QuSecure claims new solution is the industry’s first end-to-end quantum software-based platform that protects encrypted communications and data using a quantum-secure channel. Credit: MF3D / Getty Images Post-quantum cryptography company QuSecure has announced its debut with the launch of a new post-quantum cybersecurity solution, QuProtect. The firm claimed that QuProtect is the industry’s first end-to-end quantum software-based platform designed to protect encrypted communications and data using a quantum secure channel.The solution addresses present classical attacks and future quantum computing threats for commercial enterprises and government agencies, QuSecure added. The release comes as increasing numbers of solutions providers are coming to market with quantum-resilient offerings built to withstand quantum computing security risks that threaten traditional public key cryptography.QuProtect incorporates zero trust, next-gen encryption, active monitoring, attack remediationIn a press release, QuSecure said QuProtect is designed around the entire data lifecycle to work anytime, anywhere and on any device with a focus on adoption, easy upgrade, and modern cyber-protection practices. Key to QuProtect’s post-quantum protections and quantum-resilient cryptographic keys is Quantum Random Number Generation (QRNG), which provides entropy throughout the entire network, the firm added. “QuSecure’s mission is to provide enterprises and government organizations with a comprehensive cryptographic orchestration platform that addresses today’s conventional and future quantum threats,” commented QuSecure CEO Dave Krauthamer. “Our platform secures networks from current vulnerabilities using zero trust, next-generation encryption, active monitoring, and attack remediation – all cloud-delivered in software to existing devices, over existing infrastructure.” Krauthamer added that feedback from QuSecure’s early customers indicates that a SaaS, end-to-end post-quantum cryptography approach is key for a practical post-quantum cybersecurity solution.“Quantum technologies have the potential to represent a platform shift, and platform shifts don’t come around that often,” said Laura Thomas, former CIA chief of base and vice president of corporate strategy at ColdQuanta. “When they do, they bring enormous opportunity coupled with the power for intense disruption, in all arenas, to include national security and economic security.” National security, public safety, and privacy have already collided in the past several years, added retired United States Navy rear admiral and former senior cybersecurity specialist at the Departments of Defense and Homeland Security, Mike Brown, and quantum is likely to intensity matters moving forward. “Quantum security, with quantum computing and encryption, are foundational to public and private sector efforts to counter nation states, rogue actors, criminals, and others.”Growing quantum-resilient market reflects future of cybersecurity QuSecure’s debut launch reflects a growing quantum-resilient cybersecurity market in which technology, solutions, and software providers old and new are coming to trade with quantum-enhanced offerings as new standards surrounding quantum-safe encryption algorithms emerge. Toshiba, PureVPN and BT are just a few organizations that have recently announced new investment in the quantum-resilient security space whilst the National Institute of Standards and Technology (NIST) works toward introducing standards for quantum-resistant public key cryptographic algorithms.“Gartner is projecting that most of the current asymmetric cryptography will be unsafe to use for securing data by the end of this decade, due to the advancement of quantum computing,” Mark Hovarth, senior director analyst at Gartner, tells CSO. “Securing against a quantum computing attack will become the new normal and is going to be required in just about every product on an ongoing basis.”Quantum-safe algorithms will be hitting the market for the foreseeable future in a trend that favors modular crypto that can be swapped out relatively invisibly to the end users (and maybe developers), Hovarth adds. “We call this modularity ‘crypto-agility,’ meaning that as new algorithms get adopted, we follow an agile way of updating or changing them. This is probably going to be the standard procedure.”Beware marketing hype of quantum-secure offeringsWith the quantum-resilient trend snowballing, Forrester Vice President, Research Director Merritt Maxim warns organizations to be wary of marketing hype surrounding new products and solutions. “The encryption market has always been an area where there has been some level over-hyped marketing,” he tells CSO. “This may be more marketing speak than actual, serious technological innovation.”Wider discussion and awareness of quantum security is a good way of getting organizations to think about their long-term plans in the area, but it may be a challenge for them to effectively distinguish genuine technological innovation from sales “snake oil”, Maxim adds. “Validating the efficacy of claims is going to be challenging, and businesses will probably be subjected to a lot of mathematics to prove quantum resistance.” Related content news Singing River ransomware attack now thought to have affected over 895,000 The health care provider has dramatically increased its estimate of the number of patients affected by the August 2023 attack. By Shweta Sharma May 15, 2024 4 mins Data Breach Ransomware brandpost Sponsored by Sans Institute Clock is ticking for companies to prepare for EU NIS2 Directive Many companies are still not ready for the impact of NIS2, but SANS can help them prepare. By Laura McEwan May 15, 2024 3 mins Security feature Backlogs at National Vulnerability Database prompt action from NIST and CISA A crisis at the key US service for ranking vulnerabilities has been fueled by short resources and an explosion of security flaws as the volume of software production increases. By John Mello Jr. May 15, 2024 10 mins Threat and Vulnerability Management Security Practices Vulnerabilities news FBI warns Black Basta ransomware impacted over 500 organizations worldwide CISA advisory includes indicators of compromise and TTPs that can be used for threat hunting. By Lucian Constantin May 14, 2024 6 mins Ransomware Phishing Healthcare Industry PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe