Newsletters




End-to-End Quantum-Safe Technology Revealed by IBM to Safeguard Governments' and Businesses' Most-Valuable Data


IBM is introducing new IBM Quantum Safe technology, providing a comprehensive set of tools and capabilities, combined with IBM's deep security expertise, designed as an end-to-end solution.

As quantum computers continue to advance, they will reach the ability to break the most widely used security protocols in the world. Recognizing this risk, IBM has leveraged its extensive expertise across cryptography, quantum computing, and critical infrastructure to develop IBM Quantum Safe technology, according to the company.

This set of capabilities is designed to help clients prepare for the post-quantum era via:

IBM Quantum Safe Explorer to enable organizations to scan source and object code to locate cryptographic assets, dependencies, vulnerabilities and to build a Cryptography Bill of Materials (CBOM).  This allows teams to view and aggregate potential risks into one central location.

IBM Quantum Safe Advisor allows the creation of a dynamic or operational view of cryptographic inventory to guide remediation and analyzes cryptographic posture and compliance to prioritize risks.

IBM Quantum Safe Remediator enables organizations to deploy and test best practice-based quantum-safe remediation patterns to understand the potential impacts on systems and assets as they prepare to deploy quantum-safe solutions.

IBM also presented its IBM Quantum Safe Roadmap to help clients understand and support them through this security transition.

This is IBM's first blueprint that charts the technology milestones towards increasingly advanced quantum-safe technology, which is engineered to help organizations address anticipated cryptographic standards and requirements through crypto-agility and protect systems against emerging vulnerabilities.

This journey is comprised of three key actions:

  • Discover: Identify cryptography usage, analyze dependencies, and generate a CBOM.
  • Observe: Analyze cryptography posture of vulnerabilities and prioritize remediation based on risks.
  • Transform: Remediate and mitigate with crypto-agility and built-in automation.

"As a leader in quantum computing, IBM recognizes the importance of comprehensively addressing the critical needs of our clients as they also consider transforming their cryptography for the quantum era," said Ray Harishankar, IBM fellow and lead for IBM Quantum Safe technology. "Our new suite of quantum-safe technologies and milestones laid out on our roadmap is designed for the continuous evolution of post-quantum security in tandem with useful quantum computing, including solutions to help industries navigate this shift effectively and easily."

The IBM Quantum Safe Roadmap and technology will expose organizations to their existing cryptographic landscape so they can begin to address changes that may be necessary to thrive in the post-quantum era.

For more information about this news, visit www.ibm.com.


Sponsors