{"id":15919,"date":"2026-03-09T06:11:20","date_gmt":"2026-03-09T06:11:20","guid":{"rendered":"https:\/\/newestek.com\/?p=15919"},"modified":"2026-03-09T06:11:20","modified_gmt":"2026-03-09T06:11:20","slug":"pqc-roadmap-remains-hazy-as-vendors-race-for-early-advantage","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15919","title":{"rendered":"PQC roadmap remains hazy as vendors race for early advantage"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Post-quantum cryptography (PQC) has long sat on the periphery of enterprise security, with experts calling it inevitable but not urgent. That posture is beginning to shift.<\/p>\n<p>Earlier this year, Palo Alto Networks <a href=\"https:\/\/www.csoonline.com\/article\/4123719\/palo-alto-warns-of-quantum-risk-to-digital-security.html\" target=\"_blank\">published<\/a> a blog announcing a new \u201cquantum-safe security\u201d initiative, framing it as a way for enterprises to assess where quantum-vulnerable cryptography exists across their environments and begin planning a transition. While the <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2026\/01\/introducing-quantum-safe-security\" target=\"_blank\" rel=\"noreferrer noopener\">announcement<\/a> was light on technical specifics, it added to a growing security sentiment. Post-quantum threats are real.<\/p>\n<p>\u201cIDC\u2019s view is that post-quantum risk is no longer a distant, theoretical issue; it is becoming a present-day governance and operational risk, especially for regulated and data-intensive industries,\u201d said Sakshi Grover, senior research manager, security services, IDC Asia Pacific. While practical quantum attacks remain years away, security vendors are beginning to pull PQC out of the confines of a \u201cfuture theory\u201d and into present-day risk management.<\/p>\n<p>Rather than pushing sweeping architectural changes from the start, they are positioning discovery, inventory, readiness assessments, and crypto-agility capabilities as the first steps to get enterprises up to speed with quantum.<\/p>\n<p>But even that groundwork is far from straightforward.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>Can\u2019t change what you can\u2019t see<\/h2>\n<p>At the heart of most PQC readiness offerings is a basic but difficult problem. Many organizations do not know where or how cryptography is used across their infrastructure. Encryption is embedded everywhere, from certificates and VPNs to APIs, firmware, identity systems, and third-party software. That sprawl makes it difficult to evaluate exposure to algorithms like RSA and elliptic curve cryptography, which are expected to be broken by sufficiently capable quantum computers.<\/p>\n<p>Palo Alto\u2019s messaging centers on this visibility gap. According to the company, its approach is to help organizations identify cryptographic usage that may not be quantum-safe and provide guidance on remediation paths. It isn\u2019t alone in trying to do this.<\/p>\n<p>Cisco frames the visibility problem in similarly operational terms, emphasising that readiness spans multiple phases rather than a one-time audit. \u201cCisco CX\u2019s Quantum-Safe Services delivers end-to-end support across discovery, monitoring, and migration\u2013plus strategic advisory and ongoing optimization to keep pace with evolving standards,\u201d said <a href=\"https:\/\/blogs.cisco.com\/author\/chrchish\" target=\"_blank\" rel=\"noreferrer noopener\">Christian Chisolm<\/a>, senior director of strategy &amp; planning, Security &amp; Trust Organization, Cisco.<\/p>\n<p>Companies like IBM have also been building cryptographic inventory solutions to catalog every encryption component. IBM\u2019s Quantum Safe Explorer (<a href=\"https:\/\/www.ibm.com\/docs\/en\/quantum-safe\/quantum-safe-explorer\/2.x?topic=quantum-safe-explorer-overview\" target=\"_blank\" rel=\"noreferrer noopener\">QSE<\/a>) performs static analysis of software to locate cryptographic assets, including libraries and dependencies, and pairs that with runtime monitoring through its Quantum Safe Advisor to build a comprehensive \u201cCryptography Bill of Materials.\u201d<\/p>\n<p>Some providers are focusing specifically on infrastructure-layer visibility. Cisco says its discovery currently concentrates on network cryptography exposure. \u201cWe currently detect: Digital certificates across management, control, and data places; Cryptographic protocols and algorithms (TLS\/SSL, SSH, IPsec, etc); Key exchange mechanisms on Cisco network devices; Trust anchors and hardware security elements within platform architectures,\u201d Chisolm said.<\/p>\n<p>Cloudflare, by contrast, emphasizes visibility at the connection layer rather than deep asset discovery. \u201cCloudflare provides visibility into which client devices and endpoints can successfully establish TLS 1.3 connections,\u201d Volker Rath, field CISO at Cloudflare, said.<\/p>\n<p>Certificate management vendors are also repositioning core functions for PQC readiness. DigiCert, for example, uses its <a href=\"https:\/\/www.digicert.com\/trust-lifecycle-manager\" target=\"_blank\" rel=\"noreferrer noopener\">Trust Lifecycle Manager<\/a> and related tools to help enterprises identify, inventory, and begin replacing vulnerable certificates with quantum-safe alternatives.