Breadcrumb
- Home
- Capabilities
- Technologies
Built on a Legacy of Innovation
Founded in 1929, Curtiss-Wright has a long history of innovation, with its roots dating back to the Wright brothers’ first flight in 1903 and Glenn Curtiss’s first preannounced public flight in 1908. Today, we deliver technology innovations that provide high-performance reliability, ensure the security of data, and contribute to the safety of personnel for programs and platforms worldwide. Advance any program or platform with innovative technologies such as Fabric100 using high-performance commercial processor technologies in super-computing embedded computing systems.
Fabric100 100 GbE Data Processing
Trusted Computing for Defense & Aerospace
Curtiss-Wright’s approach to embedded security deploys defense-in-depth and defense-in-breadth strategies to leverage the powerful security features inherent in commercial components and to add additional defense-grade security technologies. Our TrustedCOTS™ framework fully enables the security capabilities of commercial hardware and software technologies to protect applications and data from compromise.
The TrustedCOTS framework includes 3 major data protection domains: technology, data and parts protection.
Curtiss-Wright proven and certified storage solutions match data security requirements for NSA Type 1, CSfC, CC and FIPS 140-2.
Data-in-motion, also called data-in-transit, refers to digital information when transferring between network system nodes.
Our TrustedCOTS products provide confidence in the security and un-compromised protections.
We go the extra mile to protect our supply chain and manufacturing processes.
Leverage Commercial Processor Technology
Curtiss-Wright works with world leaders in processor technologies to apply commercial technology to the demanding power, size, program life cycle and performance requirements of aerospace and defense applications. Explore the processor types used in our COTS boards and systems products.
Intel processors deliver the highest performance, enhanced on-chip graphics and media support, and built-in security capabilities.
FPGA and Adaptive SoC devices enable parallel processing of DSP algorithms because of the flexibility in reconfiguring the functionality.
GPUs complement a processor to offer display graphics or can serve as a math/vector acceleration engine.
Arm processors bring an unparalleled power-to-performance ratio to the most advanced mobile devices available.
These processors deliver reliable, scalable RISC architecture microprocessing for defense & aerospace applications.
Defense Solutions Product Guide
Explore Curtiss-Wright's mission-critical solutions based on the latest technologies and open standards. These innovative solutions are trusted and proven for aerospace and defense applications.
Defense Solutions Product Guide
Explore Curtiss-Wright's mission-critical solutions based on the latest technologies and open standards. These innovative solutions are trusted and proven for aerospace and defense applications.
TrustedCOTS and Enhanced TrustedCOTS for Trusted Computing
TrustedCOTS™ and Enhanced TrustedCOTS technologies use an OSA for embedding security, enabling customers to leverage S-SOTA technologies.
TrustedCOTS and Enhanced TrustedCOTS for Trusted Computing
TrustedCOTS™ and Enhanced TrustedCOTS technologies use an OSA for embedding security, enabling customers to leverage S-SOTA technologies.
Data-at-Rest Encryption Guide
Cost-effective, proven, and certified COTS storage solutions that match various data security requirements, including NSA Type 1, NSA CSfC, CC, NIAPC and FIPS 140-2.
Data-at-Rest Encryption Guide
Cost-effective, proven, and certified COTS storage solutions that match various data security requirements, including NSA Type 1, NSA CSfC, CC, NIAPC and FIPS 140-2.
Meeting DAL A Challenges with Dissimilar Redundant Architecture
This white paper examines how building a system with a dissimilar redundant architecture can help overcome the challenges of meeting DO-254/178 DAL A requirements.
Meeting DAL A Challenges with Dissimilar Redundant Architecture
This white paper examines how building a system with a dissimilar redundant architecture can help overcome the challenges of meeting DO-254/178 DAL A requirements.
Fabric100 100G Processing: Why Architectures Matter
Designers of high-performance embedded computing modules and systems must understand the technical considerations required to realize the true benefits of 100G technology fully.
