TrustedCOTS™ – Protecting Critical Technologies & Data in Deployed Embedded Computing Systems

The Curtiss-Wright Defense Solutions initiative is to develop and provide secure enabling technologies and capabilities for the deployed embedded computing COTS market. The TrustedCOTS Program is designed to address the protection of critical military technologies and data for our customers, on a worldwide basis.
 

Trusted Products and Technology

Protecting Critical Technology (Anti-Tamper)

TrustedCOTS hardware and software is based on our standard products, but have security features designed-in to enable customers to quickly and economically implement their protection plans for critical technology (CT) and data. With TrustedCOTS products, customers can begin development on standard COTS hardware and software and then move to a TrustedCOTS version of the product when they are ready to implement their program protection requirements. Since the TrustedCOTS version of the product is 100% software and performance compatible, there is no wasted development time.

For requirements above and beyond COTS, our MCOTS (modified COTS) Service develops new or customized products for a specific customer, who can leverage our standard security features and our enormous wealth of Curtiss-Wright IP.

Protecting Critical Data (Information Assurance)

TrustedCOTS data protection provides the features to securely store, retrieve and move data in a system allowing only authorized access to this data. Curtiss-Wright has secure routers for Data-in-Motion solutions as well as secure storage for Data-at-Rest solutions. Both Type I, FIPS 140-2, FIPS 197, AES-256 and AES-128 encryption are supported for Data-at-Rest.

A global company with international corporate facilities, Curtiss-Wright has technology and development partners throughout the world. This enables us to respect unique national sensitivities and requirements regarding protected technology, by working with our customers on a local basis.
 

Trusted Processes

Products and technologies are only part of this initiative. Our activities and processes – such as technology partnering, design, counterfeit materials avoidance and other procurement procedures, manufacturing quality control, storage and disposal – are all worthy to bear the stamp of TrustedCOTS.
 

Trusted Industry

We are taking a proactive stance in discussions with governments, military organizations, industry partners and customers to ensure that TrustedCOTS will continue to lead the way in secure military computing. As a result, we will regularly evolve our product and technology roadmaps to keep the program aligned with our customers’ protection requirements.
 

For Further Information

The need to protect critical military technology and data is absolute and cannot be understated. Curtiss-Wright understands that secure products are by definition a sensitive subject for the world’s military forces. As a result, we will not publicize or make any direct public reference to any product, feature or technology in relation to our secure products or processes. To learn more, please contact your local sales representative, who will in turn put you in contact with our internal TrustedCOTS team.

 

Infocenter

Why Partner With Curtiss-Wright for DO-254 Safety-Certifiable Avionics Systems Curtiss-Wright can help you obtain the safety-certifiable building blocks,... MORE> Adding Redundant Links for High Availability Embedded Networking Andrew McCoubrey looks at high availability embedded networking and techniques for... MORE> Trusted Computing: A Layered Approach to Security Aaron Frank looks at how security must be implemented at every layer of each... MORE> Sensory Data Processing Simplified with GPGPU Tech and COTS Building Blocks Marc Couture looks at how standards-based, pre-validated building blocks can help... MORE> Curtiss-Wright to Take VPX Performance to New Heights with Support for 25+ Gbaud “Gen 5” Signaling Rates Next generation of Curtiss-Wright Fabric100™ Modules and Systems will feature... MORE> Accelerate Time-To-Market With Safety-Certifiable Airborne Electronics Hardware This white paper looks at how using safety-certifiable AEH components, developed... MORE> Curtiss-Wright Total LifeCycle Management With Total LifeCycle Management (TLCM) at Curtiss-Wright our team of experts... MORE> The Many Faces of Trusted Computing Defense and aerospace systems may be exposed to many security threats so every... MORE> Six Trusted Computing Terms That Should Be Top of Mind in Defense and Aerospace System Design Aaron Frank looks at six trusted computing terms and how they protect critical... MORE> Three Ways Power Architecture SBCs Deliver Trust Architecture – and Security to Boot Mike Slonosky takes a deeper look at cyber security and how trusted hardware is a... MORE> System Safety Certification Using Safety-Certifiable COTS: How To Mend The Gap Between Assembly Level Artifacts and the System Safety Assessment Rick Hearn looks at what “safety-certifiable COTS” will mean for avionics... MORE> Optimizing Performance in OpenVPX Architectures With Intel Xeon Processors OpenVPX (VITA 65) has made the VPX architecture a preferred option for modules and... MORE>
Connect With Curtiss-Wright Connect With Curtiss-Wright Connect With Curtiss-Wright
Sales

CONTACT SALES

Contact our sales team today to learn more about our products and services.

YOUR LOCATION

PRODUCT INFORMATION

Support

GET SUPPORT

Our support team can help answer your questions - contact us today.

REQUEST TYPE

SELECT BY

SELECT Topic