Showing 1 - 12 of 30
DAR Series Part 2: Commercial Solutions for Classified (CSfC)

DAR Series Part 2: Commercial Solutions for Classified (CSfC)

Learn about the NSA CSfC program, data at rest encryption, capability package, protection profiles, components & layers, and trusted integrators.

03/13/2024
DAR Series Part 1: Data Threats and Protection

DAR Series Part 1: Data Threats and Protection

Classified data-at-rest (DAR) faces both internal and external threats that can subject sensitive data to exploitation. DAR is particularly at risk during missions if the deployed vehicle is lost but is also at risk during transport to and from the vehicle.

01/04/2024
Fabric100

Fabric100 100G Processing: Why Architectures Matter

Designers of high-performance embedded computing modules and systems must understand the technical considerations required to realize the true benefits of 100G technology fully.

10/04/2023
Solving the Tactical Communications Challenge

Solving the Tactical Communications Challenge

Building connected and workable communications in remote environments presents unique challenges, but the right technology can keep users connected in even contested and harsh environments.

10/03/2023
Why Trusted Platform Modules are Critical to Deployed Network Attached Storage

Why Trusted Platform Modules are Critical to Deployed Network Attached Storage

Classified data-at-rest (DAR) in deployed applications faces both internal and external threats that can subject sensitive data to exploitation.

07/06/2023
Fabric100

Fabric100 100GbE Data Processing Technology

Curtiss-Wright has developed Fabric100, a complete end-to-end ecosystem that features 100 Gigabit Ethernet (GbE) connectivity between rugged OpenVPX modules and system components.

06/13/2023
B2 Bomber

Removing 10 GbE Network Attached Storage Bottlenecks

Network attached storage (NAS) devices have the ability to protect and store critical data at high-performance speeds.

03/22/2023
SOSA UAV

The SOSA Technical Standard and Trusted Computing for Defense Systems

The SOSA Technical Standard combines MOSA principles with security to enable secure sensor processing systems to be quickly developed and deployed in a low-risk environment.

03/09/2023
Airborne Applications & Protecting Data at Rest

Airborne Applications & Protecting Data-at-Rest

Protecting top-secret data on network attached storage with National Security Agency (NSA) approved encryption for military aircraft.

02/09/2023
Choosing the Right Data Storage Solutions for Modern Military Missions

Choosing the Right Data Storage Solutions for Modern Military Missions

This paper discusses the advanced characteristics of both network-attached storage devices and direct-attached storage devices.

07/20/2022
Seaborne Applications & Protecting Data-at-Rest

Seaborne Applications & Protecting Data-at-Rest

Find out how seaborne applications like UUVs, USVs, and submarines store and protect top-secret data-at-rest with a network-attached storage device.

06/21/2022
Defining the C5ISR Space for Army Vehicles

Defining the C5ISR Space for Army Vehicles

To lower the cost and help speed the pace of technology upgrades for command, control, computers, communications, cyber, intelligence, surveillance and reconnaissance (C5ISR) systems on Army vehicles – while supporting the U.S.

05/04/2022