TrustedCOTS™ – Protecting Critical Technologies & Data in Deployed Embedded Computing Systems

The Curtiss-Wright Defense Solutions initiative is to develop and provide secure enabling technologies and capabilities for the deployed embedded computing COTS market. The TrustedCOTS Program is designed to address the protection of critical military technologies and data for our customers, on a worldwide basis.

Protecting Critical Technology (Anti-Tamper)

TrustedCOTS hardware and software is based on our standard products, but have security features designed-in to enable customers to quickly and economically implement their protection plans for critical technology (CT) and data. With TrustedCOTS products, customers can begin development on standard COTS hardware and software and then move to a TrustedCOTS version of the product when they are ready to implement their program protection requirements. Since the TrustedCOTS version of the product is 100% software and performance compatible, there is no wasted development time.

For requirements above and beyond COTS, our MCOTS (Modified COTS) Service develops new or customized products for a specific customer, who can leverage our standard security features and our enormous wealth of Curtiss-Wright IP.

Security on Curtiss-Wright SBC and DSP Products

Product Processor Standard Security
XMC-121
VPX3-1220
Kabylake Xeon Intel Boot Guard, Intel SGX, Intel vPro, Intel VT-x, Intel TXT, TPM 2.0, NV memory sanitization, NV memory write protect, UEFI Secure Boot SSD encryption
VPX3-1260 Coffee Lake Xeon Intel Boot Guard, Intel SGX, Intel vPro, Intel VT-x, Intel TXT, TPM 2.0, NV memory sanitization, NV memory write protect, UEFI Secure Boot SSD encryption
VME-1908
VPX3-1258
VPX6-1958
Haswell Core i7 Intel VT-x, Intel TXT, TPM 1.2, NV memory sanitization, NV memory write protect
VPX3-1259 Broadwell Core i7 Intel VT-x, Intel TXT, TPM 1.2, NV memory sanitization, NV memory write protect
VPX6-1959
VPX3-482
Broadwell Core i7 Intel VT-x, Intel TXT, TPM 1.2, NV memory sanitization, NV memory write protect
VME-186
VPX3-131
VPX3-150
VPX3-151
VPX6-187
QorIQ P-Series Trust 1.1 components: Hypervisor and No Execute protections, Platform (IO), MMU Secure Debug Controller Security, Monitor w/ext. tamper detect, Security Fuse Processor with OTP key
Other Security: NV memory sanitization, NV memory write protect
VME-196
VPX3-133
VPX3-152
VPX6-195
VPX6-197
QorIQ T-Series Trust 1.1 components: Hypervisor and No Execute protections, Platform (IO), MMU Secure Debug Controller Security, Monitor w/ext. tamper detect, Security Fuse Processor with OTP key
Other Security: NV memory sanitization, NV memory write protect
VPX3-1703 QorIQ LS-Series Trust 1.1 components: IO Access Control, Platform (IO) MMU Secure Debug Controller Security Monitor w/ext. tamper detect Security Fuse Processor with OTP Master Key Opt. battery backed Zeroizable Master Key Alternate Image, Key Revocation support.
Other Security:NV memory sanitization, NV memory write protect, ARM Trustzone

Protecting Critical Data (Information Assurance)

TrustedCOTS data protection provides the features to securely store, retrieve and move data in a system allowing only authorized access to this data. Curtiss-Wright has secure routers for Data-in-Motion solutions as well as secure storage for Data-at-Rest solutions. Both Type I, FIPS 140-2, FIPS 197, AES-256 and AES-128 encryption are supported for Data-at-Rest.

A global company with international corporate facilities, Curtiss-Wright has technology and development partners throughout the world. This enables us to respect unique national sensitivities and requirements regarding protected technology, by working with our customers on a local basis.
 

Trusted Processes

Products and technologies are only part of this initiative. Our activities and processes – such as technology partnering, design, counterfeit materials avoidance and other procurement procedures, manufacturing quality control, storage and disposal – are all worthy to bear the stamp of TrustedCOTS.
 

Trusted Industry

We are taking a proactive stance in discussions with governments, military organizations, industry partners and customers to ensure that TrustedCOTS will continue to lead the way in secure military computing. As a result, we will regularly evolve our product and technology roadmaps to keep the program aligned with our customers’ protection requirements.
 

For Further Information

The need to protect critical military technology and data is absolute and cannot be understated. Curtiss-Wright understands that secure products are by definition a sensitive subject for the world’s military forces. As a result, we will not publicize or make any direct public reference to any product, feature or technology in relation to our secure products or processes. To learn more, please contact your local sales representative, who will in turn put you in contact with our internal TrustedCOTS team.

 

Infocenter

Combining Multiple Video Sources onto a Single Screen This white paper discusses how modern, powerful and flexible video processing... MORE> The Clock Starts and Stops Here Jermemy Banks looks at how accurate synchronization was achieved using the... MORE> How Safety-Certifiable COTS are Designed to Meet DO-254 Requirements Rick Hearn looks at how the careful component selection of DO-254 certifiable COTS... MORE> Protecting Critical Data on Unmanned Underwater Platforms Mike Southworth looks at protecting critical data on unmanned underwater platforms. MORE> Understanding Your Safety-Certifiable COTS Options: A Closer Look at the Subsystem Level This white paper examines today’s safety-certifiable COTS offerings, from the... MORE> Pushing Airborne ISR Data Recorders to New Performance Heights Paul Davis looks at how it’s now possible to design digital data recorders that... MORE> Multi-Gsps, Multi-board Analog IO Synchronization This case study describes a multi-board solution to phase accurate synchronization... MORE> Introducing Gen 5 VPX Ivan Straznicky looks at the introduction of Gen 5 VPX, the initial Gen 5 VPX... MORE> Smaller, Faster, Stronger Courtney Howard looks at how military and aerospace requirements demand greater... MORE> A New Era for Embedded Computing: Why Arm Processors Are Ideal for Defense, Aerospace, and Rugged Embedded Applications Mike Slonosky and Mike Southworth look at why Arm processors are ideal for... MORE> Small Form Factor Mission Systems: Driving Forward the Development of Next Generation UUVs A system integrator required small form factor (SFF) mission processors, network... MORE> VITA 48.8 Air Flow Through Cooling Standard Lowers SWaP-C on Deployed VPX Systems VITA 48.8 represents an approach for cooling embedded systems using an air flow... MORE>
Connect With Curtiss-Wright Connect With Curtiss-Wright Connect With Curtiss-Wright
Sales

CONTACT SALES

Contact our sales team today to learn more about our products and services.

YOUR LOCATION

PRODUCT INFORMATION

Support

GET SUPPORT

Our support team can help answer your questions - contact us today.

REQUEST TYPE

SELECT BY

SELECT Topic