Curtiss-Wright goes well beyond standard approaches to Trusted Computing to provide truly secure TrustedCOTS solutions for air, ground, and sea platforms. It’s one of the main reasons we’ve been a trusted, proven leader in the global defense and aerospace industries for decades.
Comprehensive Protection Throughout the Product Life Cycle
Curtiss-Wright Trusted Computing solutions are designed and built around three major data protection domains:
- Technology protection safeguards how computing tasks are executed. It combines the hardware capabilities, software algorithms, and operations needed to protect functionality, such as how the algorithm in a radar application works.
- Data protection safeguards software algorithms, data-at-rest, and data-in-motion. It ensures that, for example, when data is sent from one system to another, it is not compromised.
- Parts protection safeguards the supply chain and manufacturing processes. This ensures customers can trust that all components on Curtiss-Wright products are authentic and all processes have met the strictest quality controls.
We keep cybersecurity and physical protection in mind, from design and testing to supply chain and manufacturing. This comprehensive, end-to-end approach creates an effective mesh of protection layers that integrate to ensure reliability of Curtiss-Wright products in the face of attempted compromise.
TrustedCOTS™ Embedded Processing Solutions
Curtiss-Wright TrustedCOTS processor cards are designed using cutting-edge Trusted Computing techniques and mechanisms to enable the safe, reliable operation of embedded systems. TrustedCOTS products provide confidence not only that systems are secure and uncompromised, but that critical data or IP will not benefit adversaries if hardware falls into enemy hands. Click here to download the TrustedCOTS Brochure.
Data-at-Rest Encryption Solutions
Today’s defense and aerospace platforms are required to protect critical data-at-rest from unauthorized access. Curtiss-Wright offers cost-effective, proven, and certified commercial off-the-shelf (COTS) storage solutions that match various data security requirements, including National Security Agency (NSA) Type 1, NSA Commercial Solutions for Classified (CSfC), Common Criteria (CC), and FIPS 140-2. Click here to see our selection of data-at-rest encryption solutions.
Our Trusted Supply Chain
We go the extra mile to protect our supply chain and manufacturing processes. This way, our customers can trust that all components on Curtiss-Wright products are authentic and all processes have met the strictest quality controls. Read more about our trusted supply chain.