Share this
Trenton Systems partners with FUTURA Cyber for FIPS drive management
by Brett Daniel on Oct 26, 2020 3:38:08 PM
Graphic: Trenton Systems has partnered with leading cybersecurity solutions company FUTURA Cyber for FIPS 140-2 drive encryption key management.
Lawrenceville, Georgia, Monday, Oct. 26, 2020 – – Trenton Systems, Inc., a leading designer and manufacturer of ruggedized, cybersecure, made-in-USA computer systems for defense, aerospace, test and measurement, industrial automation, and other major industries, has partnered with cybersecurity solutions company FUTURA Cyber to provide customers with access control security management for FIPS 140-2 self-encrypting drives (SEDs). FUTURA Cyber’s Drive Security Manager (FC-DSM) manages the access control security operations of TCG-enabled storage drives.
FUTURA Cyber is a leading provider of intelligent, scalable solutions to complex cybersecurity problems. The company’s offerings include storage access control and key management solutions, cybersecurity advisory services, security orchestration and automation solutions, and incident response services. FUTURA is a Seagate Government Solutions partner and was recently awarded a U.S. Air Force Research Laboratory Phase I SBIR Contract.
“FUTURA Cyber is led by people with an unparalleled depth and experience in cybersecurity, software, and systems engineering,” said Sean Campbell, Vice President of Sales, Marketing, and Business Development at Trenton Systems. “Their storage access control and key management solutions are cornerstones to the entire security and information technology infrastructure of government organizations, and are a critical component to aligning Trenton’s secure embedded solutions offerings. These technologies will become an integral part of a holistic, strategic cybersecurity plan that Trenton customers can count on and trust.”
The partnership is Trenton’s third foray into system cybersecurity solutions in recent months. Earlier this year, the company announced its plan for cooperation with the Cybersecurity Maturity Model Certification (CMMC), which is now a requirement in many U.S. Department of Defense (DoD) contracts. In September, Trenton partnered with Star Lab, a Wind River company, to equip its mission-critical computing solutions with the company’s advanced cybersecurity software.
"FUTURA Cyber is focused on providing solutions for complex cyber security problems and teaming with cutting-edge solution partners like Trenton Systems," said Jim Geary, President of FUTURA Cyber. "Collaborating on Trenton’s secure embedded solutions is an exciting next step towards broadening our partner portfolio.”
Partnering with FUTURA allows Trenton to further strengthen its cybersecurity protections at the hardware level.
“We’re thrilled to have FUTURA on board and are looking forward to a fruitful and rewarding partnership,” said Kimberly Carter, Strategic Account Manager at Trenton Systems. “Our goal with this partnership is to make our rugged computers even more resilient to cyberattacks by helping customers manage their FIPS 140-2 self-encrypting hard disk drives and solid-state drives with access control and key management protection through FUTURA’s Drive Security Manager (DSM). In this way, we’re giving our mission-critical computing solutions an additional layer of data-at-rest protection by helping our customers ensure that their FIPS drives are properly managed, locked, and protected, always.”
Trenton Systems is keenly aware of the increasing need for FIPS 140-2-certified hard disk drives and solid-state drives within military programs and demanding mission-critical applications. Through trusted partnerships with top-notch cybersecurity companies like FUTURA Cyber, the company is working to incorporate FIPS 140-2-validated drives and related access control and key management solutions into its systems to help customers further enhance the protection of their controlled unclassified data-at-rest.
Trenton is currently testing several SEDs in its existing systems to assess hardware compatibility and optimize the drives for eventual FIPS 140-2 validation. The company will announce the availability of these drives at a later date. Furthermore, Trenton’s support team is aware of common FIPS drive authentication issues and will work with customers on setting up their specific drives once the company begins offering them.
For more information on this partnership and the work that Trenton and FUTURA are doing to protect your sensitive, mission-critical data, contact Trenton Systems or FUTURA Cyber today.
About Trenton Systems, Inc.
Trenton Systems designs, manufactures, assembles, integrates, tests, and supports made-in-USA rugged servers, workstations, processor boards, PCIe backplanes, storage systems, blade servers, PCIe expansion kits, mini PCs, and custom high-performance computers for programs and applications operating in harsh environments worldwide.
Founded in 1989, Trenton Systems provides the defense/military, government, industrial, and commercial markets with in-house engineering, testing and support services, computer life cycle planning, revision control, a five-year warranty, and customization/configuration support.
Trenton Systems' rugged computers and components meet or exceed UL, CE, FCC, ITAR, and military standards (MIL-STD-810, MIL-STD-461, MIL-S-901, DO-160), are backed by a five-year warranty and in-house support, and are manufactured in the company's Lawrenceville, Georgia, USA facility, which is certified to ISO 9001:2019 quality management standards.
