{"id":15563,"date":"2026-01-28T18:44:58","date_gmt":"2026-01-28T18:44:58","guid":{"rendered":"https:\/\/newestek.com\/?p=15563"},"modified":"2026-01-28T18:44:58","modified_gmt":"2026-01-28T18:44:58","slug":"palo-alto-unveils-quantum-safe-security-to-mitigate-cryptographic-risk","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15563","title":{"rendered":"Palo Alto unveils Quantum-Safe Security to mitigate cryptographic risk"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Palo Alto Networks unveiled its Quantum-Safe Security solution at the company\u2019s virtual Quantum-Safe Summit Tuesday. The solution is designed to help organizations prepare for the post-quantum era by addressing the transition from current cryptography to quantum-resistant algorithms without disrupting business.<\/p>\n<p>Among the platform\u2019s key features is its continuous, real-time cryptographic visibility. Quantum-Safe acts as a central intelligence layer, collecting telemetry and logs from network infrastructure \u2014 such as PAN-OS NGFW and Prisma Access \u2014 and enriching them with data from an ecosystem of third-party security tools, according to the company. The feature enables the discovery and cataloging of applications, systems, infrastructure, and IoT devices, and it facilitates analysis of cryptographic traffic behavior, including protocols, encryption algorithms, key exchange mechanisms, certificates, and libraries used.<\/p>\n<p>At the summit, Palo Alto CEO Nikesh Arora stressed that quantum computing is reaching a turning point similar to that of artificial intelligence. \u201cIt\u2019s no longer a laboratory project, and its ability to solve problems at high speed is approaching production environments,\u201d he said.<\/p>\n<p>According to Arora and other technology experts, the technology poses a critical security challenge. \u201cQuantum computers will be able to break cryptographic keys much faster than current systems, putting everything from private communications to digital assets like Bitcoin at risk,\u201d he explained.<\/p>\n<p>Due to the threat of \u201charvest now, decrypt later\u201d techniques, \u00a0in which encrypted data collected today could be decrypted more readily in the future with quantum computing, urgency to address post-quantum cryptography is rising.<\/p>\n<p>\u201cRegulators and companies are already demanding quantum transition plans to protect critical infrastructure and ensure operational continuity,\u201d Arora said.<\/p>\n<p>To that end, Palo Alto\u2019s Quantum-Safe Security solution offers advanced cryptographic risk assessment and prioritization, correlating encryption strength with business criticality and data lifecycle. This identifies immediate exposures (\u201charvest now, decrypt later\u201d risks) and high-value assets requiring priority migration, providing security teams with a clear, impact-based roadmap.<\/p>\n<p>Another key feature is its remediation approach, which guides the transition in several stages. The solution helps modernize infrastructures to achieve a \u201cquantum ready\u201d state, activate post-quantum or hybrid (quantum-safe) algorithms, and, in the case of legacy systems or devices that cannot be upgraded, apply virtual patching through encryption translation. This mechanism enables vulnerable traffic to be re-encrypted in real-time with secure quantum standards, without modifying existing applications or code.<\/p>\n<p>Quantum-Safe Security also incorporates a robust governance and ongoing compliance framework. It automates crypto hygiene management, maintains a dynamic cryptographic inventory (CBOM), and detects deviations or the use of weak ciphers in real-time. Furthermore, it facilitates regulatory compliance through automated reporting and audits aligned with global standards and regulations such as NIST, FIPS 140-3, and DORA.<\/p>\n<p>The solution is designed to integrate with existing security and operations systems, including SIEM, EDR, load balancers, and vulnerability management tools, enabling a scalable, gradual transition compatible with complex business environments.<\/p>\n<p>\u201cWaiting for the hardware to be available to act could leave critical systems years behind, with serious risks to security and operational continuity,\u201d Arora noted at the event. \u201cThe ability to break cryptography will force companies, governments, and regulators to anticipate, adapt, and protect critical data before this technology becomes fully operational. Those who act proactively will be able to mitigate risks and ensure business continuity in the new quantum era,\u201d he said.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Palo Alto Networks unveiled its Quantum-Safe Security solution at the company\u2019s virtual Quantum-Safe Summit Tuesday. The solution is designed to help organizations prepare for the post-quantum era by addressing the transition from current cryptography to quantum-resistant algorithms without disrupting business. Among the platform\u2019s key features is its continuous, real-time cryptographic visibility. Quantum-Safe acts as a central intelligence layer, collecting telemetry and logs from network infrastructure&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15563\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15563","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15563","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15563"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15563\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15563"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15563"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}