Showing 1 - 12 of 64
DAR Series Part 3: NSA Type 1 Encryption

DAR Series Part 3: NSA Type 1 Encryption

A Type 1 product is a classified or Controlled Cryptographic Item (CCI) endorsed by the NSA for securing classified and sensitive U.S. government information.

04/02/2024
DAR Series Part 2: Commercial Solutions for Classified (CSfC)

DAR Series Part 2: Commercial Solutions for Classified (CSfC)

Learn about the NSA CSfC program, data at rest encryption, capability package, protection profiles, components & layers, and trusted integrators.

03/13/2024
DAR Series Part 1: Data Threats and Protection

DAR Series Part 1: Data Threats and Protection

Classified data-at-rest (DAR) faces both internal and external threats that can subject sensitive data to exploitation.

01/04/2024
Solving the Tactical Communications Challenge

Solving the Tactical Communications Challenge

Building connected and workable communications in remote environments presents unique challenges, but the right technology can keep users connected in even contested and harsh environments.

10/03/2023
Why Trusted Platform Modules are Critical to Deployed Network Attached Storage

Why Trusted Platform Modules are Critical to Deployed Network Attached Storage

Classified data-at-rest (DAR) in deployed applications faces both internal and external threats that can subject sensitive data to exploitation.

07/06/2023
B2 Bomber

Removing 10 GbE Network Attached Storage Bottlenecks

Network attached storage (NAS) devices have the ability to protect and store critical data at high-performance speeds.

03/22/2023
Airborne Applications & Protecting Data at Rest

Airborne Applications & Protecting Data-at-Rest

Protecting top-secret data on network attached storage with National Security Agency (NSA) approved encryption for military aircraft.

02/09/2023

How to Lower the Cost and Risk of a New Tactical Data Link Solution

By using a proven, easy-to-use, comprehensive technology suite, ROI is increased, and greater capability is delivered with less downtime incurred.

11/15/2022

Securing Communications at the Tactical Edge Using HSMs

Hardware Security Modules (HSMs) - why their use is critical for today’s secure networks in the datacenter and at the tactical edge.

11/11/2022
Choosing the Right Data Storage Solutions for Modern Military Missions

Choosing the Right Data Storage Solutions for Modern Military Missions

This paper discusses the advanced characteristics of both network-attached storage devices and direct-attached storage devices.

07/20/2022
Seaborne Applications & Protecting Data-at-Rest

Seaborne Applications & Protecting Data-at-Rest

Find out how seaborne applications like UUVs, USVs, and submarines store and protect top-secret data-at-rest with a network-attached storage device.

06/21/2022
Defining the C5ISR Space for Army Vehicles

Defining the C5ISR Space for Army Vehicles

To lower the cost and help speed the pace of technology upgrades for command, control, computers, communications, cyber, intelligence, surveillance and reconnaissance (C5ISR) systems on Army vehicles – while supporting the U.S.

05/04/2022