<\/p>\n<h2 class=\"wp-block-heading\" id=\"some-are-already-ahead-as-the-migration-question-looms\">Some are already ahead as the migration question looms<\/h2>\n<p>One of the earliest vendors to operationalize cryptographic discovery specifically for PQC readiness was Sandbox AQ, which emerged from Google\u2019s quantum research efforts. As early as 2022, the company argued that enterprises needed to inventory cryptography assets long before post-quantum algorithms could be deployed at scale.<\/p>\n<p>Initially offered as a consulting-driven assessment, that capability eventually evolved into a product, AQtive Guard, designed to continuously monitor cryptographic usage and flag quantum-vulnerable dependencies.<\/p>\n<p>In 2024, the platform\u2019s <a href=\"https:\/\/www.sandboxaq.com\/press\/softbank-corp-uses-sandboxaqs-aqtive-guard-to-identify-undetected-security-vulnerabilities-in-existing-it-infrastructure\" target=\"_blank\" rel=\"noreferrer noopener\">deployment<\/a> by SoftBank Corporation gave the company\u2019s claims a public validation, uncovering unnoticed vulnerable encryption and certificate issues across a large enterprise network. Beyond SoftBank, SandboxAQ has managed to secure high-profile engagements, including a <a href=\"https:\/\/aqtiveguard.com\/blog\/sandboxaq-and-dow-cio-partner-to-strengthen-us-defenses-against-quantum-and-ai-driven-cyber-threats\" target=\"_blank\" rel=\"noreferrer noopener\">partnership<\/a> to deploy AQtive Guard across multiple US Department of War entities to accelerate cryptographic visibility and PQC modernization.<\/p>\n<p>A handful of other vendors, too, have moved beyond experimental efforts to deliver more mature offerings. QuSecure offers the <a href=\"https:\/\/www.qusecure.com\/qusecure-launches-quprotect-r3\/\" target=\"_blank\" rel=\"noreferrer noopener\">QuProtect <\/a>platform, combining crypto-agility with discovery so enterprises can embed quantum-resilient cryptography into existing infrastructure without rewriting application code. <\/p>\n<p>Some niche players are offering full-stack products that embed PQC across services. Companies like <a href=\"https:\/\/www.post-quantum.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Post-Quantum<\/a> (UK-based) provide modular software for identity, VPNs, and encrypted messaging that is quantum-safe today, stressing crypto-agility and backward compatibility as part of readiness.<\/p>\n<p>\u201cThe approach to mass migration away from where we\u2019ve grown comfortable into new methods of encryption is no easy task,\u201d said <a href=\"https:\/\/url.usb.m.mimecastprotect.com\/s\/-lXyCWWE8EhZ8gzLI6f6IodZn8?domain=gartner.com\" target=\"_blank\" rel=\"noreferrer noopener\">Bart Willemsen<\/a>, VP analyst at Gartner. \u201cThe road towards continuous inventory, prioritization for replacement, and the ability to maintain connectivity in operations is a long one. What\u2019s more, we need to become and remain crypto-agile (we\u2019re likely going to have to do the same again, later, as has always been the case historically) and that repeatability demands consistency.\u201d<\/p>\n<p>Cisco argues that migration planning must account for legacy constraints, not just modern systems. \u201cLegacy systems present unique challenges \u2014 limited processing power, fixed firmware, and operational lifecycles spanning over 10 to 20 years. When direct upgrades aren\u2019t feasible, we deploy cryptographic abstraction layers: quantum-safe proxies or gateways that mediate communications on behalf of legacy devices, essentially wrapping vulnerable protocols in PQC-secured tunnels,\u201d Chisolm said.<\/p>\n<p>Cloudflare takes a different approach, positioning its network as a compensating control. \u201cThis means customers do not necessarily need to upgrade legacy systems or proprietary software to achieve PQC readiness, as the connection is secured at the edge, removing the opportunity for interception along the way,\u201d Rath said.<\/p>\n<h2 class=\"wp-block-heading\" id=\"harvest-now-decrypt-later-adds-pressure\">\u201cHarvest now, decrypt later\u201d adds pressure<\/h2>\n<p>Part of the renewed urgency comes from the <a href=\"https:\/\/www.paloaltonetworks.in\/cyberpedia\/harvest-now-decrypt-later-hndl\" target=\"_blank\" rel=\"noreferrer noopener\">\u201charvest now, decrypt later\u201d<\/a> threat model, in which adversaries collect encrypted data today with the expectation that it can be decrypted once quantum capabilities mature.<\/p>\n<p>This scenario has shifted PQC from a hypothetical future problem to an immediate data protection concern, particularly for industries handling sensitive data with long confidentiality lifetimes, including telecommunications, finance, healthcare, and government.<\/p>\n<p>\u201cWe do hear of HNDL attacks, where conventionally encrypted content is no longer discarded but retained by criminals, who are seeing the (quantum) developments as an opportunity for their nefarious activities within 2-3 years,\u201d Gartner\u2019s Willemsen said. \u201cWhen criminals see opportunity around the corner, the quantum-based decryption risks are no longer theoretical; they are real.\u201d<\/p>\n<p>Vendors increasingly argue that action cannot wait for fully capable quantum computers. Cisco warns that organizations holding long-lived sensitive data should already be moving beyond assessments. \u201cAssessment is urgent, but active replacement is now imperative,\u201d Chisolm said.