Enhance Security with TRUSTEDCOTS SOLUTIONS

Curtiss-Wright goes well beyond standard approaches to Trusted Computing to provide truly secure TrustedCOTS solutions for air, ground, and sea platforms. Its one of the main reasons weve been a trusted, proven leader in the global defense and aerospace industries for decades.

Download the Trusted Computing Brochure Download the Trusted Computing eBook

Comprehensive Protection Throughout the Product Life Cycle

Curtiss-Wright TrustedCOTS solutions are designed and built around three major data protection domains:

  • Technology protection safeguards how computing tasks are executed. It combines the hardware capabilities, software algorithms, and operations needed to protect functionality, such as how the algorithm in a radar application works.
  • Data protection safeguards software algorithms, data-at-rest, and data-in-motion. It ensures that, for example, when data is sent from one system to another, it is not compromised.
  • Parts protection safeguards the supply chain and manufacturing processes. This ensures customers can trust that all components on Curtiss-Wright products are authentic and all processes have met the strictest quality controls. Read more about our trusted supply chain.

We keep cybersecurity and physical protection in mind from design and testing to supply chain and manufacturing. This comprehensive, end-to-end approach creates an effective mesh of protection layers that integrate to ensure reliability of Curtiss-Wright products in the face of attempted compromise.

TrustedCOTS Processing Solutions

Since theres no one-size-fits-all solution when it comes to Trusted Computing, our selection of TrustedCOTS products are designed within three frameworks that define common sets of features to meet varying levels of security requirements. Click here to download the TrustedCOTS brochure.

Trusted Boot

Trusted Boot
The TrustedCOTS Trusted Boot security framework provides protection mechanisms for the boot chain, access control for configuration menus, encryption and sanitization routines for non-volatile memory, a key management infrastructure, and other protections to support cybersecurity requirements.

Enhanced Trusted Boot

Enhanced Trusted Boot
The TrustedCOTS Enhanced Trusted Boot security framework offers all the protections of the Trusted Boot framework, and adds extra protection with an FPGA-based Root of Security (RoS).

Active Protection Enhanced Trusted Boot

Active Protection

The TrustedCOTS Active Protection security framework includes all the capabilities of the Trusted Boot and Enhanced Trusted Boot frameworks, while providing additional defenses. Due to the sensitive nature of these protections, we recommend discussing your specific requirements with a Curtiss-Wright representative to learn more.

 

Data-at-Rest Encryption Solutions

Todays defense and aerospace platforms are required to protect critical data-at-rest from unauthorized access. Curtiss-Wright offers cost-effective, proven, and certified commercial off-the-shelf (COTS) storage solutions that match various data security requirements, including National Security Agency (NSA) Type 1, NSA Commercial Solutions for Classified (CSfC), Common Criteria (CC), and FIPS 140-2. Click here to see our selection of data-at-rest encryption solutions.

Connect With Curtiss-Wright Connect With Curtiss-Wright Connect With Curtiss-Wright
Sales

CONTACT SALES

Contact our sales team today to learn more about our products and services.

YOUR LOCATION

PRODUCT INFORMATION

Support

GET SUPPORT

Our support team can help answer your questions - contact us today.

REQUEST TYPE

SELECT BY

SELECT Topic