
Monthly Newsletter
June 2025
Fortanix Launches PQC Central to Help Organizations Prepare for the Quantum Threat.
Fortanix has rolled out PQC Central, a new feature in its Key Insight tool, to help businesses understand and fix their exposure to future quantum-based attacks. As quantum computers move closer to reality, today’s encryption won’t be enough to keep data safe. PQC Central shows where your current systems are at risk, scores your readiness, and builds a clear plan to upgrade to safer algorithms. .
Part of the Fortanix Armor platform, PQC Central works across all environments cloud or on-premises without needing to replace existing key management tools or hardware. It supports recommended algorithms like Kyber, Dilithium, LMS, and XMSS, and helps teams stay aligned with timelines such as the EU’s 2026 post-quantum target.
As governments and regulators push for post-quantum cryptography (PQC) readiness by 2026, the time to act is now. Join Fortanix and cybersecurity leaders from Citi and PenFed Credit Union for an exclusive discussion on how large enterprises are assessing their cryptographic risk and building realistic PQC roadmaps.
Highlights:
- How to discover and assess quantum-vulnerable encryption in your environment
- Lessons from real-world PQC readiness projects at scale
- Practical steps to start your transition without overhauling your infrastructure
- Insights on cryptographic policy, IT coordination, and regulatory timelines
Featured Speakers:
- Sudha E Iyer, Chief Cybersecurity Architect, Citi
- David Chapman, Director of Identity Access Management, PenFed Credit Union
- Dr. Richard Searle, Chief AI Officer, Fortanix
- Craig Matsumoto, Contributing Analyst, Futuriom
Date: July 15
Time: 9 AM PT | 12 PM ET
The Ultimate Guide for Post-Quantum Readiness
This eBook breaks down what post-quantum cryptography means for your business, why acting now matters, and how to begin the shift with a structured, four-step plan. It also covers how tools like Fortanix Key Insight help make this transition more manageable.
Post-Quantum Readiness: A Strategic Journey, Not a Simple Switch
Quantum computing is no longer theoretical; traditional encryption won’t hold up for long. This webinar goes beyond the buzz to focus on how to transition to post-quantum cryptography. From building cryptographic inventories to managing hybrid environments and aligning leadership, we’ll outline the practical steps every organization must take.
Next Generation HSM: Modernize Security, Eliminate Complexity & PQC-Proof Encryption
Legacy HSMs weren’t built for Zero Trust, scalable architectures, or post-quantum threats. They’re clunky, manual, and, in many cases, not even US-built. This webinar explains why federal agencies are shifting to modern HSM alternatives and how Fortanix DSM, powered by Confidential Computing, delivers the security, automation, and crypto agility needed for what’s next.
Join Pat Conte, VP & GM of Americas, Fortanix, and Rodney Alto, Consultant, Google (former U.S. Intelligence Officer) for a candid conversation on replacing legacy systems with purpose-built solutions for today’s demands.
How do we take GenAI to production without breaking trust, privacy, or security?
That’s the central question in this power-packed panel hosted by theCUBE, featuring Fortanix CPO, Anuj Jaiswal and
Nicolas Dupont – CEO, Cyborg
Eiman Ebrahimi – CEO & Co-founder, Protopia AI
With the host & co-founder of SiliconANGLE Media, John Furrier, SiliconANGLE & theCUBE
Thank you Brian J. Baumann, Founder, NYSE Wired, for orchestrating this panel.
Anuj shares how Fortanix built an end-to-end secure AI platform, from data ingestion to inference, and why it’s becoming the missing bridge between GenAI experiments and real-world deployment.
A Peek Inside Post-Quantum Keys
Why Quantum-Resistant Cryptography Matters Now
Role of Cloud HSM in Strengthening Enterprise Data Security
Top Cloud Security Tools You Need to Protect Your Data
Prevent Your Business from Next Data Security Breach
A Guide to Cloud Key Management Best Practices
AI Governance as the Cornerstone of Trust in the Age of Generative AI
How Data Tokenization Protects Sensitive Information