Overview
Data, the lifeblood of every organization, has never been more vulnerable. Quantum computing is rapidly advancing, accelerating the need for organizations to adopt post-quantum cryptography (PQC). Core cryptographic algorithms like RSA, ECC, and DSA—used in TLS, VPNs, and SaaS authentication—are increasingly vulnerable to quantum attacks, with adversaries already harvesting encrypted data to decrypt in the future. For sensitive data that must remain secure for years to come, the time to act is now.
Quantum-resistant encryption algorithms are available today, and NIST recently released new standards for key exchange, digital signatures, and plaintext encryption to strengthen data security in the post-quantum era. While many enterprises recognize the urgency and some industries are moving under regulatory pressure, migrating to PQC is a complex, multi-year effort—not a simple algorithm upgrade. A major barrier is lack of visibility: most organizations don’t have a clear inventory of where cryptography is used, making it difficult to assess risk or plan a transition. Legacy systems may rely on outdated or undocumented crypto, integrations can break with changes, and older HSMs may not support modern algorithms. Building a roadmap to quantum resilience requires a strategic approach—starting with discovery, risk prioritization, and infrastructure readiness.
Fortanix Solution
The Fortanix unified data security platform transforms PQC complexity into actionable insights, strategic priorities, and streamlined operations. PQC Central, a major feature of the Fortanix platform, reframes how enterprises approach the post-quantum cryptography challenge. With visibility into cryptographic assets, guided roadmap, and disruption-free migration, you now can accelerate readiness, reduce risk and cost, and confidently
Key Features
DISCOVER
Begin by identifying quantum-vulnerable assets across your enterprise-wide systems.
- Map your entire cryptographic security posture.
- Inventory all encryption keys and data services across multi-cloud, multi-geography and on-premises environments.
- Get full visibility into key locations, statuses, and usage across critical data services.
PQC ASSESSMENT
Understand vulnerabilities through an intuitive dashboard and heat maps to prioritize high-risk assets.
- Quickly find gaps in data services lacking proper encryption or protection.
- Identify quick wins and longer-term projects for strategy phased transition.
- Benchmark your cryptographic security posture against emerging post-quantum computing threats.

PQC TRANSITION
Migrate to post-quantum cryptographic algorithms without disruption.
- Centrally manage all encryption keys and policies
- Enforce compliance and governance with the latest security standards, algorithms and policies.
- Test your readiness before deployment to prevent costly outages.
- Automate manual processes to eliminate human error, reduce inconsistencies, and enhance overall data security.
CRYPTO-AGILITY
Ongoing flexibility and readiness to adopt future cryptographic advancements.
- Consciously evaluate your PQC posture as you add new services and systems to migrate without disruption.
- Quickly adapt to a new cryptographic system without updating key management systems or HSM deployments.
Supported Post-Quantum Algorithms
Algorithm | Function | Specification | Parameters |
---|---|---|---|
Advanced Encryption Standard (AES) | Symmetric block cipher for information protection | FIPS PUB 197 | Use 256-bit keys for all classification levels. |
CRYSTALS-Kyber (ML-KEM) | Asymmetric algorithm for key establishment | FIPS PUB 203 | Use Level V parameters for all classification levels. |
CRYSTALS-Dilithium (ML-DSA) | Asymmetric algorithm for digital signatures | FIPS PUB 204 | Use Level V parameters for all classification levels. |
Secure Hash Algorithm (SHA) | Secure Hash Algorithm (SHA) | FIPS PUB 180-4 | Use SHA-384 or SHA512 for all classification levels. |
Leighton-Micali Signature (LMS) | Asymmetric algorithm for digitally signing firmware and software | NIST SP 800-208 | All parameters approved for all classification levels. SHA-256/192 recommended. |
eXtended Merkle Signature Scheme (XMSS) | Asymmetric algorithm for digitally signing firmware and software | NIST SP 800-208 | All parameters approved for all classification levels. |