About FUTURA Cyber
FUTURA Cyber provides intelligent, scalable cyber security solutions that reduce the cost of security and compliance management by helping organizations implement a cybersecurity strategy as initially envisioned, and more effectively realize the value of existing cyber investments. FUTURA Cyber focuses on the cybersecurity needs of government and private sector clients who require enterprise-class, innovative, tightly integrated solutions for data-at-rest protection, encryption and key management, and cybersecurity architecture, policy and analytics.
© 2020 Trenton Systems, Inc. All rights reserved. All marks are the property of their respective owners. Design and specifications are subject to change.
Share this
- High-performance computers (42)
- Military computers (38)
- Rugged computers (32)
- Cybersecurity (25)
- Industrial computers (25)
- Military servers (24)
- MIL-SPEC (20)
- Rugged servers (19)
- Press Release (17)
- Industrial servers (16)
- MIL-STD-810 (16)
- 5G Technology (14)
- Intel (13)
- Rack mount servers (12)
- processing (12)
- Computer hardware (11)
- Edge computing (11)
- Rugged workstations (11)
- Made in USA (10)
- Partnerships (9)
- Rugged computing (9)
- Sales, Marketing, and Business Development (9)
- Trenton Systems (9)
- networking (9)
- Peripheral Component Interconnect Express (PCIe) (7)
- Encryption (6)
- Federal Information Processing Standards (FIPS) (6)
- GPUs (6)
- IPU (6)
- Joint All-Domain Command and Control (JADC2) (6)
- Server motherboards (6)
- artificial intelligence (6)
- Computer stress tests (5)
- Cross domain solutions (5)
- Mission-critical servers (5)
- Rugged mini PCs (5)
- AI (4)
- BIOS (4)
- CPU (4)
- Defense (4)
- Military primes (4)
- Mission-critical systems (4)
- Platform Firmware Resilience (PFR) (4)
- Rugged blade servers (4)
- containerization (4)
- data protection (4)
- virtualization (4)
- Counterfeit electronic parts (3)
- DO-160 (3)
- Edge servers (3)
- Firmware (3)
- HPC (3)
- Just a Bunch of Disks (JBOD) (3)
- Leadership (3)
- Navy (3)
- O-RAN (3)
- RAID (3)
- RAM (3)
- Revision control (3)
- Ruggedization (3)
- SATCOM (3)
- Storage servers (3)
- Supply chain (3)
- Tactical Advanced Computer (TAC) (3)
- Wide-temp computers (3)
- computers made in the USA (3)
- data transfer (3)
- deep learning (3)
- embedded computers (3)
- embedded systems (3)
- firmware security (3)
- machine learning (3)
- Automatic test equipment (ATE) (2)
- C6ISR (2)
- COTS (2)
- COVID-19 (2)
- Compliance (2)
- Compute Express Link (CXL) (2)
- Computer networking (2)
- Controlled Unclassified Information (CUI) (2)
- DDR (2)
- DDR4 (2)
- DPU (2)
- Dual CPU motherboards (2)
- EW (2)
- I/O (2)
- Military standards (2)
- NVIDIA (2)
- NVMe SSDs (2)
- PCIe (2)
- PCIe 4.0 (2)
- PCIe 5.0 (2)
- RAN (2)
- SIGINT (2)
- SWaP-C (2)
- Software Guard Extensions (SGX) (2)
- Submarines (2)
- Supply chain security (2)
- TAA compliance (2)
- airborne (2)
- as9100d (2)
- chassis (2)
- data diode (2)
- end-to-end solution (2)
- hardware security (2)
- hardware virtualization (2)
- integrated combat system (2)
- manufacturing reps (2)
- memory (2)
- mission computers (2)
- private 5G (2)
- protection (2)
- secure by design (2)
- small form factor (2)
- software security (2)
- vRAN (2)
- zero trust (2)
- zero trust architecture (2)
- 3U BAM Server (1)
- 4G (1)
- 4U (1)
- 5G Frequencies (1)
- 5G Frequency Bands (1)
- AI/ML/DL (1)
- Access CDS (1)
- Aegis Combat System (1)
- Armed Forces (1)
- Asymmetric encryption (1)
- C-RAN (1)
- COMINT (1)
- CPUs (1)
- Cloud-based CDS (1)
- Coast Guard (1)
- Compliance testing (1)
- Computer life cycle (1)
- Containers (1)
- D-RAN (1)
- DART (1)
- DDR5 (1)
- DMEA (1)
- Data Plane Development Kit (DPDK) (1)
- Defense Advanced Research Projects (DARP) (1)
- ELINT (1)
- EMI (1)
- EO/IR (1)
- Electromagnetic Interference (1)
- Electronic Warfare (EW) (1)
- FIPS 140-2 (1)
- FIPS 140-3 (1)
- Field Programmable Gate Array (FPGA) (1)
- Ground Control Stations (GCS) (1)
