited to be working with Mocana and our joint customers to provide an integrated platform for safety-critical avionics applications that combines key pieces of their IoT software with our best-in-class DO-178 real-time operating system."

    Greg Rose

    Vice President of Marketing and Product Management at DDC-I

  • The tools provided by Mocana are rooted in its long history of equipping engineers with the ability to harden devices that perform mission-critical operations."

    Rob Westervelt

    Research Manager, IDC

  • Connected devices are being deployed at a rapid pace, and security can no longer be optional. This is a shared industry responsibility, which is why Arm is working with partners including Mocana to shift the economics of security by providing a common framework for building more secure connected devices through PSA."

    Paul Williamson

    Vice President and General Manager, IoT Device IP, Arm

Find the defense industry solutions that meet your needs

Request a demo


The latest thoughts on cybersecurity

Solution Briefs

Learn More

White Papers

Learn More


Learn More




Learn More

Case Studies

Learn More