Breadcrumb
- Home
- About Us
- Our Global Locations
- Dayton, OH
Center of Excellence
For Secure Data Storage & High-Speed Data Recorders
The Curtiss-Wright Defense Solutions facility in Dayton, Ohio is our Center of Excellence for design, development, and support of secure data storage and high-speed data recorders for defense and aerospace applications. The Dayton center, established in 1975, employs approximately 40 people in a 24,000-square-foot state-of-the-art facility. Approximately 45 percent of personnel at the facility are engineers.
Stringent Quality Procedures
Curtiss-Wright’s stringent quality procedures govern all activities at the Dayton facility. These procedures focus on the prevention and early detection of non-conformances related to products, processes, and system quality. We continually monitor the effectiveness of our quality procedures to:
- Ensure continued compliance with AS9100 and customer requirements
- Assess local performance against company performance metrics and quality objectives
- Identify improvement opportunities
The Dayton facility holds the following certification and maintains compliance with the following standards.
CERTIFICATIONS & STANDARDS | DESCRIPTION |
---|---|
AS9100D & ISO 9001:2015 | Quality management systems |
IPC-A-610 Class 3 J-STD-001 | Electronic assemblies |
ANSI/ESD S20.20 | Electrostatic discharge |
ISO 10012 | Measurement management for calibration |

Curtiss-Wright, 2600 Paramount Place, Suite 200, Fairborn, OH 45324 USA
Phone: +1.937.252.5601
Fax: +1.937.252.1349
CAGE Code 1P423
DUNS 96-838-9515
Related Capabilities, Products and Services





Defense Solutions Product Guide
Choosing the Right Data Storage Solutions For Aerospace and Defense Applications
This paper discusses the advanced characteristics of both network-attached storage devices and direct-attached storage devices.

Choosing the Right Data Storage Solutions For Aerospace and Defense Applications
This paper discusses the advanced characteristics of both network-attached storage devices and direct-attached storage devices.
Build vs. Buy Considerations for Deployed Data-at-Rest Storage Devices
To help customers make the correct build-or-buy decision for deployed data-at-rest network attached storage devices, this paper highlights key considerations that should be weighed, including encryption and certification.

Build vs. Buy Considerations for Deployed Data-at-Rest Storage Devices
To help customers make the correct build-or-buy decision for deployed data-at-rest network attached storage devices, this paper highlights key considerations that should be weighed, including encryption and certification.
Data-at-Rest Encryption Guide
Cost-effective, proven, and certified COTS storage solutions that match various data security requirements, including NSA Type 1, NSA CSfC, CC, NIAPC and FIPS 140-2.

Data-at-Rest Encryption Guide
Cost-effective, proven, and certified COTS storage solutions that match various data security requirements, including NSA Type 1, NSA CSfC, CC, NIAPC and FIPS 140-2.
DAR Series Part 1: Data Threats and Protection
Explore strategies for protecting classified data through encryption and considerations for choosing a data-at-rest encryption approach.

DAR Series Part 1: Data Threats and Protection
Explore strategies for protecting classified data through encryption and considerations for choosing a data-at-rest encryption approach.
DAR Series Part 2: Commercial Solutions for Classified (CSfC)
Learn about the innovative NSA CSfC program leveraging commercial encryption technologies in a layered approach for agile and cost-effective classified data protection.

DAR Series Part 2: Commercial Solutions for Classified (CSfC)
Learn about the innovative NSA CSfC program leveraging commercial encryption technologies in a layered approach for agile and cost-effective classified data protection.
DAR Series Part 3: NSA High Assurance Type 1 Encryption
Gain valuable insights into NSA High Assurance Type 1 encryption including device consideration factors, encryption algorithms, and certification processes.

DAR Series Part 3: NSA High Assurance Type 1 Encryption
Gain valuable insights into NSA High Assurance Type 1 encryption including device consideration factors, encryption algorithms, and certification processes.
DAR Series Part 4: NSA CSfC vs. High Assurance Type 1 Encryption
Compare NSA High Assurance Type 1 and CSfC encryption approaches across over a dozen factors, including procurement, risk, technology adoption, and exportability.

DAR Series Part 4: NSA CSfC vs. High Assurance Type 1 Encryption
Compare NSA High Assurance Type 1 and CSfC encryption approaches across over a dozen factors, including procurement, risk, technology adoption, and exportability.
Protect and Isolate NAS Functions with Software Full Disk Encryption and Disk Partitioning
Through disk partitioning and commercial off-the-shelf (COTS) data-at-rest (DAR) encryption, this paper proposes a solution that reduces the risk of data loss, corruption, and accessibility if intercepted.

