Access Control That's Cybersecure at the Core

Cybersecurity Icon

Strong Cybersecurity Starts With Strong Access Control

Mercury MP Intelligent Controllers from HID are designed with advanced cybersecurity features that protect every layer of physical access infrastructure. Encryption, authentication, system integrity and compliance are built into the architecture, giving organizations confidence that their systems are secure, scalable and flexible.
Encryption Icon

Encryption

Mercury solutions safeguard every interaction across the access control ecosystem. From reader to controller and controller to host, data are encrypted in motion and at rest.

  • TLS 1.3 handshake for controller to host communication
  • AES-128/256 encryption for stored data, credentials and I/O communication
  • OSDP Secure Channel for secure reader communication
Authentication Icon

Authentication

Strong identity assurance means verifying both people and devices.

  • Mutual authentication between host, controller and edge
  • Secure boot CPU and crypto chip to block unauthorized code
  • ARM TrustZone for processor-level isolation
  • Support for mobile, biometric and certificate-based credentials
  • 802.1X for network authentication
System Integrity Icon

System Integrity

Mercury uses a secure software development lifecycle with threat modeling, secure coding, code reviews and third-party penetration testing.

  • Signed firmware and rigorous validation
  • Continuous monitoring, CVE tracking and patch distribution
  • Software Bill of Materials (SBOM) visibility
  • OSDP Verified certification by SIA
Compliance Icon

Compliance and Standards

Mercury MP Controllers are designed to align with leading security standards.

  • FIPS 140-3 validated cryptographic modules
  • FIPS 201 compliance
  • SOC 2 Type 2 and ISO 27018 at the HID platform level
  • CSA STAR for cloud assurance
Zero Trust Icon

Zero Trust

Every access request is continuously authenticated and authorized.

  • No device, credential or location is trusted by default
  • Identity-aware controls
  • Continuous authentication between hardware and software
  • Encrypted communication paths across the ecosystem
Detection Icon

Detection and Response

Identify and respond to unusual activity.

  • Real-time alerts
  • Anomaly detection for failed access attempts and unauthorized firmware updates
  • Event monitoring integrated with enterprise SIEM platforms
  • Physical access data correlated with digital threat intelligence

Mercury Embedded Application Environment

Mercury’s embedded application environment supports certificate management, password policies and firmware updates with IoT-like flexibility. This makes cybersecurity processes more straightforward and more accessible.
LEARN MORE

Mercury MP Intelligent Controllers

Looking for a secure and dependable foundation for your physical access system? Mercury MP Controllers deliver the flexibility, integration options and built-in cybersecurity needed to evolve along with your organization’s needs.
EXPLORE MERCURY MP CONTROLLERS
See how we’re laying the foundation for more secure access control systems in this white paper.
GET THE WHITE PAPER
Learn three practical ways to harden cybersecurity in connected access control, starting at the controller, in this video.
WATCH THE VIDEO
Access control systems have evolved from gatekeepers to real-time security orchestrators. Get the details in this article.
READ THE BLOG
Texture wide
SIGNUP

Connect with Us

© HID Global, part of ASSA ABLOY. All rights reserved.
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram