Breadcrumb
- Home
- Capabilities
- Technologies
- Security
- Data-At-Rest (DAR) Encryption
Protect Critical Data-at-Rest (DAR) from Unauthorized Access
Cost-effective, proven, and certified COTS solutions
Today’s defense and aerospace platforms are required to protect critical data-at-rest (DAR) from unauthorized access. Curtiss-Wright offers cost-effective, proven, and certified commercial off-the-shelf (COTS) storage solutions that match various data security requirements, including National Security Agency (NSA) Type 1, NSA Commercial Solutions for Classified (CSfC), Common Criteria (CC), and FIPS 140-2. We also have decades of experience designing and manufacturing a range of flight recorders meeting current and anticipated regulations, including ED-112A and 25-hour voice/datalink recording.
Data-at-Rest Encryption Guide
DAR Encryption Solutions
HSR10
The High-Speed Recorder 10 is a high-performance network attached storage (NAS) device with two 10 GbE ports, NVMe-based storage technology, and two encryption layers for high-speed data throughput and security.
HSR10
The High-Speed Recorder 10 is a high-performance network attached storage (NAS) device with two 10 GbE ports, NVMe-based storage technology, and two encryption layers for high-speed data throughput and security.
DTS1+
The DTS1+ NAS solution stores and protects mission-critical DAR during missions and transport with two layers of CSfC full disk encryption in a single, compact, ready-to-deploy device.
DTS1+
The DTS1+ NAS solution stores and protects mission-critical DAR during missions and transport with two layers of CSfC full disk encryption in a single, compact, ready-to-deploy device.
DTS1X
The DTS1X NAS device delivers high-speed and secure data transfer through a 10 GbE interface with removable memory and two layers of encryption.
DTS1X
The DTS1X NAS device delivers high-speed and secure data transfer through a 10 GbE interface with removable memory and two layers of encryption.
DTS3
The DTS3 Network Attached File Server seamlessly integrates into network-centric systems with three removable memory cartridges, software full disk encryption and disk partitioning for rugged, secure data storage.
DTS3
The DTS3 Network Attached File Server seamlessly integrates into network-centric systems with three removable memory cartridges, software full disk encryption and disk partitioning for rugged, secure data storage.
Unattended Network Storage (UNS)
The UNS rugged NAS system features NSA Type 1 encryption, multiple 10 GbE ports for high-speed data throughput, and high-capacity removable storage for unattended applications.
Unattended Network Storage (UNS)
The UNS rugged NAS system features NSA Type 1 encryption, multiple 10 GbE ports for high-speed data throughput, and high-capacity removable storage for unattended applications.
Unattended Network Storage Ground Station (UNS-GS)
The UNS Ground Station NAS enables secure data transfer between the ground station and a deployed UNS with NSA Type 1 encryption.
Unattended Network Storage Ground Station (UNS-GS)
The UNS Ground Station NAS enables secure data transfer between the ground station and a deployed UNS with NSA Type 1 encryption.
HSR100 Rackmount
The HSR100 rackmount NAS solution provides secure, network-enabled data storage with two 100 GbE ports, up to 64 TB capacity, and supports a pathway to NSA CSfC and Type 1 encryption.
HSR100 Rackmount
The HSR100 rackmount NAS solution provides secure, network-enabled data storage with two 100 GbE ports, up to 64 TB capacity, and supports a pathway to NSA CSfC and Type 1 encryption.
HSR40 CC
The HSR40 conduction-cooled Network Attached Storage (NAS) utilizes high-density NVMe SSDs for high speed applications to eliminate system bottlenecks.
HSR40 CC
The HSR40 conduction-cooled Network Attached Storage (NAS) utilizes high-density NVMe SSDs for high speed applications to eliminate system bottlenecks.
Explore the DAR Technologies
DAR Series Part 1: Data Threats and Protection
Explore strategies for protecting classified data through encryption and considerations for choosing a data-at-rest encryption approach.
DAR Series Part 1: Data Threats and Protection
Explore strategies for protecting classified data through encryption and considerations for choosing a data-at-rest encryption approach.
DAR Series Part 2: Commercial Solutions for Classified (CSfC)
Learn about the innovative NSA CSfC program leveraging commercial encryption technologies in a layered approach for agile and cost-effective classified data protection.
DAR Series Part 2: Commercial Solutions for Classified (CSfC)
Learn about the innovative NSA CSfC program leveraging commercial encryption technologies in a layered approach for agile and cost-effective classified data protection.
DAR Series Part 3: NSA High Assurance Type 1 Encryption
Gain valuable insights into NSA High Assurance Type 1 encryption including device consideration factors, encryption algorithms, and certification processes.
DAR Series Part 3: NSA High Assurance Type 1 Encryption
Gain valuable insights into NSA High Assurance Type 1 encryption including device consideration factors, encryption algorithms, and certification processes.
DAR Series Part 4: NSA CSfC vs. High Assurance Type 1 Encryption
Compare NSA High Assurance Type 1 and CSfC encryption approaches across over a dozen factors, including procurement, risk, technology adoption, and exportability.
DAR Series Part 4: NSA CSfC vs. High Assurance Type 1 Encryption
Compare NSA High Assurance Type 1 and CSfC encryption approaches across over a dozen factors, including procurement, risk, technology adoption, and exportability.
CSfC Series: Inner vs. Outer Layer
This white paper explores the Commercial Solutions for Classified (CSfC) program, data at rest encryption, terminology, and the inner vs. outer layer of protection.
CSfC Series: Inner vs. Outer Layer
This white paper explores the Commercial Solutions for Classified (CSfC) program, data at rest encryption, terminology, and the inner vs. outer layer of protection.
Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption
The goal of post-quantum cryptography is to develop cryptographic systems that are secure and can interoperate with existing communications protocols and networks.
Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption
The goal of post-quantum cryptography is to develop cryptographic systems that are secure and can interoperate with existing communications protocols and networks.
Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions
Review the challenges for deploying QR encryption and how to implement DAR and data-in-transit QR encryption solutions using commercial FPGA devices and off-the-shelf hardware.
Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions
Review the challenges for deploying QR encryption and how to implement DAR and data-in-transit QR encryption solutions using commercial FPGA devices and off-the-shelf hardware.
What's New in CSfC Data-at-Rest Capability Package 5.0
This paper provides a review of the most recent changes from CP 4.0 to 5.0 with special emphasis on Unattended Operation Use Case and a HH solution.
What's New in CSfC Data-at-Rest Capability Package 5.0
This paper provides a review of the most recent changes from CP 4.0 to 5.0 with special emphasis on Unattended Operation Use Case and a HH solution.
Airborne Applications & Protecting Data-at-Rest
Protecting top-secret data on network attached storage with National Security Agency (NSA) approved encryption for military aircraft.
Airborne Applications & Protecting Data-at-Rest
Protecting top-secret data on network attached storage with National Security Agency (NSA) approved encryption for military aircraft.
Seaborne Applications & Protecting Data-at-Rest
Find out how seaborne applications like UUVs, USVs, and submarines store and protect top-secret data-at-rest with a network-attached storage device.
Seaborne Applications & Protecting Data-at-Rest
Find out how seaborne applications like UUVs, USVs, and submarines store and protect top-secret data-at-rest with a network-attached storage device.
Certification Authorities for Trusted Computing in Military and Avionics Products
This white paper provides an overview of certification authorities involved in Trusted Computing, explores which disciplines they oversee, and gives guidance on when to get these certification authorities involved.
Certification Authorities for Trusted Computing in Military and Avionics Products
This white paper provides an overview of certification authorities involved in Trusted Computing, explores which disciplines they oversee, and gives guidance on when to get these certification authorities involved.
Choosing the Best Location for Your Data-At-Rest Encryption Technology
The choice of encryption location can determine how difficult it is for adversaries to decrypt sensitive data and use it to their advantage.
Choosing the Best Location for Your Data-At-Rest Encryption Technology
The choice of encryption location can determine how difficult it is for adversaries to decrypt sensitive data and use it to their advantage.
Review DAR Encryption Approaches
Endorsed by the NSA for securing classified and sensitive U.S. Government information when appropriately keyed.
Strategy to deliver secure solutions that leverage commercial technologies and products.
An internationally recognized security certification standard for commercial cryptography.
See DAR Technologies in Action
Maximizing Mission Duration and Data Security for UUVs
A system developer sought to equip a new generation of UUVs with a compact, efficient data storage solution capable of supporting extended missions, high-performance throughput, and data protection – all within the constraints of the underwater environment. Learn about the challenges, solution, and results.
Maximizing Mission Duration and Data Security for UUVs
A system developer sought to equip a new generation of UUVs with a compact, efficient data storage solution capable of supporting extended missions, high-performance throughput, and data protection – all within the constraints of the underwater environment. Learn about the challenges, solution, and results.
Deploying Secure and Efficient NAS Solutions for a UAV
To accelerate program development with no NRE investment and enable rapid integration, a UAV developer required a ready-to-deploy network attached storage system with reliable, redundant Ethernet network interfaces and expandable storage capacity with security.
Deploying Secure and Efficient NAS Solutions for a UAV
To accelerate program development with no NRE investment and enable rapid integration, a UAV developer required a ready-to-deploy network attached storage system with reliable, redundant Ethernet network interfaces and expandable storage capacity with security.
Mission Recorder With Secure Data Storage for Utility Helicopter
Gathering and analyzing mission data onboard a utility helicopter requires secure data recording and storage.
Mission Recorder With Secure Data Storage for Utility Helicopter
Gathering and analyzing mission data onboard a utility helicopter requires secure data recording and storage.
Modernizing an ISR Mission with Secure 10 GbE Data Storage
An aerospace company sought a network attached storage (NAS) device that was fast enough for new high-fidelity sensors that could store the vast amounts of data produced, could protect the classified data, and facilitate capacity expansion in the future.
Modernizing an ISR Mission with Secure 10 GbE Data Storage
An aerospace company sought a network attached storage (NAS) device that was fast enough for new high-fidelity sensors that could store the vast amounts of data produced, could protect the classified data, and facilitate capacity expansion in the future.
Unmanned Surface Vehicle Requires Encrypted Storage for the Autonomy System
Tasked with building a new Unmanned Surface Vehicle (USV), a shipbuilder faced challenging requirements.
Unmanned Surface Vehicle Requires Encrypted Storage for the Autonomy System
Tasked with building a new Unmanned Surface Vehicle (USV), a shipbuilder faced challenging requirements.
Aggressor Fighter Squadron Needs Secure Removable Storage Solutions
Tasked by the U.S. Air Force with updating their Aggressor fighter squadron, an aerospace company sought a small data network attached storage (NAS) device for a new batch of refurbished fighter jets.
Aggressor Fighter Squadron Needs Secure Removable Storage Solutions
Tasked by the U.S. Air Force with updating their Aggressor fighter squadron, an aerospace company sought a small data network attached storage (NAS) device for a new batch of refurbished fighter jets.
COTS Data-at-Rest Encryption Onboard an Unmanned Underwater Vehicle (UUV)
Curtiss-Wright develops network-attached storage (NAS) devices for an unmanned underwater vehicle (UUV).
COTS Data-at-Rest Encryption Onboard an Unmanned Underwater Vehicle (UUV)
Curtiss-Wright develops network-attached storage (NAS) devices for an unmanned underwater vehicle (UUV).
Next-Generation Aircraft Protection Requires ITAR-Free Data Storage
Tasked with developing a flexible, modular aircraft protection system, an aerospace company sought a small data network attached storage (NAS) device that could be used on current and future programs.
Next-Generation Aircraft Protection Requires ITAR-Free Data Storage
Tasked with developing a flexible, modular aircraft protection system, an aerospace company sought a small data network attached storage (NAS) device that could be used on current and future programs.
Unmanned Surface Vehicle Requires NetBoot and Commercial Encryption
Tasked with building a new Unmanned Surface Vehicle (USV), a shipbuilder faced challenging requirements. The developer planned to connect all the computer systems via a one gigabit Ethernet (1 GbE) network.
Unmanned Surface Vehicle Requires NetBoot and Commercial Encryption
Tasked with building a new Unmanned Surface Vehicle (USV), a shipbuilder faced challenging requirements. The developer planned to connect all the computer systems via a one gigabit Ethernet (1 GbE) network.
Aircraft Developer Looks to Modernize Storage of Sensitive Data
A leading C5ISR system integrator reached out to Curtiss-Wright in search of network-attached storage (NAS) server that would bring their aging fleet up-to-date.
Aircraft Developer Looks to Modernize Storage of Sensitive Data
A leading C5ISR system integrator reached out to Curtiss-Wright in search of network-attached storage (NAS) server that would bring their aging fleet up-to-date.
Airplane Developer Looks to Protect ISR Data with Encryption
While developing a new intelligence, surveillance, and reconnaissance (ISR) system, a large aerospace developer approached Curtiss-Wright for commercial off-the-shelf (COTS) equipment that had to fit into a space-constrained, propeller-driven aircraft.
Airplane Developer Looks to Protect ISR Data with Encryption
While developing a new intelligence, surveillance, and reconnaissance (ISR) system, a large aerospace developer approached Curtiss-Wright for commercial off-the-shelf (COTS) equipment that had to fit into a space-constrained, propeller-driven aircraft.
Unmanned Underwater Vehicle NAS Protects Terabytes of Top Secret Mission Data
In search of a small form factor network attached storage (NAS) solution for a new UUV, an engineer at a defense contractor reached out to Curtiss-Wright. The UUV required a high storage capacity solution to store critical mission data on long-range missions.
Unmanned Underwater Vehicle NAS Protects Terabytes of Top Secret Mission Data
In search of a small form factor network attached storage (NAS) solution for a new UUV, an engineer at a defense contractor reached out to Curtiss-Wright. The UUV required a high storage capacity solution to store critical mission data on long-range missions.
Rugged, Encrypted Data Storage for an ISR Pod
A customer sought a secure data storage solution that could maintain reliability under extreme temperatures and vibration, and be available off the shelf.
Rugged, Encrypted Data Storage for an ISR Pod
A customer sought a secure data storage solution that could maintain reliability under extreme temperatures and vibration, and be available off the shelf.
Protecting Data-at-Rest with NSA CSfC Approved Encryption on a UAV
A large integrator faced the challenge of protecting Top Secret DAR on a UAV and approached Curtiss-Wright for a solution.
Protecting Data-at-Rest with NSA CSfC Approved Encryption on a UAV
A large integrator faced the challenge of protecting Top Secret DAR on a UAV and approached Curtiss-Wright for a solution.
Data Protection Domains
Data-in-motion, also called data-in-transit, refers to digital information when transferring between network system nodes.
Our TrustedCOTS products provide confidence in the security and un-compromised protections.
We go the extra mile to protect our supply chain and manufacturing processes.