Showing 1 - 12 of 27
DAR Series Part 3: NSA Type 1 Encryption

DAR Series Part 3: NSA Type 1 Encryption

A Type 1 product is a classified or Controlled Cryptographic Item (CCI) endorsed by the NSA for securing classified and sensitive U.S. government information.

04/02/2024
DAR Series Part 2: Commercial Solutions for Classified (CSfC)

DAR Series Part 2: Commercial Solutions for Classified (CSfC)

Learn about the NSA CSfC program, data at rest encryption, capability package, protection profiles, components & layers, and trusted integrators.

03/13/2024
DAR Series Part 1: Data Threats and Protection

DAR Series Part 1: Data Threats and Protection

Classified data-at-rest (DAR) faces both internal and external threats that can subject sensitive data to exploitation.

01/04/2024
Webinar: Delivering True Unified Command and Control to the Tactical Edge URL

Webinar: Delivering True Unified Command and Control to the Tactical Edge

Curtiss-Wright's Dominic Perez and REDCOM's Jeff Smith discuss how to choose the correct hardware for land, sea and air with examples from Curtiss-Wright's modular and rugged tactical communication systems.

10/25/2023
The Challenges of Cost Effective Video Management System Integration

The Challenges of Cost Effective Video Management System Integration

This white paper highlights the challenges with video system architecture design by looking at a traditional system versus an ideal system solution.

08/17/2023
System Solutions Brochure

System Solutions Brochure

Whether looking for a modular, SFF LRU or a scalable VPX system designed to meet your program requirements, Curtiss-Wright computing systems are built rugged to perform optimally in the harshest deployed environments on land, in the air, or at sea.

07/12/2023
Webinar: Cross-Domain and Secure Remote Access Solutions at the Edge

Webinar: Cross-Domain and Secure Remote Access Solutions at the Edge

Curtiss-Wright's Dominic Perez and Forcepoint's Rob Link discuss the use of cross domain solutions for securing remote access to classified networks.

07/06/2023
TrustedCOTS and Enhanced TrustedCOTS for Trusted Computing

TrustedCOTS and Enhanced TrustedCOTS for Trusted Computing

TrustedCOTS™ and Enhanced Trusted COTS technologies use an OSA for embedding security, enabling customers to leverage S-SOTA technologies.

03/09/2023
Data-at-Rest Encryption Guide

Data-at-Rest Encryption Guide

Cost-effective, proven, and certified COTS storage solutions that match various data security requirements, including NSA Type 1, NSA CSfC, CC, NIAPC and FIPS 140-2.

05/14/2022
Optimize Network Access at the Tactical Edge with Software-Defined Wide Area Networking

Optimize Network Access at the Tactical Edge with Software Defined Wide Area Networking

This paper illustrates the current barriers to communication and situational understanding (SA) and orients the reader to tools that are available today to break down these barriers. Today’s warfighters can’t be impaired by a lack of information.

04/28/2022
Unmanned Surface Vehicle Requires Encrypted Storage for the Autonomy System

Unmanned Surface Vehicle Requires Encrypted Storage for the Autonomy System

Tasked with building a new Unmanned Surface Vehicle (USV), a shipbuilder faced challenging requirements.

03/25/2022
Secure Wireless Communication Supporting Vehicle-to-Vehicle and Vehicle-to-EUD for Mounted and Dismounted Connectivity White Paper

Secure Wireless Communication Supporting Vehicle-to-Vehicle and Vehicle-to-EUD for Mounted and Dismounted Connectivity

The goal of Secure Wireless Communications is to provide controlled access to classified or controlled unclassified information (CUI) over any RF transport in the field - between vehicles and end-users alike.

02/28/2022