Enhance Security with TRUSTEDCOTS SOLUTIONS
Curtiss-Wright goes well beyond standard approaches to Trusted Computing to provide truly secure TrustedCOTS solutions for air, ground, and sea platforms. Its one of the main reasons weve been a trusted, proven leader in the global defense and aerospace industries for decades.
Comprehensive Protection Throughout the Product Life Cycle
Curtiss-Wright TrustedCOTS solutions are designed and built around three major data protection domains:
- Technology protection safeguards how computing tasks are executed. It combines the hardware capabilities, software algorithms, and operations needed to protect functionality, such as how the algorithm in a radar application works.
- Data protection safeguards software algorithms, data-at-rest, and data-in-motion. It ensures that, for example, when data is sent from one system to another, it is not compromised.
- Parts protection safeguards the supply chain and manufacturing processes. This ensures customers can trust that all components on Curtiss-Wright products are authentic and all processes have met the strictest quality controls. Read more about our trusted supply chain.
We keep cybersecurity and physical protection in mind from design and testing to supply chain and manufacturing. This comprehensive, end-to-end approach creates an effective mesh of protection layers that integrate to ensure reliability of Curtiss-Wright products in the face of attempted compromise.
TrustedCOTS Processing Solutions
Since theres no one-size-fits-all solution when it comes to Trusted Computing, our selection of TrustedCOTS products are designed within three frameworks that define common sets of features to meet varying levels of security requirements. Click here to download the TrustedCOTS brochure.
![]() |
Trusted Boot
|
![]() |
Enhanced Trusted Boot |
![]() |
Active Protection The TrustedCOTS Active Protection security framework includes all the capabilities of the Trusted Boot and Enhanced Trusted Boot frameworks, while providing additional defenses. Due to the sensitive nature of these protections, we recommend discussing your specific requirements with a Curtiss-Wright representative to learn more. |
Data-at-Rest Encryption Solutions
Todays defense and aerospace platforms are required to protect critical data-at-rest from unauthorized access. Curtiss-Wright offers cost-effective, proven, and certified commercial off-the-shelf (COTS) storage solutions that match various data security requirements, including National Security Agency (NSA) Type 1, NSA Commercial Solutions for Classified (CSfC), Common Criteria (CC), and FIPS 140-2. Click here to see our selection of data-at-rest encryption solutions.