Trusted COTS™ – Protecting Critical Technologies & Data in Deployed Embedded Computing Systems

The Curtiss-Wright Defense Solutions initiative is to develop and provide secure enabling technologies and capabilities for the deployed embedded computing COTS market. The Trusted COTS Program is designed to address the protection of critical military technologies and data for our customers, on a worldwide basis.

Trusted Products and Technology

Protecting Critical Technology (Anti-Tamper)

Trusted COTS hardware and software is based on our standard products, but have security features designed-in to enable customers to quickly and economically implement their protection plans for critical technology (CT) and data. With Trusted COTS products, customers can begin development on standard COTS hardware and software and then move to a Trusted COTS version of the product when they are ready to implement their program protection requirements. Since the Trusted COTS version of the product is 100% software and performance compatible, there is no wasted development time.

For requirements above and beyond COTS, our MCOTS (modified COTS) Service develops new or customized products for a specific customer, who can leverage our standard security features and our enormous wealth of Curtiss-Wright IP.

Protecting Critical Data (Information Assurance)

Trusted COTS data protection provides the features to securely store, retrieve and move data in a system allowing only authorized access to this data. Curtiss-Wright has secure routers for Data-in-Motion solutions as well as secure storage for Data-at-Rest solutions. Both Type I, FIPS 140-2, FIPS 197, AES-256 and AES-128 encryption are supported for Data-at-Rest.

A global company with international corporate facilities, Curtiss-Wright has technology and development partners throughout the world. This enables us to respect unique national sensitivities and requirements regarding protected technology, by working with our customers on a local basis.

Trusted Processes

Products and technologies are only part of this initiative. Our activities and processes – such as technology partnering, design, counterfeit materials avoidance and other procurement procedures, manufacturing quality control, storage and disposal – are all worthy to bear the stamp of Trusted COTS.

Trusted Industry

We are taking a proactive stance in discussions with governments, military organizations, industry partners and customers to ensure that Trusted COTS will continue to lead the way in secure military computing. As a result, we will regularly evolve our product and technology roadmaps to keep the program aligned with our customers’ protection requirements.

For Further Information

The need to protect critical military technology and data is absolute and cannot be understated. Curtiss-Wright understands that secure products are by definition a sensitive subject for the world’s military forces. As a result, we will not publicize or make any direct public reference to any product, feature or technology in relation to our secure products or processes. To learn more, please contact your local sales representative, who will in turn put you in contact with our internal Trusted COTS team.


Deployable Core Counts Explode with Intel’s New Xeon D Processor This white paper examines the ground-breaking chip, the Intel Xeon D processor,... MORE> COTS and Safety Certifiability in the Military and Aerospace Industry Today’s challenge of providing safety certifiable mission-critical systems with... MORE> Video Distribution System for SAR Helicopter A large helicopter manufacturer required a video distribution system (VDS) that... MORE> Flexible Recorder for Multi-Platform ISR UAV Application Reduces Program Risk A large DoD prime contractor required a Network Attached Storage (Recorder) device... MORE> Combining Multiple Video Sources into a Single Screen This white paper discusses how modern, powerful and flexible video processing... MORE> Hazardous Misleading Information Part 2: Mitigation Strategies for Dual Output COTS Graphical Processors This white paper is part 2 of the safety certification and hazardous misleading... MORE> Safety Certification & Hazardous Misleading Information: Mitigation Strategies for COTS Graphical Processors This white paper discusses architectural mitigation strategies that can be... MORE> FMC to FMC+: Keeping Up with New FPGAs and Analog I/O As FPGAs get faster and have more I/O channels with higher resolution and larger... MORE> Mitigate Program Risk with a Flexible Data Recording and Storage System This white paper discusses how the Compact Network Storage 4-slot (CNS4) file... MORE> Rugged, Fibre Channel Recording System A defense helicopter company required a rugged data recording system with Fibre... MORE> Get the Big Embedded Payoff: The 5th Gen Intel Core i7 Processor Intel’s new Broadwell processor was developed for broad commercial markets but... MORE> Curtiss-Wright Showcases Freescale Solutions Product highlights for three systems implementing Freescale processors. MORE>
Connect With Curtiss-Wright


Contact our sales team today to learn more about our products and services.




Our support team can help answer your questions - contact us today.