Filter by:

Showing 1 - 12 of 53
DAR Series Part 2: Commercial Solutions for Classified (CSfC)

DAR Series Part 2: Commercial Solutions for Classified (CSfC)

Learn about the NSA CSfC program, data at rest encryption, capability package, protection profiles, components & layers, and trusted integrators.

03/13/2024
DAR Series Part 1: Data Threats and Protection

DAR Series Part 1: Data Threats and Protection

Classified data-at-rest (DAR) faces both internal and external threats that can subject sensitive data to exploitation. DAR is particularly at risk during missions if the deployed vehicle is lost but is also at risk during transport to and from the vehicle.

01/04/2024
Fabric100

Fabric100 100G Processing: Why Architectures Matter

Designers of high-performance embedded computing modules and systems must understand the technical considerations required to realize the true benefits of 100G technology fully.

10/04/2023
Solving the Tactical Communications Challenge

Solving the Tactical Communications Challenge

Building connected and workable communications in remote environments presents unique challenges, but the right technology can keep users connected in even contested and harsh environments.

10/03/2023
Fabric100

Fabric100 100GbE Data Processing Technology

Curtiss-Wright has developed Fabric100, a complete end-to-end ecosystem that features 100 Gigabit Ethernet (GbE) connectivity between rugged OpenVPX modules and system components.

06/13/2023
High-Speed Data Recording Insights for the Military Embedded Industry

High-Speed Data Recording Insights for the Military Embedded Industry

This paper covers encryption approaches for high-speed networks and solutions, taking into consideration a recording system’s size and power requirements.

05/22/2023
TrustedCOTS and Enhanced TrustedCOTS for Trusted Computing

TrustedCOTS and Enhanced TrustedCOTS for Trusted Computing

TrustedCOTS™ and Enhanced Trusted COTS technologies use an OSA for embedding security, enabling customers to leverage S-SOTA technologies.

03/09/2023
Securing Communications at the Tactical Edge Using HSMs

Securing Communications at the Tactical Edge Using HSMs

Hardware Security Modules (HSMs) - why their use is critical for today’s secure networks in the datacenter and at the tactical edge.

11/11/2022
Data-at-Rest Encryption Guide

Data-at-Rest Encryption Guide

Cost-effective, proven, and certified COTS storage solutions that match various data security requirements, including NSA Type 1, NSA CSfC, CC, NIAPC and FIPS 140-2.

05/14/2022
Unmanned Surface Vehicle Requires Encrypted Storage for the Autonomy System

Unmanned Surface Vehicle Requires Encrypted Storage for the Autonomy System

Tasked with building a new Unmanned Surface Vehicle (USV), a shipbuilder faced challenging requirements.

03/25/2022
Data-At-Rest Build vs. Buy Considerations for Deployed Storage Devices

Data-at-Rest Build vs. Buy Considerations for Deployed Storage Devices

This paper focuses on deployed DAR devices. Whether you build a NAS or buy an existing COTS NAS, each approach has advantages and disadvantages.

03/14/2022
Space Systems Brochure

Space Systems Brochure

Curtiss-Wright has experience on a wide variety of platforms and missions using the same COTS equipment in both development and operational applications.

03/06/2022