- Hardware-based CDS (1)
- Hybrid CDS (1)
- IES.5G (1)
- ION Mini PC (1)
- IP Ratings (1)
- IPMI (1)
- Industrial Internet of Things (IIoT) (1)
- Industry news (1)
- Integrated Base Defense (IBD) (1)
- LAN ports (1)
- LTE (1)
- Life cycle management (1)
- Lockheed Martin (1)
- MIL-S-901 (1)
- MIL-STD-167-1 (1)
- MIL-STD-461 (1)
- MIL-STD-464 (1)
- MOSA (1)
- Multi-Access Edge Computing (1)
- NASA (1)
- NIC (1)
- NIC Card (1)
- NVMe (1)
- O-RAN compliant (1)
- Oil and Gas (1)
- OpenRAN (1)
- P4 (1)
- PCIe card (1)
- PCIe lane (1)
- PCIe slot (1)
- Precision timestamping (1)
- Product life cycle (1)
- ROM (1)
- Raytheon (1)
- Remotely piloted aircraft (RPA) (1)
- Rugged computing glossary (1)
- SEDs (1)
- SIM Card (1)
- Secure boot (1)
- Sensor Open Systems Architecture (SOSA) (1)
- Small form-factor pluggable (SFP) (1)
- Smart Edge (1)
- Smart NIC (1)
- SmartNIC (1)
- Software-based CDS (1)
- Symmetric encryption (1)
- System hardening (1)
- System hardening best practices (1)
- TME (1)
- Tech Partners (1)
- Total Memory Encryption (TME) (1)
- Transfer CDS (1)
- USB ports (1)
- VMEbus International Trade Association (VITA) (1)
- Vertical Lift Consortium (VLC) (1)
- Virtual machines (1)
- What are embedded systems? (1)
- Wired access backhaul (1)
- Wireless access backhaul (1)
- accredidation (1)
- aerospace (1)
- air gaps (1)
- airborne computers (1)
- asteroid (1)
- authentication (1)
- autonomous (1)
- certification (1)
- cognitive software-defined radios (CDRS) (1)
- command and control (C2) (1)
- communications (1)
- cores (1)
- custom (1)
- customer service (1)
- customer support (1)
- data linking (1)
- data recording (1)
- ethernet (1)
- full disk encryption (1)
- hardware monitoring (1)
- heat sink (1)
- hypervisor (1)
- in-house technical support (1)
- input (1)
- integrated edge solution (1)
- international business (1)
- licensed spectrum (1)
- liquid cooling (1)
- mCOTS (1)
- microelectronics (1)
- missile defense (1)
- mixed criticality (1)
- moving (1)
- multi-factor authentication (1)
- network slicing (1)
- neural networks (1)
- new headquarters (1)
- next generation interceptor (1)
- non-volatile memory (1)
- operating system (1)
- output (1)
- outsourced technical support (1)
- post-boot (1)
- pre-boot (1)
- private networks (1)
- public networks (1)
- radio access network (RAN) (1)
- reconnaissance (1)
- secure flash (1)
- security (1)
- self-encrypting drives (SEDs) (1)
- sff (1)
- software (1)
- software-defined radios (SDRs) (1)
- speeds and feeds (1)
- standalone (1)
- storage (1)
- systems (1)
- tactical wide area networks (1)
- technical support (1)
- technology (1)
- third-party motherboards (1)
- troposcatter communication (1)
- unlicensed spectrum (1)
- volatile memory (1)
- vpx (1)
- zero trust network (1)
- August 2024 (1)
- July 2024 (1)
- May 2024 (1)
- April 2024 (3)
- February 2024 (1)
- November 2023 (1)
- October 2023 (1)
- July 2023 (1)
- June 2023 (3)
- May 2023 (7)
- April 2023 (5)
- March 2023 (7)
- December 2022 (2)
- November 2022 (6)
- October 2022 (7)
- September 2022 (8)
- August 2022 (3)
- July 2022 (4)
- June 2022 (13)
- May 2022 (10)
- April 2022 (4)
- March 2022 (11)
- February 2022 (4)
- January 2022 (4)
- December 2021 (1)
- November 2021 (4)
- September 2021 (2)
- August 2021 (1)
- July 2021 (2)
- June 2021 (3)
- May 2021 (4)
- April 2021 (3)
- March 2021 (3)
- February 2021 (9)
- January 2021 (4)
- December 2020 (5)
- November 2020 (5)
- October 2020 (4)
- September 2020 (4)
- August 2020 (6)
- July 2020 (9)
- June 2020 (11)
- May 2020 (13)
- April 2020 (8)
- February 2020 (1)
- January 2020 (1)
- October 2019 (1)
- August 2019 (2)
- July 2019 (2)
- March 2019 (1)
- January 2019 (2)
- December 2018 (1)
- November 2018 (2)
- October 2018 (5)
- September 2018 (3)
- July 2018 (1)
- April 2018 (2)
- March 2018 (1)
- February 2018 (9)
- January 2018 (27)
- December 2017 (1)
- November 2017 (2)
- October 2017 (3)
No Comments Yet
Let us know what you think