Fabric100 100G Processing: Why Architectures Matter
Designers of high-performance embedded computing modules and systems must understand the technical considerations required to realize the true benefits of 100G technology fully.
Fabric100 100 GbE Data Processing Technology
Curtiss-Wright has developed Fabric100, a complete end-to-end ecosystem that features 100 Gigabit Ethernet (GbE) connectivity between rugged OpenVPX modules and system components.
Fabric100 100 GbE Data Processing Technology
Curtiss-Wright has developed Fabric100, a complete end-to-end ecosystem that features 100 Gigabit Ethernet (GbE) connectivity between rugged OpenVPX modules and system components.
Beyond Ruggedization: Ensuring Long-Term Reliability Brochure
Reliability requires in-depth, scientific testing and validation to ensure that ruggedized solutions dependably perform in the harshest field conditions for many years.
Beyond Ruggedization: Ensuring Long-Term Reliability Brochure
Reliability requires in-depth, scientific testing and validation to ensure that ruggedized solutions dependably perform in the harshest field conditions for many years.
COTS vs. Custom Safety Critical Military Avionics
Safety certification for military embedded systems can be time consuming, complex, and costly to complete. Curtiss-Wright offers an extensive catalog of safety-certifiable COTS hardware modules to suit application requirements.
COTS vs. Custom Safety Critical Military Avionics
Safety certification for military embedded systems can be time consuming, complex, and costly to complete. Curtiss-Wright offers an extensive catalog of safety-certifiable COTS hardware modules to suit application requirements.
DAR Series Part 1: Data Threats and Protection
Explore strategies for protecting classified data through encryption and considerations for choosing a data-at-rest encryption approach.
DAR Series Part 1: Data Threats and Protection
Explore strategies for protecting classified data through encryption and considerations for choosing a data-at-rest encryption approach.
DAR Series Part 2: Commercial Solutions for Classified (CSfC)
Learn about the innovative NSA CSfC program leveraging commercial encryption technologies in a layered approach for agile and cost-effective classified data protection.
DAR Series Part 2: Commercial Solutions for Classified (CSfC)
Learn about the innovative NSA CSfC program leveraging commercial encryption technologies in a layered approach for agile and cost-effective classified data protection.
DAR Series Part 3: NSA High Assurance Type 1 Encryption
Gain valuable insights into NSA High Assurance Type 1 encryption including device consideration factors, encryption algorithms, and certification processes.
DAR Series Part 3: NSA High Assurance Type 1 Encryption
Gain valuable insights into NSA High Assurance Type 1 encryption including device consideration factors, encryption algorithms, and certification processes.
DAR Series Part 4: NSA CSfC vs. High Assurance Type 1 Encryption
Compare NSA High Assurance Type 1 and CSfC encryption approaches across over a dozen factors, including procurement, risk, technology adoption, and exportability.
DAR Series Part 4: NSA CSfC vs. High Assurance Type 1 Encryption
Compare NSA High Assurance Type 1 and CSfC encryption approaches across over a dozen factors, including procurement, risk, technology adoption, and exportability.
Understanding the Power-to-Performance Capabilities of Intel Processors
There is a popular industry misconception that Intel processors draw more power than Power Architecture and Arm processors. This paper discusses how that is not the case.
Understanding the Power-to-Performance Capabilities of Intel Processors
There is a popular industry misconception that Intel processors draw more power than Power Architecture and Arm processors. This paper discusses how that is not the case.
Establishing a Trusted Supply Chain
This paper examines the best practices commercial off-the-shelf (COTS) hardware vendors must employ to establish a trusted supply chain, including managing obsolescence, counterfeit parts mitigation, secure manufacturing, and design integrity.
Establishing a Trusted Supply Chain
This paper examines the best practices commercial off-the-shelf (COTS) hardware vendors must employ to establish a trusted supply chain, including managing obsolescence, counterfeit parts mitigation, secure manufacturing, and design integrity.