Protect and Isolate NAS Functions with Software Full Disk Encryption and Disk Partitioning
Through disk partitioning and commercial off-the-shelf (COTS) data-at-rest (DAR) encryption, this paper proposes a solution that reduces the risk of data loss, corruption, and accessibility if intercepted.
Optimizing Video Capture and Storage for Deployed Aircraft
This paper focuses on the secure recording and storage of video data captured by camera systems in deployed military aircraft.

Optimizing Video Capture and Storage for Deployed Aircraft
This paper focuses on the secure recording and storage of video data captured by camera systems in deployed military aircraft.
Weighing the Options: SATA vs. NVMe Data Storage for Deployed Applications
Managing the ever-growing amounts of data generated by deployed military applications poses a critical challenge, as the data must be securely stored, quickly accessed, and protected in harsh environments.

Weighing the Options: SATA vs. NVMe Data Storage for Deployed Applications
Managing the ever-growing amounts of data generated by deployed military applications poses a critical challenge, as the data must be securely stored, quickly accessed, and protected in harsh environments.
Selecting a High-Speed NAS Device for Military Aircraft
This white paper outlines important considerations for defining a deployed NAS solution for military aircraft and covers architectural trade-offs, legacy system issues, transportability, and encryption approaches required to protect sensitive DAR.

Selecting a High-Speed NAS Device for Military Aircraft
This white paper outlines important considerations for defining a deployed NAS solution for military aircraft and covers architectural trade-offs, legacy system issues, transportability, and encryption approaches required to protect sensitive DAR.
Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption
The goal of post-quantum cryptography is to develop cryptographic systems that are secure and can interoperate with existing communications protocols and networks.

Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption
The goal of post-quantum cryptography is to develop cryptographic systems that are secure and can interoperate with existing communications protocols and networks.
Using NetBoot to Reduce Deployed System Maintenance and SWaP-C
This white paper looks at how NetBoot brings new efficiencies, better security, and significant savings to teams that are tasked with maintaining software on embedded systems.

Using NetBoot to Reduce Deployed System Maintenance and SWaP-C
This white paper looks at how NetBoot brings new efficiencies, better security, and significant savings to teams that are tasked with maintaining software on embedded systems.
Why Trusted Platform Modules are Critical to Deployed Network Attached Storage
Classified data-at-rest (DAR) in deployed applications faces both internal and external threats that can subject sensitive data to exploitation.

Why Trusted Platform Modules are Critical to Deployed Network Attached Storage
Classified data-at-rest (DAR) in deployed applications faces both internal and external threats that can subject sensitive data to exploitation.
High-Speed Data Recording Insights for the Military Embedded Industry
This paper covers encryption approaches for high-speed networks and solutions, taking into consideration a recording system’s size and power requirements.

High-Speed Data Recording Insights for the Military Embedded Industry
This paper covers encryption approaches for high-speed networks and solutions, taking into consideration a recording system’s size and power requirements.
Removing 10 GbE Network Attached Storage Bottlenecks
Network attached storage (NAS) devices have the ability to protect and store critical data at high-performance speeds.

Removing 10 GbE Network Attached Storage Bottlenecks
Network attached storage (NAS) devices have the ability to protect and store critical data at high-performance speeds.
Airborne Applications & Protecting Data-at-Rest
Protecting top-secret data on network attached storage with National Security Agency (NSA) approved encryption for military aircraft.

Airborne Applications & Protecting Data-at-Rest
Protecting top-secret data on network attached storage with National Security Agency (NSA) approved encryption for military aircraft.
Seaborne Applications & Protecting Data-at-Rest
Find out how seaborne applications like UUVs, USVs, and submarines store and protect top-secret data-at-rest with a network-attached storage device.

Seaborne Applications & Protecting Data-at-Rest
Find out how seaborne applications like UUVs, USVs, and submarines store and protect top-secret data-at-rest with a network-attached storage device.
CSfC Series: Inner vs. Outer Layer
This white paper explores the Commercial Solutions for Classified (CSfC) program, data at rest encryption, terminology, and the inner vs. outer layer of protection.

CSfC Series: Inner vs. Outer Layer
This white paper explores the Commercial Solutions for Classified (CSfC) program, data at rest encryption, terminology, and the inner vs. outer layer of protection.
What's New in CSfC Data-at-Rest Capability Package 5.0
This paper provides a review of the most recent changes from CP 4.0 to 5.0 with special emphasis on Unattended Operation Use Case and a HH solution.

What's New in CSfC Data-at-Rest Capability Package 5.0
This paper provides a review of the most recent changes from CP 4.0 to 5.0 with special emphasis on Unattended Operation Use Case and a HH solution.