We go the extra mile to protect our supply chain and manufacturing processes. This way, our customers can trust that all components on Curtiss-Wright products are authentic and all processes have met the strictest quality controls.

Counterfeit Parts Mitigation

The most important starting point for establishing a secure supply chain is ensuring the integrity of every part and component. That’s why we only buy components directly from franchise sources, from the components’ Original Equipment Manufacturer (OEM), or through the OEM’s authorized distribution channel.

We stay on top of new and evolving regulatory standards, implementing controlled processes designed to prevent counterfeit parts from entering the supply chain at any point in the product life cycle. Our SAE AS5553 (Counterfeit Electronic Parts; Avoidance, Detection, Mitigation, and Disposition) compliant process uses approved vendors who have been audited and monitored to ensure their authenticity and provide an audit trail for all components. We’re also compliant with SAE AS6174 (Counterfeit Materiel; Assuring Acquisition of Authentic and Conforming Materiel) standard, which now includes non-electrical component counterfeit mitigation.

Secure Manufacturing and Design Integrity

We provide robust mechanisms to protect our manufacturing facilities and mitigate any insider threats. Employees are subject to background checks before they are allowed to work on the manufacturing floor. Based on customer requirements, product is manufactured at sites accredited to handle ITAR information, and employees at these locations are ITAR cleared. As well, we have U.S. manufacturing sites that are secure facilities capable of handling classified data and components.

What’s more, to ensure design integrity throughout the product development process, Curtiss-Wright has facilities compliant to the U.S. DoD’s Risk Management Framework (RMF). This framework provides controls for the engineering environment to manage and mitigate unauthorized access, modification, loss, or theft of critical design information.

The Curtiss-Wright Advantage

Our technology solutions extend Trusted Computing best practices to every part of the development process, from design and testing to supply chain and manufacturing. The highest possible levels of protection are built into every aspect of solution development to increase the overall value that COTS solutions can provide in a secure system.

Curtiss-Wright takes a holistic view of Trusted Computing, going above and beyond the efforts of other vendors to apply the advanced protection capabilities needed to develop truly secure COTS solutions. It’s one of the main reasons the company has been a trusted, proven leader in the global defense and aerospace industries for decades.

Download our white paper to learn more about our supply chain, or explore our trusted, secure solutions below.




Parvus DuraNET 3300 + CHAMP-XD1S

TrustedCOTS™ Processing Modules

Data-at-Rest Encryption & Secure Storage Solutions

All Trusted Computing Solutions



What's New? Commercial Solutions for Classified Data-at-Rest Capability Package 5.0 Review U.S. Government customers require the market’s most modern commercial security... MORE> What is NSA Type 1 Encryption? An NSA Type 1 encryption product is a device or system certified by the National... MORE> What is Commercial Solutions for Classified (CSfC)? Commercial Solutions for Classified (CSfC) is an integral part of the National... MORE> Exploiting Big Data for Defense The “big data problem” – too much raw data coming too fast over too many... MORE> Curtiss-Wright Introduces Fastest, Highest Capacity 6U OpenVPX™ Storage Blade with 32/64 TB of 6.25 GBps NVMe Memory New VPX6-SBM Storage Blade Module more than doubles data rate and amount of NVMe... MORE> Curtiss-Wright Introduces High Speed 10 Gigabit Ethernet Network Attached Storage with Two-Layer Encryption to Protect Critical Sensor Data on Deployed Platforms New HSR10 network attached storage (NAS) system provides up to 32 TB storage... MORE> Aircraft Developer Looks to Modernize Storage of Sensitive Data A leading C5ISR system integrator reached out to Curtiss-Wright in search of a... MORE> DAR Series Part 4: NSA CSfC vs. Type 1 Encryption This white paper provides an objective, practical, and unbiased comparison between... MORE> DAR Series Part 3: NSA Type 1 Encryption This white paper is the third in the series of four related white papers on... MORE> Planning to Export Data-at-Rest Storage with Encryption? In applications where data flows need to take place in nanoseconds, the delay... MORE> Electronics Cooling Boosts Capabilities to Match Performance Upgrades Enabling technologies for electronics and embedded computing thermal management... MORE>
Connect With Curtiss-Wright Connect With Curtiss-Wright Connect With Curtiss-Wright


Contact our sales team today to learn more about our products and services.





Our support team can help answer your questions - contact us today.