Showing 1 - 12 of 43
Navigating the Unseen: Mitigating Degraded Visual Environments

Navigating the Unseen: Mitigating Degraded Visual Environments

Using a Degraded Visual Environment (DVE) system enables aircraft pilots to visualize the landing area in poor conditions, allowing them a safe, on-time descent to their target destination.

05/01/2024
DAR Series Part 3: NSA Type 1 Encryption

DAR Series Part 3: NSA Type 1 Encryption

A Type 1 product is a classified or Controlled Cryptographic Item (CCI) endorsed by the NSA for securing classified and sensitive U.S. government information.

04/02/2024
DAR Series Part 2: Commercial Solutions for Classified (CSfC)

DAR Series Part 2: Commercial Solutions for Classified (CSfC)

Learn about the NSA CSfC program, data at rest encryption, capability package, protection profiles, components & layers, and trusted integrators.

03/13/2024
DAR Series Part 1: Data Threats and Protection

DAR Series Part 1: Data Threats and Protection

Classified data-at-rest (DAR) faces both internal and external threats that can subject sensitive data to exploitation.

01/04/2024
The Challenges of Cost Effective Video Management System Integration

The Challenges of Cost Effective Video Management System Integration

This white paper highlights the challenges with video system architecture design by looking at a traditional system versus an ideal system solution.

08/17/2023
System Solutions Brochure

System Solutions Brochure

Whether looking for a modular, SFF LRU or a scalable VPX system designed to meet your program requirements, Curtiss-Wright computing systems are built rugged to perform optimally in the harshest deployed environments on land, in the air, or at sea.

07/12/2023
Why Trusted Platform Modules are Critical to Deployed Network Attached Storage

Why Trusted Platform Modules are Critical to Deployed Network Attached Storage

Classified data-at-rest (DAR) in deployed applications faces both internal and external threats that can subject sensitive data to exploitation.

07/06/2023
B2 Bomber

Removing 10 GbE Network Attached Storage Bottlenecks

Network attached storage (NAS) devices have the ability to protect and store critical data at high-performance speeds.

03/22/2023
TrustedCOTS and Enhanced TrustedCOTS for Trusted Computing

TrustedCOTS and Enhanced TrustedCOTS for Trusted Computing

TrustedCOTS™ and Enhanced Trusted COTS technologies use an OSA for embedding security, enabling customers to leverage S-SOTA technologies.

03/09/2023
Airborne Applications & Protecting Data at Rest

Airborne Applications & Protecting Data-at-Rest

Protecting top-secret data on network attached storage with National Security Agency (NSA) approved encryption for military aircraft.

02/09/2023
Choosing the Right Data Storage Solutions for Modern Military Missions

Choosing the Right Data Storage Solutions for Modern Military Missions

This paper discusses the advanced characteristics of both network-attached storage devices and direct-attached storage devices.

07/20/2022
Seaborne Applications & Protecting Data-at-Rest

Seaborne Applications & Protecting Data-at-Rest

Find out how seaborne applications like UUVs, USVs, and submarines store and protect top-secret data-at-rest with a network-attached storage device.

06/21/2022