Built for the Quantum Threat.

We help enterprise and government networks meet post-quantum encryption mandates by providing a Cryptographic Inventory to let them know exactly where they are at risk!

The Quantum Threat

What is the Quantum Threat?

Experts believe that within the next 5-10 years, a quantum computer powerful enough to break TLS encryption will be developed.

Many governments are already creating mandates

What are these mandates?   How can you be sure you comply?  What is the first step?

The IETF, NIST and other standards bodies have been creating post-quantum cipher suites and modifications to the TLS protocol.  But enterprises need to act also.

What is the first step?

The first step is to find out exactly where you are at risk.

What does that mean?

Cryptography is embedded everywhere.   Some feel that the vendors will “just take care of it”.  Vendors *may* support post-quantum cipher suites but you  almost certainly will need to do configuration changes to take advantage of them.  That’s where the problem starts!

To start to address the quantum threat, you first need to find out where you are.  That means answering four questions

Who
Who is using these non post-quantum cipher suites?
What
What product, version and vendor are involved?
When
When did these vulnerable connections happen?
Where
Where are these clients and servers on your network?

Use our Cryptographic Inventory Product!

Our Cryptographic Inventory product will tell you the who, what, when and where!  (You have to figure out the why!)  Our product will create an itemized list of what you need to upgrade.

Other actions might also be needed.  Even if you have the necessary upgrades to the software, your configuration might be such that you aren’t taking advantage of them.   We will help you to take the important first step!

Just imagine what bad actors will do when they can break cryptography!   See above a video of some of the large breaches and hacks which were done even without a quantum computer!   Bad actors will have their power magnified exponentially with a quantum computer!