Curtiss-Wright’s TrustedCOTS embedded processor card family includes single board computers and digital signal processing engines. Designed using cutting-edge Trusted Computing techniques and mechanisms to enable the safe, reliable operation of embedded systems, our TrustedCOTS products provide confidence not only that systems are secure and un-compromised, but that critical data or IP will not benefit adversaries if hardware falls into enemy hands.


Curtiss-Wright’s enhanced TrustedCOTS (eTCOTS) pairs our proven expertise and products with the latest innovations from leading suppliers of defense-grade security to the DoD market. Traditionally, defense-grade security solutions required custom hardware somewhere in the system to protect Critical Program Information (CPI). This was an expensive and time-consuming effort that could cause significant program schedule delays. Our eTCOTS approach provides the necessary infrastructure on select processor modules to allow the hosting of IP from Raytheon Intelligence & Space, Idaho Scientific, and Wind River. Read our eTCOTS brochure to learn more.

TrustedCOTS Embedded Processor Cards

Since there’s no one-size-fits-all solution when it comes to Trusted Computing, our selection of TrustedCOTS products are designed within three frameworks that define common sets of features to meet varying levels of security requirements. Click here to download the TrustedCOTS brochure.

Trusted Boot

Trusted Boot
The TrustedCOTS Trusted Boot security framework provides protection mechanisms for the boot chain, access control for configuration menus, encryption and sanitization routines for non-volatile memory, a key management infrastructure, and other protections to support cybersecurity requirements.

Enhanced Trusted Boot

Enhanced Trusted Boot
The TrustedCOTS Enhanced Trusted Boot security framework offers all the protections of the Trusted Boot framework, and adds extra protection with an FPGA-based Root of Security (RoS).

Active Protection Enhanced Trusted Boot

Active Protection

The TrustedCOTS Active Protection security framework includes all the capabilities of the Trusted Boot and Enhanced Trusted Boot frameworks, while providing additional defenses. Due to the sensitive nature of these protections, we recommend discussing your specific requirements with a Curtiss-Wright representative to learn more.

Download the TrustedCOTS brochure to learn more, or explore our trusted, secure solutions below.

Trusted Supply Chain


Parvus DuraNET 3300 + CHAMP-XD1S

Our Trusted Supply Chain

Data-at-Rest Encryption & Secure Storage Solutions

All Trusted Computing Solutions



What's New? Commercial Solutions for Classified Data-at-Rest Capability Package 5.0 Review U.S. Government customers require the market’s most modern commercial security... MORE> What is NSA Type 1 Encryption? An NSA Type 1 encryption product is a device or system certified by the National... MORE> What is Commercial Solutions for Classified (CSfC)? Commercial Solutions for Classified (CSfC) is an integral part of the National... MORE> Exploiting Big Data for Defense The “big data problem” – too much raw data coming too fast over too many... MORE> Curtiss-Wright Introduces Fastest, Highest Capacity 6U OpenVPX™ Storage Blade with 32/64 TB of 6.25 GBps NVMe Memory New VPX6-SBM Storage Blade Module more than doubles data rate and amount of NVMe... MORE> Curtiss-Wright Introduces High Speed 10 Gigabit Ethernet Network Attached Storage with Two-Layer Encryption to Protect Critical Sensor Data on Deployed Platforms New HSR10 network attached storage (NAS) system provides up to 32 TB storage... MORE> Aircraft Developer Looks to Modernize Storage of Sensitive Data A leading C5ISR system integrator reached out to Curtiss-Wright in search of a... MORE> DAR Series Part 4: NSA CSfC vs. Type 1 Encryption This white paper provides an objective, practical, and unbiased comparison between... MORE> DAR Series Part 3: NSA Type 1 Encryption This white paper is the third in the series of four related white papers on... MORE> Planning to Export Data-at-Rest Storage with Encryption? In applications where data flows need to take place in nanoseconds, the delay... MORE> Electronics Cooling Boosts Capabilities to Match Performance Upgrades Enabling technologies for electronics and embedded computing thermal management... MORE>
Connect With Curtiss-Wright Connect With Curtiss-Wright Connect With Curtiss-Wright


Contact our sales team today to learn more about our products and services.





Our support team can help answer your questions - contact us today.