<\/p>\n<p>Cloudflare echoes the timeline concern while pointing to official guidance. \u201cThe National Institute of Standards and Technology (NIST) recommends organizations achieve full post-quantum readiness by 2030,\u201d Rath noted. \u201cGiven the complexity of updating infrastructure at scale, we recommend that enterprises begin planning the replacement process now to reduce stress, costs, and friction.\u201d<\/p>\n<p>NIST also <a href=\"https:\/\/www.csoonline.com\/article\/4122752\/cisa-releases-technology-readiness-list-for-post-quantum-cryptography.html\">finalized<\/a> multiple post-quantum cryptographic algorithms, giving vendors and enterprises targets for migration and reducing uncertainty. As organizations prepare for hybrid PQC deployments, combining classical and quantum-resistant algorithms, vendors are racing to ensure their offerings support evolving standards.<\/p>\n<p>\u201cWe have been monitoring the developments in quantum space for over a decade, and our strategic planning assumptions regarding the expected moment of compromise have consistently pointed towards around 2029,\u201d Willemsen pointed out. \u201cGiven the amount of work to be done for a successful migration and \u2018continuous in-control\u2019 situation, that should be read as  \u2018tomorrow.\u2019\u201d<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>Readiness vs reality<\/h2>\n<p>Not everyone is convinced that today\u2019s PQC readiness offerings represent a fundamentally new category of security tooling.<\/p>\n<p>Much of what vendors are promoting: crypto inventories, certificate tracking, dependency mapping, overlaps with practices that security teams arguably should already have in place. In that sense, PQC may just be acting as a forcing hand for organizations to address longstanding blind spots rather than introducing entirely new technical requirements.<\/p>\n<p>Some vendors counter that the difference lies in depth and integration rather than concept. Cisco positions its approach as foundational rather than additive. \u201cTraditional encryption tools inventory certificates and track key lifecycles. Cisco delivers infrastructure-level quantum readiness, embedding NIST PQC algorithms into core protocols and hardware roots of trust.\u201d<\/p>\n<p>While NIST standards are now available, many commercial products and protocols have yet to fully integrate post-quantum algorithms. Even where support exists, performance trade-offs and interoperability challenges remain. IDC\u2019s Grover recommends a <a href=\"https:\/\/www.csoonline.com\/article\/4030898\/prepping-for-the-quantum-threat-requires-a-phased-approach-to-crypto-agility.html\">phased<\/a> transition. \u201cInstead of aiming for full-scale deployment, buyers should prioritize critical systems first, align with NIST timelines, and integrate PQC into broader GRC programs,\u201d she said.<\/p>\n<p>For vendors, the race is now about positioning. Being seen as a trusted guide through the PQC transition, rather than merely an algorithm provider, offers an opportunity to embed deeply into long-term enterprise roadmaps.<\/p>\n<p>Palo Alto Networks\u2019 entry into PQC readiness reflects a broader shift in how the market is approaching the issue. What was once largely the domain of specialized quantum security firms is now being taken up by mainstream security and infrastructure vendors as part of their core platform strategies. Network providers like Cisco are introducing quantum-safe protections for existing protocols, while HSM vendors like Futurex are adding post-quantum algorithm support to established key management systems used in regulated environments.<\/p>\n<p>Cloudflare, similarly, frames readiness as an architectural shift rather than a discrete tool deployment. \u201cWith Cloudflare, customers simply need to place their origin server behind the Cloudflare network, and Cloudflare manages the encryption and key management,\u201d Rath said. <\/p>\n<p>As more vendors formalize their offerings and additional customer deployments are disclosed, the edges of the PQC readiness market are likely to become clearer. What remains uncertain is whether enterprises will prioritize these efforts in the near term or treat them as part of the longer-term cryptographic modernization.<\/p>\n<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Post-quantum cryptography (PQC) has long sat on the periphery of enterprise security, with experts calling it inevitable but not urgent. That posture is beginning to shift. Earlier this year, Palo Alto Networks published a blog announcing a new \u201cquantum-safe security\u201d initiative, framing it as a way for enterprises to assess where quantum-vulnerable cryptography exists across their environments and begin planning a transition. While the announcement&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15919\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15919","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15919","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15919"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15919\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15919"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15919"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}